Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0083F0C0 | 0_2_0083F0C0 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0083A030 | 0_2_0083A030 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00803183 | 0_2_00803183 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00836170 | 0_2_00836170 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008212E0 | 0_2_008212E0 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_007FF3F0 | 0_2_007FF3F0 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00836400 | 0_2_00836400 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0083C5DA | 0_2_0083C5DA |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0083E550 | 0_2_0083E550 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_007FB990 | 0_2_007FB990 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00827B25 | 0_2_00827B25 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00801D60 | 0_2_00801D60 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0081DD70 | 0_2_0081DD70 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00815090 | 0_2_00815090 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0087E093 | 0_2_0087E093 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0089F0A8 | 0_2_0089F0A8 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008920AA | 0_2_008920AA |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_009C20A7 | 0_2_009C20A7 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008140E0 | 0_2_008140E0 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008370E0 | 0_2_008370E0 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0089E0ED | 0_2_0089E0ED |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008890F5 | 0_2_008890F5 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0088800F | 0_2_0088800F |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0082500F | 0_2_0082500F |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_009C500F | 0_2_009C500F |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0089301F | 0_2_0089301F |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0087502E | 0_2_0087502E |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00838032 | 0_2_00838032 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0089003D | 0_2_0089003D |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0083D038 | 0_2_0083D038 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_009CE055 | 0_2_009CE055 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00869056 | 0_2_00869056 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0087B067 | 0_2_0087B067 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0086E063 | 0_2_0086E063 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008A4073 | 0_2_008A4073 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0080607C | 0_2_0080607C |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0086807A | 0_2_0086807A |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00867186 | 0_2_00867186 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008A21A6 | 0_2_008A21A6 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008A31B9 | 0_2_008A31B9 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008281B4 | 0_2_008281B4 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0086A1BC | 0_2_0086A1BC |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008961B4 | 0_2_008961B4 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008551E9 | 0_2_008551E9 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008A41F0 | 0_2_008A41F0 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008621F8 | 0_2_008621F8 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0080B100 | 0_2_0080B100 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0088311F | 0_2_0088311F |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0088115B | 0_2_0088115B |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0087D15C | 0_2_0087D15C |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_007FC1A0 | 0_2_007FC1A0 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00811160 | 0_2_00811160 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0080F169 | 0_2_0080F169 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00874168 | 0_2_00874168 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0081A2B0 | 0_2_0081A2B0 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0089C2BC | 0_2_0089C2BC |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008A42B7 | 0_2_008A42B7 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0088B2B6 | 0_2_0088B2B6 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008812C0 | 0_2_008812C0 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_007FA220 | 0_2_007FA220 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0086F2EE | 0_2_0086F2EE |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008862FB | 0_2_008862FB |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0087F21C | 0_2_0087F21C |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0080222B | 0_2_0080222B |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0088C25B | 0_2_0088C25B |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0080C74B | 0_2_0080C74B |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0089727C | 0_2_0089727C |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00863384 | 0_2_00863384 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008A1388 | 0_2_008A1388 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00813382 | 0_2_00813382 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0087339A | 0_2_0087339A |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008953A0 | 0_2_008953A0 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0081D3C7 | 0_2_0081D3C7 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008643D5 | 0_2_008643D5 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008943DE | 0_2_008943DE |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0082F3DA | 0_2_0082F3DA |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008273DF | 0_2_008273DF |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0082A3E0 | 0_2_0082A3E0 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008143F0 | 0_2_008143F0 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00866332 | 0_2_00866332 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00823343 | 0_2_00823343 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0082D348 | 0_2_0082D348 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0080D361 | 0_2_0080D361 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0080C375 | 0_2_0080C375 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0088E372 | 0_2_0088E372 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0087C4A6 | 0_2_0087C4A6 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008874AD | 0_2_008874AD |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0089E4A1 | 0_2_0089E4A1 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0082E4A9 | 0_2_0082E4A9 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_009C84AB | 0_2_009C84AB |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_009C34A2 | 0_2_009C34A2 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_007F9440 | 0_2_007F9440 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0080E4C2 | 0_2_0080E4C2 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008894D5 | 0_2_008894D5 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008904EC | 0_2_008904EC |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_007FB410 | 0_2_007FB410 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008C44E3 | 0_2_008C44E3 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00865405 | 0_2_00865405 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0088B40C | 0_2_0088B40C |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008A0403 | 0_2_008A0403 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00880403 | 0_2_00880403 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00897423 | 0_2_00897423 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_007FC4D0 | 0_2_007FC4D0 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00837450 | 0_2_00837450 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00872463 | 0_2_00872463 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0086D47E | 0_2_0086D47E |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0089C593 | 0_2_0089C593 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008625B0 | 0_2_008625B0 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008965BF | 0_2_008965BF |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008765C6 | 0_2_008765C6 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0088E5CA | 0_2_0088E5CA |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0086A5C8 | 0_2_0086A5C8 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008075D3 | 0_2_008075D3 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_007F3520 | 0_2_007F3520 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0088D5EC | 0_2_0088D5EC |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008A35E2 | 0_2_008A35E2 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00892508 | 0_2_00892508 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00868516 | 0_2_00868516 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00861527 | 0_2_00861527 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00830530 | 0_2_00830530 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00877534 | 0_2_00877534 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00888543 | 0_2_00888543 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00826560 | 0_2_00826560 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_009BD69B | 0_2_009BD69B |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0087F687 | 0_2_0087F687 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0088B6A8 | 0_2_0088B6A8 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008916A3 | 0_2_008916A3 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008A06EA | 0_2_008A06EA |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008866E4 | 0_2_008866E4 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008246F0 | 0_2_008246F0 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00874609 | 0_2_00874609 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0088461B | 0_2_0088461B |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0088C62C | 0_2_0088C62C |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0087A64E | 0_2_0087A64E |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0089D646 | 0_2_0089D646 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0089967D | 0_2_0089967D |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0088267D | 0_2_0088267D |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0089D78B | 0_2_0089D78B |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0086F794 | 0_2_0086F794 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008147A0 | 0_2_008147A0 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008357A0 | 0_2_008357A0 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008887BD | 0_2_008887BD |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008647D0 | 0_2_008647D0 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0087D7DA | 0_2_0087D7DA |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008997EA | 0_2_008997EA |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0086B7EF | 0_2_0086B7EF |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0088F7E3 | 0_2_0088F7E3 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008107F0 | 0_2_008107F0 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00890707 | 0_2_00890707 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00870723 | 0_2_00870723 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0080C74B | 0_2_0080C74B |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0083D750 | 0_2_0083D750 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_007F47A2 | 0_2_007F47A2 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00865758 | 0_2_00865758 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00821760 | 0_2_00821760 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00897762 | 0_2_00897762 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0089B77D | 0_2_0089B77D |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_007F2780 | 0_2_007F2780 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_009D089F | 0_2_009D089F |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0086D889 | 0_2_0086D889 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0088E892 | 0_2_0088E892 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0087C899 | 0_2_0087C899 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008938AE | 0_2_008938AE |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008808BB | 0_2_008808BB |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0089B8C4 | 0_2_0089B8C4 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_009B48D4 | 0_2_009B48D4 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008838D3 | 0_2_008838D3 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008388E3 | 0_2_008388E3 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008988E8 | 0_2_008988E8 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008208F0 | 0_2_008208F0 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0088C8F1 | 0_2_0088C8F1 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0086C809 | 0_2_0086C809 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00874824 | 0_2_00874824 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00872828 | 0_2_00872828 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0086083C | 0_2_0086083C |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0086E848 | 0_2_0086E848 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00873855 | 0_2_00873855 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008A585F | 0_2_008A585F |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00866861 | 0_2_00866861 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00830870 | 0_2_00830870 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0083A980 | 0_2_0083A980 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00890984 | 0_2_00890984 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0088D9D4 | 0_2_0088D9D4 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0089F9EB | 0_2_0089F9EB |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0085E9E0 | 0_2_0085E9E0 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008619EA | 0_2_008619EA |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008959FA | 0_2_008959FA |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008349FD | 0_2_008349FD |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008869F6 | 0_2_008869F6 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00888917 | 0_2_00888917 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00871920 | 0_2_00871920 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008A3941 | 0_2_008A3941 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0088195B | 0_2_0088195B |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00896954 | 0_2_00896954 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0080095E | 0_2_0080095E |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_007FC9A0 | 0_2_007FC9A0 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00821973 | 0_2_00821973 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008A1A81 | 0_2_008A1A81 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_007F8A50 | 0_2_007F8A50 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00884AD1 | 0_2_00884AD1 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00862ADC | 0_2_00862ADC |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0088AAE5 | 0_2_0088AAE5 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0083DAF0 | 0_2_0083DAF0 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00835A00 | 0_2_00835A00 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0083EA10 | 0_2_0083EA10 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00893A1F | 0_2_00893A1F |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00876A27 | 0_2_00876A27 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00898A5A | 0_2_00898A5A |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0087FA66 | 0_2_0087FA66 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_007FEA9D | 0_2_007FEA9D |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0080FA6F | 0_2_0080FA6F |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00807A70 | 0_2_00807A70 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00874A76 | 0_2_00874A76 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0086AA75 | 0_2_0086AA75 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0089EB97 | 0_2_0089EB97 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00891BA5 | 0_2_00891BA5 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00814BB0 | 0_2_00814BB0 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_007F2B20 | 0_2_007F2B20 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00810BE1 | 0_2_00810BE1 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0086EBE9 | 0_2_0086EBE9 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00833BFA | 0_2_00833BFA |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0086FBFB | 0_2_0086FBFB |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00816B10 | 0_2_00816B10 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00894B1E | 0_2_00894B1E |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00863B28 | 0_2_00863B28 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00883B59 | 0_2_00883B59 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008A4B6C | 0_2_008A4B6C |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00870B6D | 0_2_00870B6D |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00888C8F | 0_2_00888C8F |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00827C5D | 0_2_00827C5D |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0086DC88 | 0_2_0086DC88 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0082FC90 | 0_2_0082FC90 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00892CA8 | 0_2_00892CA8 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0088DCAE | 0_2_0088DCAE |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0086BCA1 | 0_2_0086BCA1 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00889CA3 | 0_2_00889CA3 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00806CB7 | 0_2_00806CB7 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00885CB4 | 0_2_00885CB4 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00886CD0 | 0_2_00886CD0 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_007FAC20 | 0_2_007FAC20 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00819CE0 | 0_2_00819CE0 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0081BCE9 | 0_2_0081BCE9 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0088CCF4 | 0_2_0088CCF4 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0098EC1B | 0_2_0098EC1B |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0087AC19 | 0_2_0087AC19 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0087BC24 | 0_2_0087BC24 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00874C2C | 0_2_00874C2C |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00813C40 | 0_2_00813C40 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00872C4F | 0_2_00872C4F |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00800C50 | 0_2_00800C50 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00813C57 | 0_2_00813C57 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00870C50 | 0_2_00870C50 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00822C58 | 0_2_00822C58 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00827C5F | 0_2_00827C5F |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00868C5B | 0_2_00868C5B |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0087CC65 | 0_2_0087CC65 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0087DC6B | 0_2_0087DC6B |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00866C7D | 0_2_00866C7D |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00875C7B | 0_2_00875C7B |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00898D94 | 0_2_00898D94 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00881DB8 | 0_2_00881DB8 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008A1DB9 | 0_2_008A1DB9 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00814DC0 | 0_2_00814DC0 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00895DEB | 0_2_00895DEB |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00910DFC | 0_2_00910DFC |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00826DF0 | 0_2_00826DF0 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0083ED50 | 0_2_0083ED50 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00878D74 | 0_2_00878D74 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00829E9A | 0_2_00829E9A |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0089FEAA | 0_2_0089FEAA |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00896EA1 | 0_2_00896EA1 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00890EF8 | 0_2_00890EF8 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00804EF4 | 0_2_00804EF4 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00875EF0 | 0_2_00875EF0 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_009C9EE6 | 0_2_009C9EE6 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00864EFC | 0_2_00864EFC |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00A01E03 | 0_2_00A01E03 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0085EE20 | 0_2_0085EE20 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00862E29 | 0_2_00862E29 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0088BE32 | 0_2_0088BE32 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_007F3EC0 | 0_2_007F3EC0 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_009BEE5D | 0_2_009BEE5D |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00876E52 | 0_2_00876E52 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0089CE6E | 0_2_0089CE6E |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00860E6A | 0_2_00860E6A |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00865E74 | 0_2_00865E74 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00828F82 | 0_2_00828F82 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00877F85 | 0_2_00877F85 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00828F93 | 0_2_00828F93 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0083DF90 | 0_2_0083DF90 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008A4F96 | 0_2_008A4F96 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0080BFAA | 0_2_0080BFAA |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0086CFCB | 0_2_0086CFCB |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_008A0FD1 | 0_2_008A0FD1 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00899F08 | 0_2_00899F08 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0087FF0B | 0_2_0087FF0B |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0085FF15 | 0_2_0085FF15 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0080DF2A | 0_2_0080DF2A |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00863F32 | 0_2_00863F32 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00868F3A | 0_2_00868F3A |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00888F35 | 0_2_00888F35 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00828F44 | 0_2_00828F44 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_00891F59 | 0_2_00891F59 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_009CBF76 | 0_2_009CBF76 |
Source: C:\Users\user\Desktop\random(3).exe | Code function: 0_2_0088CF76 | 0_2_0088CF76 |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 8572A7 second address: 8572AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 8572AB second address: 8572B1 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 8572B1 second address: 8572B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 8572B7 second address: 8572BB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 8572BB second address: 856B17 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b jmp 00007F998484EB0Dh 0x00000010 push dword ptr [ebp+122D175Dh] 0x00000016 jmp 00007F998484EB10h 0x0000001b mov dword ptr [ebp+122D2EF9h], eax 0x00000021 call dword ptr [ebp+122D1C31h] 0x00000027 pushad 0x00000028 jmp 00007F998484EB0Eh 0x0000002d xor eax, eax 0x0000002f jg 00007F998484EB14h 0x00000035 jmp 00007F998484EB0Eh 0x0000003a mov edx, dword ptr [esp+28h] 0x0000003e pushad 0x0000003f clc 0x00000040 mov bl, A9h 0x00000042 popad 0x00000043 mov dword ptr [ebp+122D2C64h], eax 0x00000049 sub dword ptr [ebp+122D3124h], ebx 0x0000004f mov esi, 0000003Ch 0x00000054 mov dword ptr [ebp+122D3124h], esi 0x0000005a add esi, dword ptr [esp+24h] 0x0000005e jmp 00007F998484EB19h 0x00000063 je 00007F998484EB11h 0x00000069 jmp 00007F998484EB0Bh 0x0000006e lodsw 0x00000070 jmp 00007F998484EB13h 0x00000075 add eax, dword ptr [esp+24h] 0x00000079 mov dword ptr [ebp+122D2EEFh], eax 0x0000007f mov ebx, dword ptr [esp+24h] 0x00000083 xor dword ptr [ebp+122D3124h], edx 0x00000089 nop 0x0000008a push edx 0x0000008b push eax 0x0000008c push edx 0x0000008d push eax 0x0000008e pop eax 0x0000008f rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9D57B8 second address: 9D57E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 jmp 00007F9984B08D0Bh 0x0000000b push eax 0x0000000c push edx 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f jmp 00007F9984B08D17h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9D613D second address: 9D6170 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F998484EB15h 0x00000007 jmp 00007F998484EB10h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f push ecx 0x00000010 je 00007F998484EB06h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9D6170 second address: 9D61CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jbe 00007F9984B08D14h 0x0000000b pushad 0x0000000c jmp 00007F9984B08D11h 0x00000011 jmp 00007F9984B08D15h 0x00000016 jmp 00007F9984B08D13h 0x0000001b ja 00007F9984B08D06h 0x00000021 popad 0x00000022 push ebx 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9D61CD second address: 9D61D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9D81F7 second address: 856B17 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jl 00007F9984B08D06h 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c add dword ptr [esp], 327834FDh 0x00000013 mov edi, dword ptr [ebp+122D2CECh] 0x00000019 mov dword ptr [ebp+122D1D54h], ebx 0x0000001f push dword ptr [ebp+122D175Dh] 0x00000025 add esi, dword ptr [ebp+122D294Ah] 0x0000002b call dword ptr [ebp+122D1C31h] 0x00000031 pushad 0x00000032 jmp 00007F9984B08D0Eh 0x00000037 xor eax, eax 0x00000039 jg 00007F9984B08D14h 0x0000003f jmp 00007F9984B08D0Eh 0x00000044 mov edx, dword ptr [esp+28h] 0x00000048 pushad 0x00000049 clc 0x0000004a mov bl, A9h 0x0000004c popad 0x0000004d mov dword ptr [ebp+122D2C64h], eax 0x00000053 sub dword ptr [ebp+122D3124h], ebx 0x00000059 mov esi, 0000003Ch 0x0000005e mov dword ptr [ebp+122D3124h], esi 0x00000064 add esi, dword ptr [esp+24h] 0x00000068 jmp 00007F9984B08D19h 0x0000006d je 00007F9984B08D11h 0x00000073 jmp 00007F9984B08D0Bh 0x00000078 lodsw 0x0000007a jmp 00007F9984B08D13h 0x0000007f add eax, dword ptr [esp+24h] 0x00000083 mov dword ptr [ebp+122D2EEFh], eax 0x00000089 mov ebx, dword ptr [esp+24h] 0x0000008d xor dword ptr [ebp+122D3124h], edx 0x00000093 nop 0x00000094 push edx 0x00000095 push eax 0x00000096 push edx 0x00000097 push eax 0x00000098 pop eax 0x00000099 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9D8299 second address: 9D82A3 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F998484EB06h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9D82A3 second address: 9D82D4 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F9984B08D0Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e jmp 00007F9984B08D16h 0x00000013 mov eax, dword ptr [eax] 0x00000015 push edi 0x00000016 push eax 0x00000017 push edx 0x00000018 push ebx 0x00000019 pop ebx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9D8463 second address: 9D84B3 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jnp 00007F998484EB06h 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c xor dword ptr [esp], 0AF173ABh 0x00000013 push 00000000h 0x00000015 push ebp 0x00000016 call 00007F998484EB08h 0x0000001b pop ebp 0x0000001c mov dword ptr [esp+04h], ebp 0x00000020 add dword ptr [esp+04h], 0000001Bh 0x00000028 inc ebp 0x00000029 push ebp 0x0000002a ret 0x0000002b pop ebp 0x0000002c ret 0x0000002d movzx edx, dx 0x00000030 push 00000003h 0x00000032 sub ch, FFFFFFBDh 0x00000035 push 00000000h 0x00000037 mov ecx, 0B97845Ch 0x0000003c push 00000003h 0x0000003e push 9079CAB3h 0x00000043 push ebx 0x00000044 pushad 0x00000045 push eax 0x00000046 push edx 0x00000047 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9D84B3 second address: 9D84B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9D858C second address: 9D85B8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 jmp 00007F998484EB0Ah 0x0000000d nop 0x0000000e xor dword ptr [ebp+122D2E61h], edx 0x00000014 push 00000000h 0x00000016 push esi 0x00000017 mov dword ptr [ebp+122D1D77h], esi 0x0000001d pop edi 0x0000001e push 0826DF80h 0x00000023 pushad 0x00000024 pushad 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9EB121 second address: 9EB125 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9EB125 second address: 9EB129 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9F9C27 second address: 9F9C2B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9F9C2B second address: 9F9C3B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jbe 00007F998484EB0Ch 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9F9C3B second address: 9F9C56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F9984B08D13h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9F9C56 second address: 9F9C92 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F998484EB06h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jmp 00007F998484EB19h 0x00000010 pushad 0x00000011 popad 0x00000012 pop eax 0x00000013 pushad 0x00000014 jmp 00007F998484EB12h 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9F7A0B second address: 9F7A16 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F9984B08D06h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9F7B5D second address: 9F7B8D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F998484EB06h 0x0000000a jmp 00007F998484EB0Ch 0x0000000f jmp 00007F998484EB14h 0x00000014 popad 0x00000015 pushad 0x00000016 push ecx 0x00000017 pop ecx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9F7B8D second address: 9F7BA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9984B08D13h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9F7BA6 second address: 9F7BB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9F7EAC second address: 9F7EB8 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F9984B08D06h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9F816A second address: 9F8176 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007F998484EB06h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9F8176 second address: 9F817A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9F817A second address: 9F817E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9F85CA second address: 9F85CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9F85CE second address: 9F85F5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F998484EB14h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push edi 0x0000000b push edx 0x0000000c pop edx 0x0000000d jbe 00007F998484EB06h 0x00000013 pop edi 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9F85F5 second address: 9F85FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F9984B08D06h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9F85FF second address: 9F8617 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F998484EB0Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jnc 00007F998484EB06h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9F8A95 second address: 9F8A99 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9F8C2B second address: 9F8C64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F998484EB15h 0x00000009 jnl 00007F998484EB06h 0x0000000f jnc 00007F998484EB06h 0x00000015 popad 0x00000016 pushad 0x00000017 jbe 00007F998484EB0Ah 0x0000001d push eax 0x0000001e push edx 0x0000001f jo 00007F998484EB06h 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9F8C64 second address: 9F8C70 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9F8C70 second address: 9F8C76 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9F9370 second address: 9F9374 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9F9374 second address: 9F938B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F998484EB0Bh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push esi 0x0000000e pop esi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9F938B second address: 9F938F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9F94FE second address: 9F9504 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9F06F1 second address: 9F070A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9984B08D15h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9FF087 second address: 9FF08D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9FF08D second address: 9FF0AF instructions: 0x00000000 rdtsc 0x00000002 ja 00007F9984B08D06h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 pushad 0x00000011 push ecx 0x00000012 jl 00007F9984B08D06h 0x00000018 pop ecx 0x00000019 pushad 0x0000001a jng 00007F9984B08D06h 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9FF0AF second address: 9FF0CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 mov eax, dword ptr [eax] 0x00000008 jnc 00007F998484EB0Ch 0x0000000e pushad 0x0000000f push eax 0x00000010 pop eax 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 mov dword ptr [esp+04h], eax 0x00000018 push eax 0x00000019 push edx 0x0000001a push ecx 0x0000001b pushad 0x0000001c popad 0x0000001d pop ecx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9FF37E second address: 9FF39E instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F9984B08D16h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9C2F3C second address: 9C2F76 instructions: 0x00000000 rdtsc 0x00000002 je 00007F998484EB06h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 pop eax 0x00000011 popad 0x00000012 push edi 0x00000013 jns 00007F998484EB06h 0x00000019 pop edi 0x0000001a jmp 00007F998484EB19h 0x0000001f popad 0x00000020 push eax 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9C2F76 second address: 9C2F7A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9C2F7A second address: 9C2F7E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9C2F7E second address: 9C2F8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F9984B08D0Bh 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A06B58 second address: A06B5D instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A06B5D second address: A06B72 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F9984B08D06h 0x0000000a pop ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f ja 00007F9984B08D06h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A06FD2 second address: A06FE6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F998484EB0Eh 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A06FE6 second address: A06FF9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F9984B08D0Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A0758F second address: A07593 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A07593 second address: A0759B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A09C3A second address: A09C3E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A09C3E second address: A09C65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 xor dword ptr [esp], 374D4BC1h 0x0000000d call 00007F9984B08D09h 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 push edx 0x00000016 pop edx 0x00000017 jmp 00007F9984B08D0Bh 0x0000001c popad 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A09C65 second address: A09C94 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007F998484EB0Fh 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F998484EB17h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A09C94 second address: A09CCC instructions: 0x00000000 rdtsc 0x00000002 jc 00007F9984B08D0Ch 0x00000008 ja 00007F9984B08D06h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 mov eax, dword ptr [esp+04h] 0x00000014 ja 00007F9984B08D1Dh 0x0000001a mov eax, dword ptr [eax] 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A09CCC second address: A09CD3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A09CD3 second address: A09CF5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9984B08D15h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push edi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A09CF5 second address: A09CFA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A09CFA second address: A09CFF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A0A024 second address: A0A037 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F998484EB0Fh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A0A037 second address: A0A03B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A0A875 second address: A0A879 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A0A8AD second address: A0A8B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A0A8B2 second address: A0A8BC instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F998484EB0Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A0A953 second address: A0A958 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A0A958 second address: A0A95E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A0A95E second address: A0A962 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A0AADC second address: A0AAE0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A0AD4E second address: A0AD52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A0AD52 second address: A0AD58 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A0C99B second address: A0C9A0 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A0D3FF second address: A0D418 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F998484EB0Eh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A0D418 second address: A0D41E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A0D41E second address: A0D422 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A11A6A second address: A11A6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A11A6E second address: A11A8A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F998484EB18h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A11A8A second address: A11ADD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9984B08D17h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], eax 0x0000000e mov si, 7700h 0x00000012 push 00000000h 0x00000014 add dword ptr [ebp+122D291Eh], esi 0x0000001a push 00000000h 0x0000001c mov dword ptr [ebp+122D25B1h], esi 0x00000022 xchg eax, ebx 0x00000023 jmp 00007F9984B08D18h 0x00000028 push eax 0x00000029 pushad 0x0000002a push eax 0x0000002b push edx 0x0000002c push ecx 0x0000002d pop ecx 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A162A2 second address: A162A9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A171EB second address: A171FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 jl 00007F9984B08D0Ch 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A17385 second address: A173A2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F998484EB19h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A1839D second address: A183A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A173A2 second address: A173B1 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A19232 second address: A19236 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A183A3 second address: A183A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A173B1 second address: A173B7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A19236 second address: A19296 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push 00000000h 0x0000000e push edi 0x0000000f call 00007F998484EB08h 0x00000014 pop edi 0x00000015 mov dword ptr [esp+04h], edi 0x00000019 add dword ptr [esp+04h], 00000017h 0x00000021 inc edi 0x00000022 push edi 0x00000023 ret 0x00000024 pop edi 0x00000025 ret 0x00000026 call 00007F998484EB0Ah 0x0000002b mov dword ptr [ebp+122D1ED8h], edx 0x00000031 pop ebx 0x00000032 and di, B561h 0x00000037 push 00000000h 0x00000039 push edi 0x0000003a mov dword ptr [ebp+1244FCACh], ebx 0x00000040 pop edi 0x00000041 push eax 0x00000042 push eax 0x00000043 push edx 0x00000044 push edx 0x00000045 jmp 00007F998484EB10h 0x0000004a pop edx 0x0000004b rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A183A8 second address: A183B2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007F9984B08D06h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A173B7 second address: A173BD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A183B2 second address: A18457 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F9984B08D0Fh 0x0000000e nop 0x0000000f xor edi, 16A3F060h 0x00000015 push dword ptr fs:[00000000h] 0x0000001c add edi, dword ptr [ebp+122D2B54h] 0x00000022 mov dword ptr fs:[00000000h], esp 0x00000029 movsx ebx, cx 0x0000002c mov eax, dword ptr [ebp+122D00A9h] 0x00000032 push 00000000h 0x00000034 push ecx 0x00000035 call 00007F9984B08D08h 0x0000003a pop ecx 0x0000003b mov dword ptr [esp+04h], ecx 0x0000003f add dword ptr [esp+04h], 00000017h 0x00000047 inc ecx 0x00000048 push ecx 0x00000049 ret 0x0000004a pop ecx 0x0000004b ret 0x0000004c mov edi, 2B1730EDh 0x00000051 jmp 00007F9984B08D0Bh 0x00000056 push FFFFFFFFh 0x00000058 push 00000000h 0x0000005a push ebx 0x0000005b call 00007F9984B08D08h 0x00000060 pop ebx 0x00000061 mov dword ptr [esp+04h], ebx 0x00000065 add dword ptr [esp+04h], 00000017h 0x0000006d inc ebx 0x0000006e push ebx 0x0000006f ret 0x00000070 pop ebx 0x00000071 ret 0x00000072 jmp 00007F9984B08D0Eh 0x00000077 push eax 0x00000078 push eax 0x00000079 push edx 0x0000007a jno 00007F9984B08D08h 0x00000080 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A1A3A1 second address: A1A3A7 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A1A3A7 second address: A1A3AC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A1B3B3 second address: A1B3B9 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A1C3DC second address: A1C3ED instructions: 0x00000000 rdtsc 0x00000002 ja 00007F9984B08D08h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A1B3B9 second address: A1B3C3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007F998484EB06h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A1A4CC second address: A1A4D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A1F335 second address: A1F339 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A1F339 second address: A1F33F instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A1F33F second address: A1F349 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F998484EB0Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A1F349 second address: A1F3C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jmp 00007F9984B08D0Fh 0x0000000c nop 0x0000000d push 00000000h 0x0000000f push ebx 0x00000010 call 00007F9984B08D08h 0x00000015 pop ebx 0x00000016 mov dword ptr [esp+04h], ebx 0x0000001a add dword ptr [esp+04h], 00000014h 0x00000022 inc ebx 0x00000023 push ebx 0x00000024 ret 0x00000025 pop ebx 0x00000026 ret 0x00000027 mov dword ptr [ebp+122D248Dh], ebx 0x0000002d push 00000000h 0x0000002f or dword ptr [ebp+12450314h], ecx 0x00000035 push 00000000h 0x00000037 push 00000000h 0x00000039 push edx 0x0000003a call 00007F9984B08D08h 0x0000003f pop edx 0x00000040 mov dword ptr [esp+04h], edx 0x00000044 add dword ptr [esp+04h], 00000016h 0x0000004c inc edx 0x0000004d push edx 0x0000004e ret 0x0000004f pop edx 0x00000050 ret 0x00000051 add dword ptr [ebp+122D1E64h], ecx 0x00000057 mov dword ptr [ebp+122DB82Fh], ebx 0x0000005d xchg eax, esi 0x0000005e push eax 0x0000005f push edx 0x00000060 jmp 00007F9984B08D0Bh 0x00000065 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A1F3C4 second address: A1F3EF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F998484EB0Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007F998484EB0Fh 0x00000013 popad 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A1F3EF second address: A1F3F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A1F572 second address: A1F577 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A214A3 second address: A214A8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A214A8 second address: A214AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A214AE second address: A21505 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push 00000000h 0x0000000c push edi 0x0000000d call 00007F9984B08D08h 0x00000012 pop edi 0x00000013 mov dword ptr [esp+04h], edi 0x00000017 add dword ptr [esp+04h], 00000014h 0x0000001f inc edi 0x00000020 push edi 0x00000021 ret 0x00000022 pop edi 0x00000023 ret 0x00000024 or dword ptr [ebp+1244FB54h], eax 0x0000002a mov dword ptr [ebp+122D1E58h], ecx 0x00000030 push 00000000h 0x00000032 mov dword ptr [ebp+12462344h], esi 0x00000038 push eax 0x00000039 push eax 0x0000003a push edx 0x0000003b pushad 0x0000003c jmp 00007F9984B08D12h 0x00000041 jp 00007F9984B08D06h 0x00000047 popad 0x00000048 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A21505 second address: A2150F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnl 00007F998484EB06h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A2067A second address: A20693 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9984B08D15h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A22443 second address: A22449 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A22449 second address: A2244D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A2244D second address: A22451 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A22451 second address: A224A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b push 00000000h 0x0000000d push esi 0x0000000e call 00007F9984B08D08h 0x00000013 pop esi 0x00000014 mov dword ptr [esp+04h], esi 0x00000018 add dword ptr [esp+04h], 0000001Dh 0x00000020 inc esi 0x00000021 push esi 0x00000022 ret 0x00000023 pop esi 0x00000024 ret 0x00000025 push 00000000h 0x00000027 jp 00007F9984B08D0Eh 0x0000002d jnc 00007F9984B08D0Ch 0x00000033 push 00000000h 0x00000035 mov bx, dx 0x00000038 xchg eax, esi 0x00000039 push eax 0x0000003a push edx 0x0000003b push edi 0x0000003c push eax 0x0000003d push edx 0x0000003e rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A224A8 second address: A224AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A224AD second address: A224CD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9984B08D12h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d jno 00007F9984B08D06h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A24D03 second address: A24D07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A24D07 second address: A24D87 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 jmp 00007F9984B08D0Fh 0x0000000c pop edi 0x0000000d popad 0x0000000e mov dword ptr [esp], eax 0x00000011 sub bx, C267h 0x00000016 push 00000000h 0x00000018 sub dword ptr [ebp+1245522Ah], ecx 0x0000001e push 00000000h 0x00000020 call 00007F9984B08D18h 0x00000025 add edi, dword ptr [ebp+122D2C40h] 0x0000002b pop edi 0x0000002c xchg eax, esi 0x0000002d pushad 0x0000002e jmp 00007F9984B08D13h 0x00000033 pushad 0x00000034 jp 00007F9984B08D06h 0x0000003a jmp 00007F9984B08D0Ch 0x0000003f popad 0x00000040 popad 0x00000041 push eax 0x00000042 push eax 0x00000043 push edx 0x00000044 jmp 00007F9984B08D0Ah 0x00000049 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A24D87 second address: A24D97 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F998484EB0Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A25CAC second address: A25CB0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A25CB0 second address: A25CC6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 je 00007F998484EB06h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A25CC6 second address: A25D24 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9984B08D17h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a nop 0x0000000b pushad 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e jg 00007F9984B08D09h 0x00000014 popad 0x00000015 push 00000000h 0x00000017 mov ebx, dword ptr [ebp+122D2B48h] 0x0000001d push 00000000h 0x0000001f push 00000000h 0x00000021 push esi 0x00000022 call 00007F9984B08D08h 0x00000027 pop esi 0x00000028 mov dword ptr [esp+04h], esi 0x0000002c add dword ptr [esp+04h], 00000015h 0x00000034 inc esi 0x00000035 push esi 0x00000036 ret 0x00000037 pop esi 0x00000038 ret 0x00000039 mov edi, dword ptr [ebp+122D25CAh] 0x0000003f push eax 0x00000040 push eax 0x00000041 push edx 0x00000042 push edx 0x00000043 push edx 0x00000044 pop edx 0x00000045 pop edx 0x00000046 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A24F9F second address: A24FAF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop eax 0x00000006 push eax 0x00000007 ja 00007F998484EB10h 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A26D43 second address: A26D5A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F9984B08D0Ch 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A26D5A second address: A26D5E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A26D5E second address: A26D64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A2E9F4 second address: A2E9FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A2E9FE second address: A2EA18 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9984B08D0Dh 0x00000009 pop edx 0x0000000a jng 00007F9984B08D0Ch 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A2EA18 second address: A2EA46 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F998484EB17h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F998484EB0Eh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A2EA46 second address: A2EA56 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9984B08D0Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A2EA56 second address: A2EA68 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F998484EB0Ch 0x00000008 jc 00007F998484EB06h 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A2EA68 second address: A2EA6C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A30043 second address: A3006A instructions: 0x00000000 rdtsc 0x00000002 jng 00007F998484EB06h 0x00000008 jbe 00007F998484EB06h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 jl 00007F998484EB06h 0x0000001a push ecx 0x0000001b pop ecx 0x0000001c popad 0x0000001d pushad 0x0000001e jno 00007F998484EB06h 0x00000024 push eax 0x00000025 pop eax 0x00000026 popad 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A33E46 second address: A33E55 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F9984B08D06h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A34105 second address: A34109 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A34109 second address: A34118 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jp 00007F9984B08D06h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A34118 second address: A34120 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A34120 second address: A3413A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 popad 0x00000006 pushad 0x00000007 pushad 0x00000008 jns 00007F9984B08D06h 0x0000000e jnc 00007F9984B08D06h 0x00000014 pushad 0x00000015 popad 0x00000016 popad 0x00000017 push ebx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A38900 second address: A38926 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F998484EB18h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push ecx 0x0000000b jl 00007F998484EB0Ch 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A38926 second address: A38935 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 mov eax, dword ptr [esp+04h] 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A38935 second address: A3893B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A38B40 second address: A38B59 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push ebx 0x00000006 pushad 0x00000007 popad 0x00000008 pop ebx 0x00000009 popad 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jg 00007F9984B08D0Ch 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A38B59 second address: A38B87 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F998484EB10h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d jmp 00007F998484EB10h 0x00000012 mov eax, dword ptr [eax] 0x00000014 push esi 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A38B87 second address: A38BA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9984B08D0Ch 0x00000009 popad 0x0000000a pop esi 0x0000000b mov dword ptr [esp+04h], eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jno 00007F9984B08D08h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A3D678 second address: A3D68D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 ja 00007F998484EB12h 0x0000000d jnl 00007F998484EB06h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A3D68D second address: A3D691 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A3DD6D second address: A3DD75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A3DD75 second address: A3DD8A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F9984B08D0Eh 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A3DD8A second address: A3DDA6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F998484EB16h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A3DDA6 second address: A3DDCD instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F9984B08D08h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d jmp 00007F9984B08D16h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A3DDCD second address: A3DDF6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F998484EB14h 0x00000009 popad 0x0000000a jmp 00007F998484EB10h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A3DF5D second address: A3DF61 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A3DF61 second address: A3DF79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F998484EB10h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A3DF79 second address: A3DF97 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pushad 0x00000009 jmp 00007F9984B08D0Dh 0x0000000e je 00007F9984B08D06h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A3E3A1 second address: A3E3CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edi 0x00000007 jp 00007F998484EB1Dh 0x0000000d push eax 0x0000000e push edx 0x0000000f jnp 00007F998484EB06h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A3E3CD second address: A3E417 instructions: 0x00000000 rdtsc 0x00000002 js 00007F9984B08D06h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 popad 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 push esi 0x00000018 jbe 00007F9984B08D06h 0x0000001e jmp 00007F9984B08D0Eh 0x00000023 pop esi 0x00000024 jng 00007F9984B08D1Dh 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A3E7CC second address: A3E7E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F998484EB0Eh 0x0000000a push eax 0x0000000b push edx 0x0000000c jg 00007F998484EB06h 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A4310B second address: A4311F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c js 00007F9984B08D0Ch 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A4311F second address: A43123 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A42AB4 second address: A42ADA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F9984B08D06h 0x0000000a jmp 00007F9984B08D0Dh 0x0000000f popad 0x00000010 jp 00007F9984B08D0Eh 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A42ADA second address: A42AF0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F998484EB12h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A42AF0 second address: A42B16 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jmp 00007F9984B08D18h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push edi 0x00000010 pushad 0x00000011 popad 0x00000012 pop edi 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A42B16 second address: A42B1B instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A43917 second address: A43936 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F9984B08D06h 0x0000000a jmp 00007F9984B08D13h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A43936 second address: A4393B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A4393B second address: A43954 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9984B08D12h 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A43954 second address: A4395A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A4395A second address: A43968 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A43968 second address: A4396C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A4396C second address: A43972 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A43AB6 second address: A43B13 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F998484EB16h 0x00000008 jmp 00007F998484EB0Ah 0x0000000d jnl 00007F998484EB06h 0x00000013 jmp 00007F998484EB15h 0x00000018 pop edx 0x00000019 pop eax 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d pushad 0x0000001e popad 0x0000001f jmp 00007F998484EB17h 0x00000024 jmp 00007F998484EB0Bh 0x00000029 popad 0x0000002a push eax 0x0000002b push edx 0x0000002c push esi 0x0000002d pop esi 0x0000002e push eax 0x0000002f push edx 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A43B13 second address: A43B17 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A43B17 second address: A43B1D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A43B1D second address: A43B27 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F9984B08D0Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A08C8D second address: A08C91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A08C91 second address: A08C95 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A08C95 second address: A08C9B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A08C9B second address: A08CB8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9984B08D0Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b push eax 0x0000000c push edx 0x0000000d jnp 00007F9984B08D08h 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A08F0A second address: A08F2C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edi 0x00000004 pop edi 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a jmp 00007F998484EB13h 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A08F2C second address: A08F3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 mov eax, dword ptr [esp+04h] 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A08F3D second address: A08F42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A08F42 second address: A08F6E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jnp 00007F9984B08D06h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e mov eax, dword ptr [eax] 0x00000010 jmp 00007F9984B08D0Ah 0x00000015 mov dword ptr [esp+04h], eax 0x00000019 push eax 0x0000001a push edx 0x0000001b ja 00007F9984B08D0Ch 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A09133 second address: A0913D instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A0913D second address: A09176 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push esi 0x00000009 jc 00007F9984B08D0Ch 0x0000000f jnp 00007F9984B08D06h 0x00000015 pop esi 0x00000016 nop 0x00000017 jng 00007F9984B08D0Ch 0x0000001d mov dword ptr [ebp+122D383Ch], edi 0x00000023 push 00000004h 0x00000025 mov cl, 69h 0x00000027 nop 0x00000028 pushad 0x00000029 jne 00007F9984B08D0Ch 0x0000002f push eax 0x00000030 push edx 0x00000031 push eax 0x00000032 push edx 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A09176 second address: A0917A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A0917A second address: A0918E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F9984B08D0Ah 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A0918E second address: A09198 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007F998484EB06h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A094BD second address: A094C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A095A9 second address: A095B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A095B0 second address: A095D5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9984B08D0Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jns 00007F9984B08D12h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A095D5 second address: A095DB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A097BA second address: A097C1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9F132C second address: 9F1347 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F998484EB16h 0x00000008 push ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9F1347 second address: 9F1378 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9984B08D0Dh 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push edx 0x0000000f jmp 00007F9984B08D19h 0x00000014 pop edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9C1511 second address: 9C1532 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jns 00007F998484EB16h 0x0000000b popad 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9C1532 second address: 9C1536 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A48A06 second address: A48A2E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F998484EB06h 0x0000000a popad 0x0000000b ja 00007F998484EB1Ah 0x00000011 push esi 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A48CD7 second address: A48CDD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A48F76 second address: A48F7A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A48F7A second address: A48F8E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F9984B08D0Eh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A490E7 second address: A490F3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jc 00007F998484EB06h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A4F1D6 second address: A4F1F7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9984B08D18h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A4F1F7 second address: A4F206 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop ebx 0x00000007 jl 00007F998484EB08h 0x0000000d push edi 0x0000000e pop edi 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A4F206 second address: A4F221 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F9984B08D14h 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A4F221 second address: A4F23D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F998484EB13h 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9C4B70 second address: 9C4B7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 ja 00007F9984B08D06h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9C4B7D second address: 9C4B81 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A4DC70 second address: A4DC89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push edx 0x00000007 pop edx 0x00000008 popad 0x00000009 pushad 0x0000000a jmp 00007F9984B08D0Dh 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A4E080 second address: A4E097 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F998484EB0Fh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A4E097 second address: A4E0AD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9984B08D12h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A4E681 second address: A4E691 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 popad 0x00000009 pop ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A4E691 second address: A4E6AF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9984B08D14h 0x00000007 jnc 00007F9984B08D06h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A4E817 second address: A4E81D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A4D93A second address: A4D93F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A56839 second address: A5683D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A5683D second address: A56868 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 push eax 0x00000008 pushad 0x00000009 push edx 0x0000000a pop edx 0x0000000b jmp 00007F9984B08D15h 0x00000010 je 00007F9984B08D06h 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A56868 second address: A56872 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F998484EB06h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A59350 second address: A59360 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007F9984B08D06h 0x0000000a jo 00007F9984B08D06h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A59503 second address: A5950D instructions: 0x00000000 rdtsc 0x00000002 ja 00007F998484EB12h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A5CF63 second address: A5CF67 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A5CF67 second address: A5CF6D instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A5CF6D second address: A5CFA2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 jmp 00007F9984B08D17h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F9984B08D10h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A5CFA2 second address: A5CFA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A5CFA6 second address: A5CFAE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A5CFAE second address: A5CFB4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A5D0E1 second address: A5D101 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F9984B08D19h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A5D101 second address: A5D105 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A5D105 second address: A5D126 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9984B08D17h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A5D126 second address: A5D12A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A5EA50 second address: A5EA64 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9984B08D10h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A5EA64 second address: A5EA99 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F998484EB17h 0x0000000b jmp 00007F998484EB0Eh 0x00000010 popad 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 jnc 00007F998484EB06h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A62CE4 second address: A62CFF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9984B08D15h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A62CFF second address: A62D04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A62D04 second address: A62D17 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F9984B08D0Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A62D17 second address: A62D1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A632C8 second address: A632D2 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A632D2 second address: A632F9 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F998484EB06h 0x00000008 jmp 00007F998484EB15h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jbe 00007F998484EB0Ch 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A63424 second address: A63439 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F9984B08D0Dh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A63439 second address: A63444 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A63581 second address: A6359B instructions: 0x00000000 rdtsc 0x00000002 jc 00007F9984B08D08h 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F9984B08D0Eh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A6359B second address: A635B8 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 ja 00007F998484EB06h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push ecx 0x0000000f push eax 0x00000010 push edx 0x00000011 jbe 00007F998484EB06h 0x00000017 jo 00007F998484EB06h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A635B8 second address: A635C2 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F9984B08D06h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A669D5 second address: A669DA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A66173 second address: A66177 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A6644C second address: A66452 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A66452 second address: A6645C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A6672B second address: A66735 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F998484EB06h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9CB32B second address: 9CB331 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9CB331 second address: 9CB335 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9CB335 second address: 9CB339 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9CB339 second address: 9CB342 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A6AEEA second address: A6AEF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ebx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A6AEF1 second address: A6AF01 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F998484EB0Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A6B466 second address: A6B480 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F9984B08D0Ch 0x00000008 jg 00007F9984B08D06h 0x0000000e push edi 0x0000000f pushad 0x00000010 popad 0x00000011 push esi 0x00000012 pop esi 0x00000013 pop edi 0x00000014 pop edx 0x00000015 pop eax 0x00000016 push eax 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A6B5B9 second address: A6B5BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A6B5BD second address: A6B5C7 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A6B5C7 second address: A6B5CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A6B5CB second address: A6B5D1 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A6B5D1 second address: A6B5D6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A6B5D6 second address: A6B609 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9984B08D10h 0x00000009 jmp 00007F9984B08D14h 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 jno 00007F9984B08D06h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A6B609 second address: A6B634 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F998484EB0Ah 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 jmp 00007F998484EB0Dh 0x00000015 push ebx 0x00000016 pop ebx 0x00000017 push ecx 0x00000018 pop ecx 0x00000019 popad 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d popad 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A6B634 second address: A6B63C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A6B90B second address: A6B90F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A6B90F second address: A6B93F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F9984B08D0Eh 0x0000000e jmp 00007F9984B08D18h 0x00000013 pop eax 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A6B93F second address: A6B95C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F998484EB0Fh 0x00000008 push edi 0x00000009 pop edi 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jnp 00007F998484EB06h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A6C3A3 second address: A6C3A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A6C3A9 second address: A6C3B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 pushad 0x00000007 popad 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A756A4 second address: A756AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F9984B08D06h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A756AF second address: A756B4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A756B4 second address: A756BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A737AB second address: A737B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ecx 0x00000007 push esi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A73DA9 second address: A73DAD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A745CC second address: A745E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 push esi 0x00000007 pop esi 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f jg 00007F998484EB06h 0x00000015 pushad 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A745E5 second address: A745EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A74B4F second address: A74B75 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F998484EB06h 0x00000008 jmp 00007F998484EB19h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A74B75 second address: A74B7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A75404 second address: A75448 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F998484EB15h 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e jnp 00007F998484EB06h 0x00000014 popad 0x00000015 popad 0x00000016 pushad 0x00000017 jmp 00007F998484EB15h 0x0000001c jg 00007F998484EB0Eh 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A75448 second address: A75453 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A79FBB second address: A79FCC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnc 00007F998484EB06h 0x00000009 jnp 00007F998484EB06h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A7D222 second address: A7D228 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A7D228 second address: A7D22F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A7D3C7 second address: A7D3E3 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F9984B08D06h 0x00000008 jmp 00007F9984B08D0Eh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A7D3E3 second address: A7D3E7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A7D3E7 second address: A7D40F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F9984B08D06h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop esi 0x0000000d push ebx 0x0000000e jmp 00007F9984B08D17h 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A7D40F second address: A7D415 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A7D415 second address: A7D41B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A7D56E second address: A7D58E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 jmp 00007F998484EB19h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A7D58E second address: A7D5AD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F9984B08D19h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A7D5AD second address: A7D5C4 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F998484EB06h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jns 00007F998484EB06h 0x00000015 push eax 0x00000016 pop eax 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A7D883 second address: A7D889 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A7D889 second address: A7D88D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A7D88D second address: A7D896 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A7DB7C second address: A7DB84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A7DB84 second address: A7DB88 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A7DCCE second address: A7DD02 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F998484EB06h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push esi 0x0000000c pop esi 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 push esi 0x00000013 push edx 0x00000014 pop edx 0x00000015 pop esi 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 jp 00007F998484EB1Bh 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A7DD02 second address: A7DD25 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9984B08D19h 0x00000007 jns 00007F9984B08D25h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9D0348 second address: 9D0356 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F998484EB06h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 9D0356 second address: 9D035A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A89A7F second address: A89A89 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F998484EB06h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A89A89 second address: A89A8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A89A8F second address: A89A9C instructions: 0x00000000 rdtsc 0x00000002 ja 00007F998484EB08h 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A89A9C second address: A89AB4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9984B08D12h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A87B17 second address: A87B24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push ecx 0x00000006 pushad 0x00000007 popad 0x00000008 pop ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A87B24 second address: A87B3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9984B08D16h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A87C97 second address: A87CB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F998484EB10h 0x00000009 popad 0x0000000a jmp 00007F998484EB0Ah 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A87CB6 second address: A87CF0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9984B08D0Ah 0x00000007 jmp 00007F9984B08D14h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jnl 00007F9984B08D0Ah 0x00000016 push ebx 0x00000017 pop ebx 0x00000018 pushad 0x00000019 popad 0x0000001a jng 00007F9984B08D0Ch 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A87CF0 second address: A87D11 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F998484EB11h 0x00000007 push eax 0x00000008 push edx 0x00000009 jnl 00007F998484EB06h 0x0000000f jns 00007F998484EB06h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A8810D second address: A88111 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A88111 second address: A88139 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F998484EB0Ah 0x00000007 jmp 00007F998484EB14h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pop edi 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A88139 second address: A8813D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A8813D second address: A88141 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A88141 second address: A8814F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jg 00007F9984B08D06h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A8845A second address: A8845F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A8845F second address: A88467 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A88766 second address: A8879C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F998484EB18h 0x00000009 pop ebx 0x0000000a jmp 00007F998484EB19h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A8879C second address: A887A1 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A888C8 second address: A888CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A88AAC second address: A88AB0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A88AB0 second address: A88ABB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A898BE second address: A898C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A898C2 second address: A898C6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A898C6 second address: A898CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A9010E second address: A90114 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A9B0FF second address: A9B10C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jns 00007F9984B08D06h 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A9DB72 second address: A9DB89 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F998484EB06h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop esi 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e push esi 0x0000000f pop esi 0x00000010 je 00007F998484EB06h 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A9DB89 second address: A9DB8E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A9DB8E second address: A9DBBC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F998484EB06h 0x0000000a jmp 00007F998484EB13h 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F998484EB0Ch 0x00000017 push ebx 0x00000018 pop ebx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AA86D7 second address: AA86DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AAD22C second address: AAD248 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jno 00007F998484EB06h 0x0000000e jmp 00007F998484EB0Eh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AAD248 second address: AAD270 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jno 00007F9984B08D19h 0x0000000c pushad 0x0000000d jg 00007F9984B08D06h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AAD098 second address: AAD0A2 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F998484EB06h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AAD0A2 second address: AAD0A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AAD0A8 second address: AAD0D8 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F998484EB0Eh 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a jne 00007F998484EB06h 0x00000010 pushad 0x00000011 jmp 00007F998484EB11h 0x00000016 jmp 00007F998484EB0Ch 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AB187A second address: AB1880 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AB1880 second address: AB18A4 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F998484EB1Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AB18A4 second address: AB18A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AB18A8 second address: AB18AC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: ABAF33 second address: ABAF3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: ABAF3E second address: ABAF88 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F998484EB17h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F998484EB14h 0x0000000e push eax 0x0000000f jmp 00007F998484EB14h 0x00000014 pop eax 0x00000015 popad 0x00000016 push ebx 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: ABAF88 second address: ABAF8E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AB9A75 second address: AB9A7A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AB9A7A second address: AB9A81 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AB9D24 second address: AB9D28 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AB9D28 second address: AB9D63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F9984B08D06h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c popad 0x0000000d push edi 0x0000000e jns 00007F9984B08D0Ch 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F9984B08D10h 0x0000001b jmp 00007F9984B08D0Fh 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: ABC614 second address: ABC632 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F998484EB19h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: ABC632 second address: ABC642 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F9984B08D12h 0x00000008 jl 00007F9984B08D06h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: ACCC8D second address: ACCC99 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F998484EB06h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: ACE3FF second address: ACE404 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: ACE404 second address: ACE40A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AD2317 second address: AD2327 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F9984B08D0Bh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: ADF5A7 second address: ADF5B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F998484EB06h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: ADF5B3 second address: ADF5CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F9984B08D11h 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: ADF5CF second address: ADF5FD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 jmp 00007F998484EB0Bh 0x0000000c jmp 00007F998484EB17h 0x00000011 pop edx 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 pop eax 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: ADF162 second address: ADF183 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9984B08D10h 0x00000009 pop edi 0x0000000a jng 00007F9984B08D08h 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: ADF183 second address: ADF189 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AF5F21 second address: AF5F27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AF607C second address: AF6080 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AF6080 second address: AF609C instructions: 0x00000000 rdtsc 0x00000002 jno 00007F9984B08D06h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e pop eax 0x0000000f jmp 00007F9984B08D0Ah 0x00000014 pushad 0x00000015 popad 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AF609C second address: AF60D3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F998484EB16h 0x00000007 push ecx 0x00000008 pushad 0x00000009 popad 0x0000000a pop ecx 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F998484EB17h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AF6225 second address: AF622B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AF650D second address: AF6523 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F998484EB12h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AF67ED second address: AF67F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AF6943 second address: AF6961 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F998484EB15h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AFAE79 second address: AFAE83 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F9984B08D06h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AFAE83 second address: AFAE9F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F998484EB17h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AFB188 second address: AFB18C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AFB18C second address: AFB190 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AFB288 second address: AFB28C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AFB28C second address: AFB2C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp], eax 0x00000009 jnp 00007F998484EB0Bh 0x0000000f adc dx, 7244h 0x00000014 push 00000004h 0x00000016 sub dword ptr [ebp+122D2F31h], ecx 0x0000001c and dx, 7F39h 0x00000021 call 00007F998484EB09h 0x00000026 push eax 0x00000027 push edx 0x00000028 jmp 00007F998484EB0Ah 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AFB2C2 second address: AFB2D7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9984B08D11h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AFB2D7 second address: AFB305 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F998484EB15h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push ecx 0x0000000f jmp 00007F998484EB0Eh 0x00000014 pop ecx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AFB305 second address: AFB326 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c jmp 00007F9984B08D0Fh 0x00000011 mov eax, dword ptr [eax] 0x00000013 pushad 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AFD08E second address: AFD09E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jp 00007F998484EB06h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e push edi 0x0000000f pop edi 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AFCBE9 second address: AFCBFB instructions: 0x00000000 rdtsc 0x00000002 jc 00007F9984B08D06h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jno 00007F9984B08D1Eh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AFEBEE second address: AFEBF2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AFEBF2 second address: AFEBF8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AFEBF8 second address: AFEC17 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F998484EB19h 0x00000007 push eax 0x00000008 push edx 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: AFEC17 second address: AFEC1B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A0E2B6 second address: A0E2BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A0E2BA second address: A0E2BE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A0E2BE second address: A0E2C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A0E2C4 second address: A0E2CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jo 00007F9984B08D06h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A0E2CE second address: A0E2D2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: A0E2D2 second address: A0E2E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jnp 00007F9984B08D08h 0x00000011 push edi 0x00000012 pop edi 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49F07DE second address: 49F08AE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov di, AEF2h 0x00000007 mov dh, C8h 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov ebp, esp 0x0000000e jmp 00007F998484EB12h 0x00000013 xchg eax, ecx 0x00000014 pushad 0x00000015 pushad 0x00000016 pushfd 0x00000017 jmp 00007F998484EB0Ch 0x0000001c add esi, 699CBD38h 0x00000022 jmp 00007F998484EB0Bh 0x00000027 popfd 0x00000028 pushad 0x00000029 popad 0x0000002a popad 0x0000002b pushfd 0x0000002c jmp 00007F998484EB16h 0x00000031 and eax, 42FF3798h 0x00000037 jmp 00007F998484EB0Bh 0x0000003c popfd 0x0000003d popad 0x0000003e push eax 0x0000003f jmp 00007F998484EB19h 0x00000044 xchg eax, ecx 0x00000045 pushad 0x00000046 mov si, B4D3h 0x0000004a pushfd 0x0000004b jmp 00007F998484EB18h 0x00000050 sbb ch, 00000058h 0x00000053 jmp 00007F998484EB0Bh 0x00000058 popfd 0x00000059 popad 0x0000005a xchg eax, esi 0x0000005b push eax 0x0000005c push edx 0x0000005d jmp 00007F998484EB15h 0x00000062 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49F08AE second address: 49F08DC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ebx, 11CAED82h 0x00000008 jmp 00007F9984B08D13h 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007F9984B08D0Bh 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49F08DC second address: 49F08F9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F998484EB19h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49F08F9 second address: 49F0909 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9984B08D0Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49F0909 second address: 49F090D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49F090D second address: 49F0935 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, esi 0x00000009 pushad 0x0000000a mov ebx, 38C59EC0h 0x0000000f mov di, E6ECh 0x00000013 popad 0x00000014 lea eax, dword ptr [ebp-04h] 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007F9984B08D0Dh 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49F0935 second address: 49F094A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F998484EB11h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49F094A second address: 49F0950 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49F0950 second address: 49F0954 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49F0954 second address: 49F096A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F9984B08D0Bh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49F0AC5 second address: 49F0AC9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49F0AC9 second address: 49F0ACF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49F0ACF second address: 49F0AFD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F998484EB10h 0x00000008 push esi 0x00000009 pop edx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d leave 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F998484EB13h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49F0AFD second address: 49E0016 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9984B08D19h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 retn 0004h 0x0000000c nop 0x0000000d cmp eax, 00000000h 0x00000010 setne al 0x00000013 xor ebx, ebx 0x00000015 test al, 01h 0x00000017 jne 00007F9984B08D07h 0x00000019 sub esp, 04h 0x0000001c mov dword ptr [esp], 0000000Dh 0x00000023 call 00007F9988CB81C7h 0x00000028 mov edi, edi 0x0000002a jmp 00007F9984B08D0Eh 0x0000002f xchg eax, ebp 0x00000030 push eax 0x00000031 push edx 0x00000032 pushad 0x00000033 push eax 0x00000034 push edx 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49E0016 second address: 49E001B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49E001B second address: 49E002A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9984B08D0Bh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49E0187 second address: 49E0193 instructions: 0x00000000 rdtsc 0x00000002 movzx eax, bx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 mov cx, di 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49E0193 second address: 49E022C instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F9984B08D0Fh 0x00000008 sbb ah, 0000000Eh 0x0000000b jmp 00007F9984B08D19h 0x00000010 popfd 0x00000011 pop edx 0x00000012 pop eax 0x00000013 popad 0x00000014 sub edi, edi 0x00000016 jmp 00007F9984B08D17h 0x0000001b inc ebx 0x0000001c jmp 00007F9984B08D16h 0x00000021 test al, al 0x00000023 push eax 0x00000024 push edx 0x00000025 pushad 0x00000026 pushfd 0x00000027 jmp 00007F9984B08D19h 0x0000002c xor si, B406h 0x00000031 jmp 00007F9984B08D11h 0x00000036 popfd 0x00000037 popad 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49E022C second address: 49E0232 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49E0232 second address: 49E0259 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9984B08D13h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b je 00007F9984B08F8Fh 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 mov ax, bx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49E0259 second address: 49E025E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49E025E second address: 49E027B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9984B08D19h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49E027B second address: 49E027F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49E027F second address: 49E02A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 lea ecx, dword ptr [ebp-14h] 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F9984B08D18h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49E0331 second address: 49E034F instructions: 0x00000000 rdtsc 0x00000002 mov eax, 46101DEFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a nop 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F998484EB11h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49E034F second address: 49E0375 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop eax 0x00000005 mov ch, bh 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F9984B08D17h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49E0375 second address: 49E0379 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49E0379 second address: 49E037F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49E037F second address: 49E03BE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F998484EB12h 0x00000009 adc cx, E8D8h 0x0000000e jmp 00007F998484EB0Bh 0x00000013 popfd 0x00000014 pushad 0x00000015 popad 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 nop 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007F998484EB0Eh 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49E03BE second address: 49E03CD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9984B08D0Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49E040A second address: 49E04F4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F998484EB12h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test eax, eax 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007F998484EB0Eh 0x00000012 or cx, 3258h 0x00000017 jmp 00007F998484EB0Bh 0x0000001c popfd 0x0000001d mov bx, cx 0x00000020 popad 0x00000021 jg 00007F99F5A8CB4Bh 0x00000027 jmp 00007F998484EB12h 0x0000002c js 00007F998484EB7Bh 0x00000032 jmp 00007F998484EB10h 0x00000037 cmp dword ptr [ebp-14h], edi 0x0000003a jmp 00007F998484EB10h 0x0000003f jne 00007F99F5A8CB19h 0x00000045 pushad 0x00000046 pushfd 0x00000047 jmp 00007F998484EB0Eh 0x0000004c sbb si, 5648h 0x00000051 jmp 00007F998484EB0Bh 0x00000056 popfd 0x00000057 pushfd 0x00000058 jmp 00007F998484EB18h 0x0000005d adc ax, 98A8h 0x00000062 jmp 00007F998484EB0Bh 0x00000067 popfd 0x00000068 popad 0x00000069 mov ebx, dword ptr [ebp+08h] 0x0000006c push eax 0x0000006d push edx 0x0000006e jmp 00007F998484EB15h 0x00000073 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49E04F4 second address: 49E0504 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9984B08D0Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49E0504 second address: 49E0560 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 lea eax, dword ptr [ebp-2Ch] 0x0000000b jmp 00007F998484EB17h 0x00000010 xchg eax, esi 0x00000011 pushad 0x00000012 jmp 00007F998484EB14h 0x00000017 jmp 00007F998484EB12h 0x0000001c popad 0x0000001d push eax 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007F998484EB0Eh 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49E0560 second address: 49E0572 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9984B08D0Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49E0572 second address: 49E058A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F998484EB0Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, esi 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49E058A second address: 49E05A5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9984B08D17h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49E05A5 second address: 49E0635 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F998484EB19h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a pushad 0x0000000b mov ax, DD73h 0x0000000f jmp 00007F998484EB18h 0x00000014 popad 0x00000015 push eax 0x00000016 pushad 0x00000017 mov bh, E0h 0x00000019 mov dl, cl 0x0000001b popad 0x0000001c nop 0x0000001d jmp 00007F998484EB15h 0x00000022 xchg eax, ebx 0x00000023 push eax 0x00000024 push edx 0x00000025 pushad 0x00000026 mov eax, edx 0x00000028 pushfd 0x00000029 jmp 00007F998484EB0Fh 0x0000002e xor esi, 119C399Eh 0x00000034 jmp 00007F998484EB19h 0x00000039 popfd 0x0000003a popad 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49E0635 second address: 49E0645 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9984B08D0Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49E0645 second address: 49E0649 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49E0689 second address: 49E068F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49E068F second address: 49E0693 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49E0693 second address: 49E0697 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49E0697 second address: 49E06D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov esi, eax 0x0000000a jmp 00007F998484EB17h 0x0000000f test esi, esi 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 call 00007F998484EB12h 0x00000019 pop ecx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49E06D0 second address: 49D0E0F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9984B08D0Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushfd 0x0000000a jmp 00007F9984B08D18h 0x0000000f or esi, 3E81FC48h 0x00000015 jmp 00007F9984B08D0Bh 0x0000001a popfd 0x0000001b popad 0x0000001c je 00007F99F5D46C50h 0x00000022 xor eax, eax 0x00000024 jmp 00007F9984AE243Ah 0x00000029 pop esi 0x0000002a pop edi 0x0000002b pop ebx 0x0000002c leave 0x0000002d retn 0004h 0x00000030 nop 0x00000031 cmp eax, 00000000h 0x00000034 setne cl 0x00000037 xor ebx, ebx 0x00000039 test cl, 00000001h 0x0000003c jne 00007F9984B08D07h 0x0000003e jmp 00007F9984B08E43h 0x00000043 call 00007F9988CA8E22h 0x00000048 mov edi, edi 0x0000004a jmp 00007F9984B08D14h 0x0000004f xchg eax, ebp 0x00000050 pushad 0x00000051 mov ax, ABCDh 0x00000055 movzx esi, dx 0x00000058 popad 0x00000059 push eax 0x0000005a push eax 0x0000005b push edx 0x0000005c pushad 0x0000005d pushfd 0x0000005e jmp 00007F9984B08D11h 0x00000063 sub cx, 6856h 0x00000068 jmp 00007F9984B08D11h 0x0000006d popfd 0x0000006e jmp 00007F9984B08D10h 0x00000073 popad 0x00000074 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49D0E0F second address: 49D0E76 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F998484EB11h 0x00000009 xor ch, 00000066h 0x0000000c jmp 00007F998484EB11h 0x00000011 popfd 0x00000012 pushfd 0x00000013 jmp 00007F998484EB10h 0x00000018 sub ax, EC08h 0x0000001d jmp 00007F998484EB0Bh 0x00000022 popfd 0x00000023 popad 0x00000024 pop edx 0x00000025 pop eax 0x00000026 xchg eax, ebp 0x00000027 push eax 0x00000028 push edx 0x00000029 jmp 00007F998484EB15h 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49D0E76 second address: 49D0E88 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop ecx 0x00000005 push edi 0x00000006 pop esi 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov ebp, esp 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49D0E88 second address: 49D0E8E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(3).exe | RDTSC instruction interceptor: First address: 49D0E8E second address: 49D0ED8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9984B08D19h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ecx 0x0000000a pushad 0x0000000b pushad 0x0000000c mov edx, 52728F3Ch 0x00000011 popad 0x00000012 pushad 0x00000013 jmp 00007F9984B08D0Bh 0x00000018 mov bh, ch 0x0000001a popad 0x0000001b popad 0x0000001c push eax 0x0000001d push eax 0x0000001e push edx 0x0000001f jmp 00007F9984B08D11h 0x00000024 rdtsc |