Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DDC110 |
0_2_00DDC110 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E08440 |
0_2_00E08440 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DDB95B |
0_2_00DDB95B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DD9FC0 |
0_2_00DD9FC0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DF80FF |
0_2_00DF80FF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E5E0CB |
0_2_00E5E0CB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EF00DD |
0_2_00EF00DD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E380D7 |
0_2_00E380D7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E5C0DE |
0_2_00E5C0DE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E6A0DB |
0_2_00E6A0DB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E080A0 |
0_2_00E080A0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E400A7 |
0_2_00E400A7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ED809D |
0_2_00ED809D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EBC068 |
0_2_00EBC068 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EBA048 |
0_2_00EBA048 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E6805C |
0_2_00E6805C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EC8051 |
0_2_00EC8051 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EDA023 |
0_2_00EDA023 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E8001D |
0_2_00E8001D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E4201D |
0_2_00E4201D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E3C1EA |
0_2_00E3C1EA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ED61E3 |
0_2_00ED61E3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E481EB |
0_2_00E481EB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E801FA |
0_2_00E801FA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F9A1DB |
0_2_00F9A1DB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E7E1D3 |
0_2_00E7E1D3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E441DD |
0_2_00E441DD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ECA1BD |
0_2_00ECA1BD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EAA1B4 |
0_2_00EAA1B4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ECE1B2 |
0_2_00ECE1B2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EB01B4 |
0_2_00EB01B4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E6618C |
0_2_00E6618C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E6E18A |
0_2_00E6E18A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EA419F |
0_2_00EA419F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EE8198 |
0_2_00EE8198 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E4219D |
0_2_00E4219D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E9216A |
0_2_00E9216A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E4616D |
0_2_00E4616D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E5616F |
0_2_00E5616F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E9A14D |
0_2_00E9A14D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E9614C |
0_2_00E9614C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DE5F12 |
0_2_00DE5F12 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F06131 |
0_2_00F06131 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EDC12F |
0_2_00EDC12F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E8E13B |
0_2_00E8E13B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EB2130 |
0_2_00EB2130 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EFA100 |
0_2_00EFA100 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E3A11F |
0_2_00E3A11F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EAC2EF |
0_2_00EAC2EF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EB82E1 |
0_2_00EB82E1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ED22E1 |
0_2_00ED22E1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E862F1 |
0_2_00E862F1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00FA42DB |
0_2_00FA42DB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EA02C8 |
0_2_00EA02C8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E402C3 |
0_2_00E402C3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EBA2C2 |
0_2_00EBA2C2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_0103032F |
0_2_0103032F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E7C2CA |
0_2_00E7C2CA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EC62DD |
0_2_00EC62DD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EF42DD |
0_2_00EF42DD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E942AA |
0_2_00E942AA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E822BA |
0_2_00E822BA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EB62B6 |
0_2_00EB62B6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E6C28C |
0_2_00E6C28C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E9829A |
0_2_00E9829A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E6029D |
0_2_00E6029D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E8C26E |
0_2_00E8C26E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EC027A |
0_2_00EC027A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E7825F |
0_2_00E7825F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E7A22A |
0_2_00E7A22A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EFC23D |
0_2_00EFC23D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EC4209 |
0_2_00EC4209 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ED0200 |
0_2_00ED0200 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EEE218 |
0_2_00EEE218 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EBE3E6 |
0_2_00EBE3E6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E703C2 |
0_2_00E703C2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E963C4 |
0_2_00E963C4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ED83DF |
0_2_00ED83DF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E843A9 |
0_2_00E843A9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F0A3B3 |
0_2_00F0A3B3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E76386 |
0_2_00E76386 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EEC38F |
0_2_00EEC38F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F0E395 |
0_2_00F0E395 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EE636A |
0_2_00EE636A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F10376 |
0_2_00F10376 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EE2341 |
0_2_00EE2341 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DF6369 |
0_2_00DF6369 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E9E339 |
0_2_00E9E339 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E9A33A |
0_2_00E9A33A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EE4337 |
0_2_00EE4337 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E4C33B |
0_2_00E4C33B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E9C30A |
0_2_00E9C30A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E544F7 |
0_2_00E544F7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F044DF |
0_2_00F044DF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E4E4DF |
0_2_00E4E4DF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E8E482 |
0_2_00E8E482 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EC2496 |
0_2_00EC2496 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DD44A0 |
0_2_00DD44A0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EFE464 |
0_2_00EFE464 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E9E467 |
0_2_00E9E467 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EF0461 |
0_2_00EF0461 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EBA47F |
0_2_00EBA47F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EAE470 |
0_2_00EAE470 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EF8472 |
0_2_00EF8472 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ECC449 |
0_2_00ECC449 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EE845F |
0_2_00EE845F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E5C452 |
0_2_00E5C452 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DD6410 |
0_2_00DD6410 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EB4430 |
0_2_00EB4430 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EAA434 |
0_2_00EAA434 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DE2422 |
0_2_00DE2422 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ECA5EE |
0_2_00ECA5EE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E445E0 |
0_2_00E445E0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E885E1 |
0_2_00E885E1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F025FA |
0_2_00F025FA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EF05E3 |
0_2_00EF05E3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EE65FE |
0_2_00EE65FE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F065D0 |
0_2_00F065D0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EE05AD |
0_2_00EE05AD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E385B6 |
0_2_00E385B6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EF25B8 |
0_2_00EF25B8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EA85B3 |
0_2_00EA85B3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EDA584 |
0_2_00EDA584 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E8059A |
0_2_00E8059A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E10560 |
0_2_00E10560 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EAE569 |
0_2_00EAE569 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E7A56A |
0_2_00E7A56A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E9055B |
0_2_00E9055B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E5E522 |
0_2_00E5E522 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E84525 |
0_2_00E84525 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E92502 |
0_2_00E92502 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EDE6F0 |
0_2_00EDE6F0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E8C6D5 |
0_2_00E8C6D5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E786AC |
0_2_00E786AC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F706A0 |
0_2_00F706A0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E066BA |
0_2_00E066BA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DDC680 |
0_2_00DDC680 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E92688 |
0_2_00E92688 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EFA68E |
0_2_00EFA68E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F0A67D |
0_2_00F0A67D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E62674 |
0_2_00E62674 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EDC67A |
0_2_00EDC67A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EC065E |
0_2_00EC065E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E5663A |
0_2_00E5663A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E50605 |
0_2_00E50605 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F08614 |
0_2_00F08614 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E4C60A |
0_2_00E4C60A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E66618 |
0_2_00E66618 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ED6613 |
0_2_00ED6613 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F107F2 |
0_2_00F107F2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DF87D9 |
0_2_00DF87D9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E8A7EF |
0_2_00E8A7EF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E107F0 |
0_2_00E107F0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F987E4 |
0_2_00F987E4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E867F6 |
0_2_00E867F6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ED27F2 |
0_2_00ED27F2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DFC7F9 |
0_2_00DFC7F9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E5C7A3 |
0_2_00E5C7A3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EC678E |
0_2_00EC678E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E4E794 |
0_2_00E4E794 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E3A791 |
0_2_00E3A791 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E9476F |
0_2_00E9476F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E40779 |
0_2_00E40779 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EE8771 |
0_2_00EE8771 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EA0759 |
0_2_00EA0759 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ED875A |
0_2_00ED875A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E5A75A |
0_2_00E5A75A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EB872D |
0_2_00EB872D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E9C727 |
0_2_00E9C727 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E6C730 |
0_2_00E6C730 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EE2730 |
0_2_00EE2730 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E7C738 |
0_2_00E7C738 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F048F2 |
0_2_00F048F2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EF28E9 |
0_2_00EF28E9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EAE8F2 |
0_2_00EAE8F2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DDA8C0 |
0_2_00DDA8C0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E428FB |
0_2_00E428FB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EBA8C8 |
0_2_00EBA8C8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E528C0 |
0_2_00E528C0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EA28C7 |
0_2_00EA28C7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E5E8DA |
0_2_00E5E8DA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ECC8BE |
0_2_00ECC8BE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E9C8BC |
0_2_00E9C8BC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EC68B4 |
0_2_00EC68B4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DE6882 |
0_2_00DE6882 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EF886C |
0_2_00EF886C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EF6876 |
0_2_00EF6876 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DFB455 |
0_2_00DFB455 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EB6845 |
0_2_00EB6845 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EAA85C |
0_2_00EAA85C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E6485F |
0_2_00E6485F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00FAC833 |
0_2_00FAC833 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E9E825 |
0_2_00E9E825 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E4A836 |
0_2_00E4A836 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EA8831 |
0_2_00EA8831 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E70816 |
0_2_00E70816 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EEC9E2 |
0_2_00EEC9E2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EE69F1 |
0_2_00EE69F1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E549C9 |
0_2_00E549C9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EA49DC |
0_2_00EA49DC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E729D8 |
0_2_00E729D8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F069B1 |
0_2_00F069B1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EF09A2 |
0_2_00EF09A2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E9A9B6 |
0_2_00E9A9B6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DE69B8 |
0_2_00DE69B8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DE2940 |
0_2_00DE2940 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E4C958 |
0_2_00E4C958 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DF6962 |
0_2_00DF6962 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DD6960 |
0_2_00DD6960 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EC8903 |
0_2_00EC8903 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ED4915 |
0_2_00ED4915 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EE4913 |
0_2_00EE4913 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E9CAEC |
0_2_00E9CAEC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EB8AE4 |
0_2_00EB8AE4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E10AC0 |
0_2_00E10AC0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EDCACA |
0_2_00EDCACA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E50ACE |
0_2_00E50ACE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ECAAD0 |
0_2_00ECAAD0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EEAAB0 |
0_2_00EEAAB0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E5AA8D |
0_2_00E5AA8D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F0AA9A |
0_2_00F0AA9A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F02A85 |
0_2_00F02A85 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E44A98 |
0_2_00E44A98 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EE8A6D |
0_2_00EE8A6D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E80A60 |
0_2_00E80A60 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E82A4B |
0_2_00E82A4B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E6CA48 |
0_2_00E6CA48 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E6AA54 |
0_2_00E6AA54 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E42A59 |
0_2_00E42A59 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E62A28 |
0_2_00E62A28 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E74A33 |
0_2_00E74A33 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E68A0F |
0_2_00E68A0F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E38A09 |
0_2_00E38A09 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F08A00 |
0_2_00F08A00 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E46A15 |
0_2_00E46A15 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EE0A17 |
0_2_00EE0A17 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F46BF4 |
0_2_00F46BF4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EC2BDE |
0_2_00EC2BDE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EE2BBF |
0_2_00EE2BBF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EBAB82 |
0_2_00EBAB82 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EBEB4B |
0_2_00EBEB4B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E56B46 |
0_2_00E56B46 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EC0B2E |
0_2_00EC0B2E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E8CB2C |
0_2_00E8CB2C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F10B3D |
0_2_00F10B3D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EF0B3B |
0_2_00EF0B3B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E6AB3A |
0_2_00E6AB3A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EF2B32 |
0_2_00EF2B32 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E9ECEC |
0_2_00E9ECEC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EF4CCE |
0_2_00EF4CCE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F10CD4 |
0_2_00F10CD4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E52CC2 |
0_2_00E52CC2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ED8CC4 |
0_2_00ED8CC4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DD8CF0 |
0_2_00DD8CF0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ED0CC0 |
0_2_00ED0CC0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E40CD6 |
0_2_00E40CD6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E46CD7 |
0_2_00E46CD7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E08CA0 |
0_2_00E08CA0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E60CAF |
0_2_00E60CAF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E4CCB7 |
0_2_00E4CCB7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ECCCB5 |
0_2_00ECCCB5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DFCCBF |
0_2_00DFCCBF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E36C87 |
0_2_00E36C87 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E6EC6F |
0_2_00E6EC6F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EC8C7C |
0_2_00EC8C7C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EFAC7E |
0_2_00EFAC7E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F0CC61 |
0_2_00F0CC61 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E00C30 |
0_2_00E00C30 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E94C0B |
0_2_00E94C0B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E7AC00 |
0_2_00E7AC00 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E88C1B |
0_2_00E88C1B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E52C13 |
0_2_00E52C13 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E98C1F |
0_2_00E98C1F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E5CC1D |
0_2_00E5CC1D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E66C1C |
0_2_00E66C1C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E0EDF0 |
0_2_00E0EDF0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F0CDD5 |
0_2_00F0CDD5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EC6DD6 |
0_2_00EC6DD6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E84DA9 |
0_2_00E84DA9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EECDBB |
0_2_00EECDBB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E7AD87 |
0_2_00E7AD87 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EEED8C |
0_2_00EEED8C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EB2D9E |
0_2_00EB2D9E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E76D9D |
0_2_00E76D9D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EC4D97 |
0_2_00EC4D97 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E4ED98 |
0_2_00E4ED98 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DDAD50 |
0_2_00DDAD50 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ECED48 |
0_2_00ECED48 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DD2D00 |
0_2_00DD2D00 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EACD0A |
0_2_00EACD0A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DF6D2A |
0_2_00DF6D2A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EA6D11 |
0_2_00EA6D11 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EA2EEB |
0_2_00EA2EEB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F08EF4 |
0_2_00F08EF4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DEEEC0 |
0_2_00DEEEC0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E0AEC0 |
0_2_00E0AEC0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F04ED5 |
0_2_00F04ED5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E50ECD |
0_2_00E50ECD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00FA0ECC |
0_2_00FA0ECC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E42EDF |
0_2_00E42EDF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E80ED6 |
0_2_00E80ED6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E9AEAF |
0_2_00E9AEAF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E70EB9 |
0_2_00E70EB9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E8AE94 |
0_2_00E8AE94 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EEAE7D |
0_2_00EEAE7D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E00E40 |
0_2_00E00E40 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E5EE50 |
0_2_00E5EE50 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DE6E62 |
0_2_00DE6E62 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EBCE55 |
0_2_00EBCE55 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EB0E2B |
0_2_00EB0E2B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F0AE27 |
0_2_00F0AE27 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E6AE3C |
0_2_00E6AE3C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ED2E32 |
0_2_00ED2E32 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EC0E1E |
0_2_00EC0E1E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00FA2E0F |
0_2_00FA2E0F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DF2E20 |
0_2_00DF2E20 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E98FEB |
0_2_00E98FEB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ED2FF4 |
0_2_00ED2FF4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E4CFFF |
0_2_00E4CFFF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EC4FF7 |
0_2_00EC4FF7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EACFDB |
0_2_00EACFDB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DF8FE0 |
0_2_00DF8FE0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EF2FAE |
0_2_00EF2FAE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EC0FAE |
0_2_00EC0FAE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EBAFA8 |
0_2_00EBAFA8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EC8FA2 |
0_2_00EC8FA2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EDCF8E |
0_2_00EDCF8E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EDAF81 |
0_2_00EDAF81 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E7EF97 |
0_2_00E7EF97 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EAAF9E |
0_2_00EAAF9E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E68F9B |
0_2_00E68F9B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DE8F57 |
0_2_00DE8F57 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DECF50 |
0_2_00DECF50 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E3AF46 |
0_2_00E3AF46 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ED0F47 |
0_2_00ED0F47 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DF0F70 |
0_2_00DF0F70 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E0EF50 |
0_2_00E0EF50 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EF8F5B |
0_2_00EF8F5B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DD4F60 |
0_2_00DD4F60 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EB4F2F |
0_2_00EB4F2F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E62F2C |
0_2_00E62F2C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E78F29 |
0_2_00E78F29 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E8CF35 |
0_2_00E8CF35 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E9CF37 |
0_2_00E9CF37 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E02F00 |
0_2_00E02F00 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E6CF02 |
0_2_00E6CF02 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E58F19 |
0_2_00E58F19 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E370E0 |
0_2_00E370E0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EC90EF |
0_2_00EC90EF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E0F0D0 |
0_2_00E0F0D0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E610D1 |
0_2_00E610D1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EFB0B4 |
0_2_00EFB0B4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E3D090 |
0_2_00E3D090 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EA109C |
0_2_00EA109C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DD30A0 |
0_2_00DD30A0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EB705B |
0_2_00EB705B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EA905C |
0_2_00EA905C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E95028 |
0_2_00E95028 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EF702E |
0_2_00EF702E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E9702A |
0_2_00E9702A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ECB020 |
0_2_00ECB020 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ED9034 |
0_2_00ED9034 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E5B007 |
0_2_00E5B007 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EF100A |
0_2_00EF100A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E41003 |
0_2_00E41003 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ED7018 |
0_2_00ED7018 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E65018 |
0_2_00E65018 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EE11EA |
0_2_00EE11EA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E0F1F0 |
0_2_00E0F1F0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DDF1F6 |
0_2_00DDF1F6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E751D6 |
0_2_00E751D6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F071C1 |
0_2_00F071C1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F0F1C6 |
0_2_00F0F1C6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DF719F |
0_2_00DF719F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E851A0 |
0_2_00E851A0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E471AE |
0_2_00E471AE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E991BD |
0_2_00E991BD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F11191 |
0_2_00F11191 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E8F17C |
0_2_00E8F17C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DF7149 |
0_2_00DF7149 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EB9172 |
0_2_00EB9172 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DF5140 |
0_2_00DF5140 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EE514E |
0_2_00EE514E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EA7140 |
0_2_00EA7140 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E93147 |
0_2_00E93147 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E07154 |
0_2_00E07154 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EAF12C |
0_2_00EAF12C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EBF123 |
0_2_00EBF123 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E9F120 |
0_2_00E9F120 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ED5121 |
0_2_00ED5121 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DE9113 |
0_2_00DE9113 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EB513B |
0_2_00EB513B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ECD112 |
0_2_00ECD112 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F972FC |
0_2_00F972FC |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E4F2E3 |
0_2_00E4F2E3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E6D2F3 |
0_2_00E6D2F3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F9F2EF |
0_2_00F9F2EF |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F0D2D2 |
0_2_00F0D2D2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EFF2C4 |
0_2_00EFF2C4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F092DB |
0_2_00F092DB |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00FA92D7 |
0_2_00FA92D7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E0F2D0 |
0_2_00E0F2D0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E9D2D0 |
0_2_00E9D2D0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E552AE |
0_2_00E552AE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EE52A5 |
0_2_00EE52A5 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E692B6 |
0_2_00E692B6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DED280 |
0_2_00DED280 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E13288 |
0_2_00E13288 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EFD27E |
0_2_00EFD27E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E79252 |
0_2_00E79252 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EE7255 |
0_2_00EE7255 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E45231 |
0_2_00E45231 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EE923B |
0_2_00EE923B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DD4F60 |
0_2_00DD4F60 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E9F3E8 |
0_2_00E9F3E8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EA13E9 |
0_2_00EA13E9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E7F3E9 |
0_2_00E7F3E9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E393F9 |
0_2_00E393F9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E5D3DE |
0_2_00E5D3DE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DFD398 |
0_2_00DFD398 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EB13A2 |
0_2_00EB13A2 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EC73A1 |
0_2_00EC73A1 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E8D388 |
0_2_00E8D388 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E71382 |
0_2_00E71382 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E09397 |
0_2_00E09397 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EA3394 |
0_2_00EA3394 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E4B365 |
0_2_00E4B365 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E9B365 |
0_2_00E9B365 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EC337C |
0_2_00EC337C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EC537B |
0_2_00EC537B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F05351 |
0_2_00F05351 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E51356 |
0_2_00E51356 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EDF33C |
0_2_00EDF33C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ED533B |
0_2_00ED533B |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EED337 |
0_2_00EED337 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EAD308 |
0_2_00EAD308 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EDB30E |
0_2_00EDB30E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ED1316 |
0_2_00ED1316 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EF54E9 |
0_2_00EF54E9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EE34E7 |
0_2_00EE34E7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EF74F9 |
0_2_00EF74F9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F0B4EA |
0_2_00F0B4EA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EF34F0 |
0_2_00EF34F0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EAB4CE |
0_2_00EAB4CE |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E734A4 |
0_2_00E734A4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F2B4B9 |
0_2_00F2B4B9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ED34A0 |
0_2_00ED34A0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E614A9 |
0_2_00E614A9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E4F4B8 |
0_2_00E4F4B8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DFB455 |
0_2_00DFB455 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EA7447 |
0_2_00EA7447 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E41454 |
0_2_00E41454 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E9542D |
0_2_00E9542D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EF9425 |
0_2_00EF9425 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EC9421 |
0_2_00EC9421 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E59431 |
0_2_00E59431 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E9140F |
0_2_00E9140F |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EBB404 |
0_2_00EBB404 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DE742C |
0_2_00DE742C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EB5413 |
0_2_00EB5413 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ED75E8 |
0_2_00ED75E8 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F015E4 |
0_2_00F015E4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E495C9 |
0_2_00E495C9 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EB75C6 |
0_2_00EB75C6 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E5F5D7 |
0_2_00E5F5D7 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F055AA |
0_2_00F055AA |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EB358A |
0_2_00EB358A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00F03596 |
0_2_00F03596 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DE95B0 |
0_2_00DE95B0 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E3B591 |
0_2_00E3B591 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E53592 |
0_2_00E53592 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E67562 |
0_2_00E67562 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EE7561 |
0_2_00EE7561 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E99574 |
0_2_00E99574 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DF3540 |
0_2_00DF3540 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EBB55D |
0_2_00EBB55D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EAF555 |
0_2_00EAF555 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E3F535 |
0_2_00E3F535 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EBF53D |
0_2_00EBF53D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EDD532 |
0_2_00EDD532 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EC1504 |
0_2_00EC1504 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E5750C |
0_2_00E5750C |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E85512 |
0_2_00E85512 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00ECF511 |
0_2_00ECF511 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EC36F4 |
0_2_00EC36F4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E8F6CD |
0_2_00E8F6CD |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EEB6A3 |
0_2_00EEB6A3 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E45681 |
0_2_00E45681 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E0F690 |
0_2_00E0F690 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E97663 |
0_2_00E97663 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E6966D |
0_2_00E6966D |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E7D66A |
0_2_00E7D66A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E4B671 |
0_2_00E4B671 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E8567E |
0_2_00E8567E |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E6F646 |
0_2_00E6F646 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EFF657 |
0_2_00EFF657 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E6D62A |
0_2_00E6D62A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00E9361A |
0_2_00E9361A |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00EE57E4 |
0_2_00EE57E4 |
Source: C:\Users\user\Desktop\file.exe |
Code function: 0_2_00DF37D0 |
0_2_00DF37D0 |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FB1A31 second address: FB1A3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jnc 00007F40654150A6h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FB1A3E second address: FB1A75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F40650E8444h 0x00000009 popad 0x0000000a jbe 00007F40650E8452h 0x00000010 jmp 00007F40650E8446h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FB1D54 second address: FB1D5F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FB1EAF second address: FB1EB3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FB1EB3 second address: FB1EC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ecx 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FB1EC1 second address: FB1EC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FB1EC7 second address: FB1ECB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FB1ECB second address: FB1EEA instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F40650E8447h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FB21DA second address: FB21E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FB3B75 second address: FB3C30 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop ebx 0x00000006 push eax 0x00000007 jmp 00007F40650E8441h 0x0000000c nop 0x0000000d cld 0x0000000e push 00000000h 0x00000010 call 00007F40650E843Eh 0x00000015 mov edx, dword ptr [ebp+122D3797h] 0x0000001b pop edi 0x0000001c push 39BF04B7h 0x00000021 pushad 0x00000022 jmp 00007F40650E843Ch 0x00000027 pushad 0x00000028 push esi 0x00000029 pop esi 0x0000002a jg 00007F40650E8436h 0x00000030 popad 0x00000031 popad 0x00000032 xor dword ptr [esp], 39BF0437h 0x00000039 xor edx, dword ptr [ebp+122D3923h] 0x0000003f mov cl, dl 0x00000041 push 00000003h 0x00000043 sbb di, 47C1h 0x00000048 mov dword ptr [ebp+122D17AEh], eax 0x0000004e push 00000000h 0x00000050 mov edx, dword ptr [ebp+122D3787h] 0x00000056 push 00000003h 0x00000058 mov edx, ecx 0x0000005a push 89FEA134h 0x0000005f jne 00007F40650E844Fh 0x00000065 xor dword ptr [esp], 49FEA134h 0x0000006c mov dh, 7Fh 0x0000006e lea ebx, dword ptr [ebp+1245AA62h] 0x00000074 mov cx, dx 0x00000077 xchg eax, ebx 0x00000078 je 00007F40650E8442h 0x0000007e jg 00007F40650E843Ch 0x00000084 push eax 0x00000085 push edx 0x00000086 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD5E9A second address: FD5EAD instructions: 0x00000000 rdtsc 0x00000002 jng 00007F40654150A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jbe 00007F40654150A6h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD3E10 second address: FD3E14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD3E14 second address: FD3E20 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jnc 00007F40654150A6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD3E20 second address: FD3E25 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD3E25 second address: FD3E2B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD4865 second address: FD487F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnc 00007F40650E843Ch 0x0000000c push eax 0x0000000d push edx 0x0000000e jno 00007F40650E8436h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD487F second address: FD4883 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD49F6 second address: FD4A10 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F40650E8440h 0x00000009 jnc 00007F40650E8436h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD4A10 second address: FD4A14 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD4B69 second address: FD4B79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 push eax 0x00000008 jp 00007F40650E8436h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD4B79 second address: FD4B90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jg 00007F40654150ACh 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD4B90 second address: FD4BA0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 jp 00007F40650E8444h 0x0000000d push esi 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD4BA0 second address: FD4BA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD4F9C second address: FD4FA0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD4FA0 second address: FD4FB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F40654150B0h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD4FB6 second address: FD4FC9 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jno 00007F40650E8436h 0x00000009 je 00007F40650E8436h 0x0000000f pop esi 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD50FC second address: FD510D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F40654150A6h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD510D second address: FD5111 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD5A42 second address: FD5A4A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 push eax 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FD5CF7 second address: FD5CFD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FDE195 second address: FDE199 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE1821 second address: FE1825 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE1825 second address: FE1829 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE1829 second address: FE1842 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F40650E843Ah 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ecx 0x0000000c jnc 00007F40650E8436h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE1842 second address: FE1866 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jmp 00007F40654150B8h 0x0000000a popad 0x0000000b pushad 0x0000000c push esi 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE0F00 second address: FE0F12 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F40650E843Dh 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE10A3 second address: FE10D9 instructions: 0x00000000 rdtsc 0x00000002 js 00007F40654150A6h 0x00000008 jmp 00007F40654150AAh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jmp 00007F40654150B7h 0x00000014 pop ebx 0x00000015 jc 00007F40654150D8h 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE10D9 second address: FE10DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE5F5A second address: FE5F68 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push ecx 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE640F second address: FE641A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnc 00007F40650E8436h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE6567 second address: FE656B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE656B second address: FE6575 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F40650E8436h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE6618 second address: FE661C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE6B25 second address: FE6B2B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F96843 second address: F96857 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F40654150AAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F96857 second address: F9685D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F9685D second address: F96871 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jng 00007F40654150A6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jl 00007F40654150ACh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F96871 second address: F96875 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F96875 second address: F9687A instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FECB35 second address: FECB39 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FED5E5 second address: FED5EA instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FED5EA second address: FED647 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push 00000000h 0x0000000e push ebx 0x0000000f call 00007F40650E8438h 0x00000014 pop ebx 0x00000015 mov dword ptr [esp+04h], ebx 0x00000019 add dword ptr [esp+04h], 00000018h 0x00000021 inc ebx 0x00000022 push ebx 0x00000023 ret 0x00000024 pop ebx 0x00000025 ret 0x00000026 mov si, dx 0x00000029 push 00000000h 0x0000002b call 00007F40650E8442h 0x00000030 clc 0x00000031 pop edi 0x00000032 push eax 0x00000033 pushad 0x00000034 pushad 0x00000035 jmp 00007F40650E8443h 0x0000003a push eax 0x0000003b push edx 0x0000003c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FEF6AD second address: FEF6B2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FEF6B2 second address: FEF6B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FF241A second address: FF241E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FF48D7 second address: FF48E1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnp 00007F40650E8436h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FF5830 second address: FF5896 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F40654150ABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b jmp 00007F40654150ADh 0x00000010 nop 0x00000011 jmp 00007F40654150ABh 0x00000016 push 00000000h 0x00000018 push 00000000h 0x0000001a push ecx 0x0000001b call 00007F40654150A8h 0x00000020 pop ecx 0x00000021 mov dword ptr [esp+04h], ecx 0x00000025 add dword ptr [esp+04h], 0000001Dh 0x0000002d inc ecx 0x0000002e push ecx 0x0000002f ret 0x00000030 pop ecx 0x00000031 ret 0x00000032 mov ebx, dword ptr [ebp+122D1E6Fh] 0x00000038 push 00000000h 0x0000003a mov edi, ecx 0x0000003c xchg eax, esi 0x0000003d push eax 0x0000003e push edx 0x0000003f ja 00007F40654150A8h 0x00000045 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FF5896 second address: FF589C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FF589C second address: FF58A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FF58A0 second address: FF58A4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FF8915 second address: FF892A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F40654150B1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FFA4A0 second address: FFA51D instructions: 0x00000000 rdtsc 0x00000002 jno 00007F40650E843Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d push 00000000h 0x0000000f push esi 0x00000010 call 00007F40650E8438h 0x00000015 pop esi 0x00000016 mov dword ptr [esp+04h], esi 0x0000001a add dword ptr [esp+04h], 00000018h 0x00000022 inc esi 0x00000023 push esi 0x00000024 ret 0x00000025 pop esi 0x00000026 ret 0x00000027 mov ebx, dword ptr [ebp+122D3937h] 0x0000002d and edi, dword ptr [ebp+122D1CC2h] 0x00000033 push 00000000h 0x00000035 mov di, 56F7h 0x00000039 push 00000000h 0x0000003b push 00000000h 0x0000003d push ebx 0x0000003e call 00007F40650E8438h 0x00000043 pop ebx 0x00000044 mov dword ptr [esp+04h], ebx 0x00000048 add dword ptr [esp+04h], 00000016h 0x00000050 inc ebx 0x00000051 push ebx 0x00000052 ret 0x00000053 pop ebx 0x00000054 ret 0x00000055 add dword ptr [ebp+122D186Fh], ebx 0x0000005b xchg eax, esi 0x0000005c push edx 0x0000005d ja 00007F40650E8438h 0x00000063 pop edx 0x00000064 push eax 0x00000065 push eax 0x00000066 push edx 0x00000067 push eax 0x00000068 push edx 0x00000069 pushad 0x0000006a popad 0x0000006b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FFA51D second address: FFA534 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F40654150B3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FFA7B9 second address: FFA7BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FFA7BD second address: FFA7C3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FFE43E second address: FFE443 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FFD726 second address: FFD72A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FFB737 second address: FFB741 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F40650E8436h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10004AD second address: 10004BA instructions: 0x00000000 rdtsc 0x00000002 js 00007F40654150A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FFD72A second address: FFD7A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jng 00007F40650E8438h 0x0000000c push esi 0x0000000d pop esi 0x0000000e popad 0x0000000f mov dword ptr [esp], eax 0x00000012 mov di, CC81h 0x00000016 jno 00007F40650E843Ch 0x0000001c push dword ptr fs:[00000000h] 0x00000023 mov dword ptr fs:[00000000h], esp 0x0000002a movsx edi, di 0x0000002d mov eax, dword ptr [ebp+122D0DCDh] 0x00000033 push 00000000h 0x00000035 push edx 0x00000036 call 00007F40650E8438h 0x0000003b pop edx 0x0000003c mov dword ptr [esp+04h], edx 0x00000040 add dword ptr [esp+04h], 00000018h 0x00000048 inc edx 0x00000049 push edx 0x0000004a ret 0x0000004b pop edx 0x0000004c ret 0x0000004d mov ebx, 2BBE39B4h 0x00000052 mov dword ptr [ebp+122D2FC7h], ebx 0x00000058 push FFFFFFFFh 0x0000005a mov dword ptr [ebp+122D1A39h], edi 0x00000060 mov dword ptr [ebp+1248A160h], ecx 0x00000066 push eax 0x00000067 je 00007F40650E8440h 0x0000006d push eax 0x0000006e push edx 0x0000006f push esi 0x00000070 pop esi 0x00000071 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FFF590 second address: FFF596 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10004BA second address: 1000515 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 popad 0x00000006 mov dword ptr [esp], eax 0x00000009 call 00007F40650E8448h 0x0000000e and di, B066h 0x00000013 pop edi 0x00000014 push 00000000h 0x00000016 mov di, 65FAh 0x0000001a push 00000000h 0x0000001c push 00000000h 0x0000001e push ebp 0x0000001f call 00007F40650E8438h 0x00000024 pop ebp 0x00000025 mov dword ptr [esp+04h], ebp 0x00000029 add dword ptr [esp+04h], 00000015h 0x00000031 inc ebp 0x00000032 push ebp 0x00000033 ret 0x00000034 pop ebp 0x00000035 ret 0x00000036 cmc 0x00000037 mov bx, cx 0x0000003a push eax 0x0000003b je 00007F40650E8449h 0x00000041 push eax 0x00000042 push edx 0x00000043 pushad 0x00000044 popad 0x00000045 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FFF656 second address: FFF65A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1001668 second address: 1001672 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1002760 second address: 1002765 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1001672 second address: 1001676 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1006139 second address: 1006143 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007F40654150A6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 100B6D6 second address: 100B6F9 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F40650E8436h 0x00000008 jc 00007F40650E8436h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F40650E8441h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 100B6F9 second address: 100B6FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 100B6FD second address: 100B71E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F40650E8446h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b popad 0x0000000c push ebx 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 100ADCB second address: 100ADD4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 100ADD4 second address: 100ADD8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 100ADD8 second address: 100ADDE instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 100B24E second address: 100B295 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 jl 00007F40650E8436h 0x0000000b jmp 00007F40650E8443h 0x00000010 pop esi 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 jo 00007F40650E8436h 0x0000001b jo 00007F40650E8436h 0x00000021 popad 0x00000022 pushad 0x00000023 jmp 00007F40650E843Bh 0x00000028 pushad 0x00000029 popad 0x0000002a jp 00007F40650E8436h 0x00000030 pushad 0x00000031 popad 0x00000032 popad 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 100B295 second address: 100B29F instructions: 0x00000000 rdtsc 0x00000002 jg 00007F40654150B2h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 100B29F second address: 100B2A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FAA874 second address: FAA878 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FAA878 second address: FAA880 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FAA880 second address: FAA888 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10172F3 second address: 10172F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10172F7 second address: 10172FD instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10172FD second address: 1017307 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007F40650E8436h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1017307 second address: 1017333 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F40654150ACh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push ecx 0x0000000b pop ecx 0x0000000c pushad 0x0000000d popad 0x0000000e jng 00007F40654150A6h 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 pushad 0x00000018 jo 00007F40654150A8h 0x0000001e push edx 0x0000001f pop edx 0x00000020 pushad 0x00000021 push eax 0x00000022 pop eax 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1017ADC second address: 1017AF6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F40650E8440h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1017AF6 second address: 1017AFA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1017D8E second address: 1017D9F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F40650E8436h 0x0000000a jnp 00007F40650E8436h 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1017D9F second address: 1017DA4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1017DA4 second address: 1017DAA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1018091 second address: 1018097 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1018097 second address: 101809D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 101821D second address: 1018229 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F40654150A6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1018229 second address: 101822F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1018391 second address: 1018395 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1018395 second address: 1018399 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1018399 second address: 101839F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 101DAE2 second address: 101DAFA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F40650E843Eh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 101DAFA second address: 101DB00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 101DB00 second address: 101DB10 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jl 00007F40650E8436h 0x0000000e push eax 0x0000000f pop eax 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 102211B second address: 102211F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 102211F second address: 1022125 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1022125 second address: 102212D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 push esi 0x00000007 pop esi 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 102226A second address: 102227F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 jmp 00007F40650E843Eh 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 102227F second address: 10222D4 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F40654150C3h 0x00000008 je 00007F40654150A6h 0x0000000e jmp 00007F40654150B7h 0x00000013 jne 00007F40654150C0h 0x00000019 jmp 00007F40654150B8h 0x0000001e pushad 0x0000001f popad 0x00000020 pop edx 0x00000021 pop eax 0x00000022 push eax 0x00000023 push edx 0x00000024 jp 00007F40654150A8h 0x0000002a push eax 0x0000002b push edx 0x0000002c push ebx 0x0000002d pop ebx 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10222D4 second address: 10222D8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10222D8 second address: 10222DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10226DD second address: 10226E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10226E7 second address: 10226EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10226EB second address: 10226EF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10226EF second address: 10226F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10226F5 second address: 10226FC instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1021C98 second address: 1021CA2 instructions: 0x00000000 rdtsc 0x00000002 js 00007F40654150A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1021CA2 second address: 1021CA7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1021CA7 second address: 1021CAD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1022A21 second address: 1022A32 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jp 00007F40650E8436h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push esi 0x0000000e pop esi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1022F67 second address: 1022F6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1022F6B second address: 1022F6F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1022F6F second address: 1022F7F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jl 00007F40654150A8h 0x0000000e push edx 0x0000000f pop edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1022F7F second address: 1022F9E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F40650E843Ah 0x00000009 jmp 00007F40650E8441h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1022F9E second address: 1022FA2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1029735 second address: 1029765 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jg 00007F40650E8448h 0x0000000d jmp 00007F40650E8442h 0x00000012 pushad 0x00000013 push eax 0x00000014 jg 00007F40650E8436h 0x0000001a push ecx 0x0000001b pop ecx 0x0000001c pop eax 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 popad 0x00000021 push esi 0x00000022 pop esi 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE346F second address: FC9F1E instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b mov edi, 72FF3400h 0x00000010 call dword ptr [ebp+122D1987h] 0x00000016 jmp 00007F40654150ADh 0x0000001b pushad 0x0000001c push eax 0x0000001d push edx 0x0000001e jne 00007F40654150A6h 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE3603 second address: FE361F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F40650E8448h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE386D second address: E2CBD0 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 mov edi, dword ptr [ebp+122D1E96h] 0x0000000e push dword ptr [ebp+122D1479h] 0x00000014 push 00000000h 0x00000016 push eax 0x00000017 call 00007F40654150A8h 0x0000001c pop eax 0x0000001d mov dword ptr [esp+04h], eax 0x00000021 add dword ptr [esp+04h], 00000017h 0x00000029 inc eax 0x0000002a push eax 0x0000002b ret 0x0000002c pop eax 0x0000002d ret 0x0000002e jmp 00007F40654150B9h 0x00000033 call dword ptr [ebp+122D2923h] 0x00000039 pushad 0x0000003a jmp 00007F40654150B2h 0x0000003f xor eax, eax 0x00000041 mov dword ptr [ebp+122D216Ah], esi 0x00000047 mov edx, dword ptr [esp+28h] 0x0000004b cmc 0x0000004c mov dword ptr [ebp+122D374Fh], eax 0x00000052 jmp 00007F40654150ABh 0x00000057 mov esi, 0000003Ch 0x0000005c mov dword ptr [ebp+122D216Ah], ebx 0x00000062 jmp 00007F40654150B9h 0x00000067 add esi, dword ptr [esp+24h] 0x0000006b jmp 00007F40654150B5h 0x00000070 lodsw 0x00000072 pushad 0x00000073 mov esi, 71DCA489h 0x00000078 add bx, C4ECh 0x0000007d popad 0x0000007e add eax, dword ptr [esp+24h] 0x00000082 mov dword ptr [ebp+122D1E85h], eax 0x00000088 mov ebx, dword ptr [esp+24h] 0x0000008c mov dword ptr [ebp+122D1E85h], esi 0x00000092 push eax 0x00000093 push eax 0x00000094 push edx 0x00000095 jmp 00007F40654150B8h 0x0000009a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE3B20 second address: FE3B26 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE3B26 second address: FE3B2C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE3BF3 second address: FE3BFD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jg 00007F40650E8436h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE3D01 second address: FE3D49 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F40654150A6h 0x0000000a popad 0x0000000b pop ebx 0x0000000c push eax 0x0000000d jno 00007F40654150AEh 0x00000013 mov eax, dword ptr [esp+04h] 0x00000017 jmp 00007F40654150B8h 0x0000001c mov eax, dword ptr [eax] 0x0000001e push eax 0x0000001f push edx 0x00000020 push ebx 0x00000021 jmp 00007F40654150ABh 0x00000026 pop ebx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE3DF6 second address: FE3DFC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE3DFC second address: FE3E0F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a push esi 0x0000000b pop esi 0x0000000c jne 00007F40654150A6h 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE3E0F second address: FE3E29 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F40650E8446h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE3ECC second address: FE3ED2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE3ED2 second address: FE3ED7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE3ED7 second address: FE3F42 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F40654150ACh 0x00000008 jc 00007F40654150A6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 pushad 0x00000012 jmp 00007F40654150AFh 0x00000017 jng 00007F40654150ACh 0x0000001d popad 0x0000001e nop 0x0000001f mov edi, ebx 0x00000021 push 00000004h 0x00000023 push 00000000h 0x00000025 push ebp 0x00000026 call 00007F40654150A8h 0x0000002b pop ebp 0x0000002c mov dword ptr [esp+04h], ebp 0x00000030 add dword ptr [esp+04h], 0000001Dh 0x00000038 inc ebp 0x00000039 push ebp 0x0000003a ret 0x0000003b pop ebp 0x0000003c ret 0x0000003d nop 0x0000003e jmp 00007F40654150ACh 0x00000043 push eax 0x00000044 pushad 0x00000045 push eax 0x00000046 push edx 0x00000047 push ecx 0x00000048 pop ecx 0x00000049 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE3F42 second address: FE3F46 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE4330 second address: FE4336 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE470F second address: FE4713 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE4713 second address: FE4721 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push edi 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d pop edi 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1029D2E second address: 1029D47 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F40650E843Bh 0x0000000d je 00007F40650E8436h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1029EE1 second address: 1029EE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 102A2A7 second address: 102A2AB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 102A2AB second address: 102A2B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 102A425 second address: 102A458 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 js 00007F40650E844Ch 0x0000000c jne 00007F40650E8436h 0x00000012 jmp 00007F40650E8440h 0x00000017 popad 0x00000018 push eax 0x00000019 push edx 0x0000001a js 00007F40650E8438h 0x00000020 push ecx 0x00000021 pop ecx 0x00000022 push eax 0x00000023 push edx 0x00000024 pushad 0x00000025 popad 0x00000026 push ecx 0x00000027 pop ecx 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 102A458 second address: 102A46F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F40654150B3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 102A46F second address: 102A474 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F9B865 second address: F9B86B instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 102FC99 second address: 102FCAD instructions: 0x00000000 rdtsc 0x00000002 ja 00007F40650E8436h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jnp 00007F40650E8436h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 102FCAD second address: 102FCD1 instructions: 0x00000000 rdtsc 0x00000002 je 00007F40654150A6h 0x00000008 jmp 00007F40654150B7h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push ebx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 102FE2B second address: 102FE59 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F40650E8436h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a je 00007F40650E8442h 0x00000010 js 00007F40650E8452h 0x00000016 jnl 00007F40650E8438h 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 102FE59 second address: 102FE5D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 102FE5D second address: 102FE61 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 102FFCA second address: 102FFDE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F40654150AEh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10302A3 second address: 10302BA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edi 0x00000009 push edi 0x0000000a pop edi 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d pop edi 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 js 00007F40650E8436h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10302BA second address: 10302CF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F40654150ABh 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10302CF second address: 10302D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1030769 second address: 1030777 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 jp 00007F40654150A6h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1031171 second address: 10311A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F40650E8446h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F40650E8447h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10311A5 second address: 10311C2 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F40654150A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c pop eax 0x0000000d jmp 00007F40654150AEh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1033FF0 second address: 1033FF4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1033FF4 second address: 1033FFC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10341B6 second address: 10341BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1034306 second address: 1034321 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 jnl 00007F40654150A6h 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F40654150ADh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1034321 second address: 1034325 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1034325 second address: 1034357 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jmp 00007F40654150B9h 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 jmp 00007F40654150AAh 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10344C9 second address: 10344CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10344CD second address: 10344D7 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F40654150A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10344D7 second address: 10344E1 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F40650E8442h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10344E1 second address: 10344E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10368B7 second address: 10368C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10368C2 second address: 10368CC instructions: 0x00000000 rdtsc 0x00000002 jns 00007F40654150A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10368CC second address: 10368D1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10368D1 second address: 10368D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 103CF8B second address: 103CFCC instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jmp 00007F40650E843Ah 0x00000008 pop edx 0x00000009 jne 00007F40650E843Ch 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 jbe 00007F40650E843Ch 0x00000019 jp 00007F40650E8436h 0x0000001f jmp 00007F40650E8447h 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 103D2F8 second address: 103D2FD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 103D2FD second address: 103D303 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 103D303 second address: 103D337 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F40654150B9h 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jmp 00007F40654150AFh 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 103D337 second address: 103D33B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 103D33B second address: 103D345 instructions: 0x00000000 rdtsc 0x00000002 je 00007F40654150A6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 103D345 second address: 103D361 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jc 00007F40650E843Ch 0x0000000c jne 00007F40650E8436h 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 popad 0x00000016 jbe 00007F40650E8436h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE40F0 second address: FE40F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE40F6 second address: FE40FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE40FB second address: FE4100 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE4100 second address: FE4156 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push ebp 0x0000000d call 00007F40650E8438h 0x00000012 pop ebp 0x00000013 mov dword ptr [esp+04h], ebp 0x00000017 add dword ptr [esp+04h], 00000018h 0x0000001f inc ebp 0x00000020 push ebp 0x00000021 ret 0x00000022 pop ebp 0x00000023 ret 0x00000024 or dword ptr [ebp+122D2447h], edx 0x0000002a mov edx, dword ptr [ebp+122D3773h] 0x00000030 mov ebx, dword ptr [ebp+1248A1AAh] 0x00000036 mov dword ptr [ebp+122D2AB7h], edx 0x0000003c add eax, ebx 0x0000003e movzx ecx, ax 0x00000041 push eax 0x00000042 push eax 0x00000043 push edx 0x00000044 jnl 00007F40650E843Ch 0x0000004a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10417E7 second address: 104180B instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 jmp 00007F40654150AAh 0x0000000c jmp 00007F40654150AFh 0x00000011 pop ecx 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1040EF2 second address: 1040F04 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push esi 0x00000004 pop esi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 pushad 0x0000000a jns 00007F40650E8436h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10414A7 second address: 10414B1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jc 00007F40654150A6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1045877 second address: 104587B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 104587B second address: 104589F instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop eax 0x00000009 pushad 0x0000000a jg 00007F40654150B2h 0x00000010 push eax 0x00000011 push edx 0x00000012 jnp 00007F40654150A6h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 104589F second address: 10458B8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F40650E8441h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1044B6A second address: 1044B91 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F40654150A6h 0x00000008 jmp 00007F40654150B9h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1044B91 second address: 1044B95 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1044B95 second address: 1044B9B instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1044B9B second address: 1044BAF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pushad 0x0000000a popad 0x0000000b pushad 0x0000000c popad 0x0000000d push edx 0x0000000e pop edx 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1044BAF second address: 1044BB3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1044BB3 second address: 1044BC9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F40650E8442h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1045023 second address: 104502D instructions: 0x00000000 rdtsc 0x00000002 js 00007F40654150A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 104502D second address: 104505F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F40650E8448h 0x00000009 jmp 00007F40650E8446h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 104505F second address: 104508A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F40654150B6h 0x00000007 jmp 00007F40654150ACh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f push esi 0x00000010 pop esi 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1045389 second address: 10453AA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jmp 00007F40650E8448h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10453AA second address: 10453AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10453AF second address: 10453BB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jnc 00007F40650E8436h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 104D30A second address: 104D310 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 104D310 second address: 104D314 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 104B27D second address: 104B281 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 104B281 second address: 104B29E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jne 00007F40650E844Bh 0x0000000c jmp 00007F40650E843Fh 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 104B29E second address: 104B2A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 104B3FE second address: 104B40D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F40650E843Bh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 104B40D second address: 104B416 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 104B416 second address: 104B425 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 pushad 0x00000007 js 00007F40650E843Ch 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 104B425 second address: 104B449 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jmp 00007F40654150B8h 0x0000000b jo 00007F40654150A6h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 104B449 second address: 104B473 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F40650E8445h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007F40650E843Ch 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 104B79F second address: 104B7B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F40654150B5h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 104B7B9 second address: 104B7C7 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F40650E8438h 0x00000008 push eax 0x00000009 push edx 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 104BA9F second address: 104BAA8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 104BAA8 second address: 104BABE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F40650E8442h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 104BABE second address: 104BAD8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F40654150B4h 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 104BAD8 second address: 104BADE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 104C401 second address: 104C415 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jne 00007F40654150A6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jbe 00007F40654150A6h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 104C415 second address: 104C453 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 js 00007F40650E8436h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jl 00007F40650E844Fh 0x00000012 jmp 00007F40650E8449h 0x00000017 popad 0x00000018 push edx 0x00000019 push esi 0x0000001a push edx 0x0000001b pop edx 0x0000001c pushad 0x0000001d popad 0x0000001e pop esi 0x0000001f pushad 0x00000020 pushad 0x00000021 popad 0x00000022 jne 00007F40650E8436h 0x00000028 push eax 0x00000029 push edx 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 104C719 second address: 104C730 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop esi 0x00000006 jo 00007F40654150B6h 0x0000000c pushad 0x0000000d jns 00007F40654150A6h 0x00000013 pushad 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1051AEF second address: 1051AF3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1051AF3 second address: 1051AF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1051AF9 second address: 1051B23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F40650E8445h 0x0000000d jmp 00007F40650E843Dh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1051B23 second address: 1051B3C instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F40654150A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jo 00007F40654150A6h 0x00000011 js 00007F40654150A6h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1056788 second address: 105678E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 105E3ED second address: 105E40D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F40654150B7h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 105E40D second address: 105E417 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push ebx 0x00000006 push edi 0x00000007 pop edi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FA3E2E second address: FA3E32 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FA3E32 second address: FA3E40 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 js 00007F40650E843Ch 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 105CA86 second address: 105CA8F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 105CBE8 second address: 105CBF4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007F40650E8436h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 105CBF4 second address: 105CBF8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 105CBF8 second address: 105CC33 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F40650E8444h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b js 00007F40650E8438h 0x00000011 pushad 0x00000012 popad 0x00000013 pop edx 0x00000014 pop eax 0x00000015 jc 00007F40650E8452h 0x0000001b pushad 0x0000001c jmp 00007F40650E843Ch 0x00000021 push esi 0x00000022 pop esi 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 105D005 second address: 105D032 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F40654150ADh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F40654150B3h 0x0000000e pushad 0x0000000f jns 00007F40654150A6h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 105D032 second address: 105D057 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 pushad 0x00000007 jmp 00007F40650E8447h 0x0000000c push edi 0x0000000d pushad 0x0000000e popad 0x0000000f pop edi 0x00000010 push ebx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 105D31E second address: 105D323 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 105D323 second address: 105D337 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F40650E843Fh 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 105DB5B second address: 105DB5F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 105DB5F second address: 105DB63 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 105DB63 second address: 105DB69 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1065AA6 second address: 1065AAA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1065AAA second address: 1065ABC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F40654150ACh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1065ABC second address: 1065AC1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1065AC1 second address: 1065AC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10655A3 second address: 10655CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F40650E8449h 0x00000009 jmp 00007F40650E843Ah 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10655CB second address: 10655D0 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1065783 second address: 1065789 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1070D73 second address: 1070D94 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jmp 00007F40654150B7h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1070D94 second address: 1070D9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1070D9A second address: 1070D9E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1070D9E second address: 1070DA4 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1070DA4 second address: 1070DA9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1070DA9 second address: 1070DCD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F40650E8443h 0x0000000e je 00007F40650E844Dh 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1070DCD second address: 1070DE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F40654150B1h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1070920 second address: 1070926 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1070A98 second address: 1070AB0 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jmp 00007F40654150AEh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1073A6B second address: 1073A73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1073A73 second address: 1073A8B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F40654150B3h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1073A8B second address: 1073A97 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push edx 0x00000004 pop edx 0x00000005 pushad 0x00000006 popad 0x00000007 pop edx 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F94CE1 second address: F94CEF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F40654150AAh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F94CEF second address: F94D03 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jmp 00007F40650E843Bh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F94D03 second address: F94D12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jl 00007F40654150A6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F94D12 second address: F94D20 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F40650E8436h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: F94D20 second address: F94D2A instructions: 0x00000000 rdtsc 0x00000002 je 00007F40654150A6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1073455 second address: 1073479 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jng 00007F40650E844Ah 0x0000000c jmp 00007F40650E8444h 0x00000011 push eax 0x00000012 push edx 0x00000013 push edi 0x00000014 pop edi 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10735F8 second address: 10735FC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 107E5C3 second address: 107E5C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1086A9C second address: 1086AA2 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1086AA2 second address: 1086AB5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 js 00007F40650E8436h 0x0000000f push edi 0x00000010 pop edi 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 108B632 second address: 108B642 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jbe 00007F40654150AEh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 108FC67 second address: 108FC6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 108FC6B second address: 108FC71 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 108FC71 second address: 108FC7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 108FC7E second address: 108FC84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 108FC84 second address: 108FC8A instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 108FC8A second address: 108FCAB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007F40654150ABh 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop eax 0x0000000b pushad 0x0000000c jmp 00007F40654150ADh 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 108FCAB second address: 108FCB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 108FE01 second address: 108FE25 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F40654150AAh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c js 00007F40654150ACh 0x00000012 jne 00007F40654150A6h 0x00000018 push eax 0x00000019 jg 00007F40654150A6h 0x0000001f pop eax 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 108FE25 second address: 108FE2B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 108FE2B second address: 108FE2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 108FF8D second address: 108FF92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10904D9 second address: 10904DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10904DF second address: 10904E3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1090FEF second address: 1090FFF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F40654150AAh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1090FFF second address: 109101E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F40650E8449h 0x00000009 push eax 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1093FD3 second address: 1093FDB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1093FDB second address: 1093FEE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 je 00007F40650E8436h 0x0000000d jnc 00007F40650E8436h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1093FEE second address: 1093FF2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1093FF2 second address: 1093FF8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1093FF8 second address: 1093FFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1093B5D second address: 1093B6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 jng 00007F40650E8436h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 1096E76 second address: 1096E7A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 109FD45 second address: 109FD4D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10A14BB second address: 10A14BF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10A14BF second address: 10A14C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10A98F4 second address: 10A98F8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10A98F8 second address: 10A9904 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F40650E8436h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10A9904 second address: 10A9925 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F40654150B2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jc 00007F40654150B0h 0x0000000f push esi 0x00000010 push ecx 0x00000011 pop ecx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10A9759 second address: 10A9789 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jg 00007F40650E8442h 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f jo 00007F40650E8449h 0x00000015 jmp 00007F40650E843Dh 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10A9789 second address: 10A9797 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pushad 0x00000006 popad 0x00000007 ja 00007F40654150A6h 0x0000000d pop ebx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10A9797 second address: 10A979D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10A979D second address: 10A97A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10B5A1A second address: 10B5A23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push edi 0x00000008 pop edi 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10B5A23 second address: 10B5A2E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10B5BCA second address: 10B5BD9 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jo 00007F40650E843Eh 0x0000000c push edi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10CDAD2 second address: 10CDAEE instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jmp 00007F40654150AEh 0x00000008 pop edx 0x00000009 push eax 0x0000000a push edx 0x0000000b js 00007F40654150A6h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10CDAEE second address: 10CDAF2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10CDC35 second address: 10CDC3C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10CE029 second address: 10CE043 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F40650E8445h 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10CE1A9 second address: 10CE1AD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10CE1AD second address: 10CE1CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F40650E8441h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jc 00007F40650E8436h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10CE1CC second address: 10CE1D5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10CE470 second address: 10CE476 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10CE476 second address: 10CE485 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jp 00007F40654150AAh 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10CE5FD second address: 10CE607 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F40650E8436h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10CE607 second address: 10CE60B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10CE60B second address: 10CE617 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D2C19 second address: 10D2C20 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D2C20 second address: 10D2C36 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F40650E843Ch 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D2C36 second address: 10D2C4A instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jnp 00007F40654150A6h 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 pushad 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D2C4A second address: 10D2C8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F40650E8436h 0x0000000a popad 0x0000000b push esi 0x0000000c push eax 0x0000000d pop eax 0x0000000e pop esi 0x0000000f popad 0x00000010 mov eax, dword ptr [eax] 0x00000012 push ecx 0x00000013 jg 00007F40650E8438h 0x00000019 pop ecx 0x0000001a mov dword ptr [esp+04h], eax 0x0000001e pushad 0x0000001f pushad 0x00000020 jp 00007F40650E8436h 0x00000026 jmp 00007F40650E8445h 0x0000002b popad 0x0000002c push eax 0x0000002d push edx 0x0000002e push eax 0x0000002f push edx 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D2C8C second address: 10D2C90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D2F56 second address: 10D2F5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D44B6 second address: 10D44C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F40654150A6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: 10D44C0 second address: 10D44E4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F40650E8446h 0x00000007 jnc 00007F40650E8436h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE8C84 second address: FE8C8A instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE8C8A second address: FE8C9B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push edi 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 pop edi 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE8E7D second address: FE8E8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F40654150ABh 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE90DE second address: FE90E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE90E2 second address: FE90FF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F40654150B9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe |
RDTSC instruction interceptor: First address: FE90FF second address: FE911C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F40650E8448h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |