Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B000B0 | 0_2_00B000B0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B1C320 | 0_2_00B1C320 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AEA430 | 0_2_00AEA430 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF8900 | 0_2_00AF8900 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AFCBB0 | 0_2_00AFCBB0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF0B40 | 0_2_00AF0B40 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B1D0C0 | 0_2_00B1D0C0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AEB1D8 | 0_2_00AEB1D8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B073CB | 0_2_00B073CB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE55F6 | 0_2_00AE55F6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B176C0 | 0_2_00B176C0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ADD780 | 0_2_00ADD780 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B19775 | 0_2_00B19775 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B138C0 | 0_2_00B138C0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE1822 | 0_2_00AE1822 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ADDA3A | 0_2_00ADDA3A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B13C30 | 0_2_00B13C30 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AEE0AC | 0_2_00AEE0AC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B8E0BD | 0_2_00B8E0BD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C520C0 | 0_2_00C520C0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C1A0CB | 0_2_00C1A0CB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B760B8 | 0_2_00B760B8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B1C0A0 | 0_2_00B1C0A0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B860A6 | 0_2_00B860A6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BA00A5 | 0_2_00BA00A5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C100E3 | 0_2_00C100E3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BBA098 | 0_2_00BBA098 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C2C0F0 | 0_2_00C2C0F0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B98082 | 0_2_00B98082 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BCE080 | 0_2_00BCE080 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C240FE | 0_2_00C240FE |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C7609E | 0_2_00C7609E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C4A09F | 0_2_00C4A09F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BDC0DF | 0_2_00BDC0DF |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B44035 | 0_2_00B44035 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BC203A | 0_2_00BC203A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BD4035 | 0_2_00BD4035 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B42038 | 0_2_00B42038 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B5A03B | 0_2_00B5A03B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B4600B | 0_2_00B4600B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C6A000 | 0_2_00C6A000 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C02007 | 0_2_00C02007 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C1C009 | 0_2_00C1C009 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B4A054 | 0_2_00B4A054 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C2603A | 0_2_00C2603A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B5C04C | 0_2_00B5C04C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C6403A | 0_2_00C6403A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B701B4 | 0_2_00B701B4 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C081CB | 0_2_00C081CB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C5C1CB | 0_2_00C5C1CB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C6E1D5 | 0_2_00C6E1D5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C181DA | 0_2_00C181DA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BC4190 | 0_2_00BC4190 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF0180 | 0_2_00AF0180 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C841FD | 0_2_00C841FD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C62187 | 0_2_00C62187 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C14185 | 0_2_00C14185 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BF21F7 | 0_2_00BF21F7 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B061D8 | 0_2_00B061D8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BEA1CF | 0_2_00BEA1CF |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BD01C9 | 0_2_00BD01C9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C1C147 | 0_2_00C1C147 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BB0133 | 0_2_00BB0133 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B02120 | 0_2_00B02120 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BF6126 | 0_2_00BF6126 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BA4126 | 0_2_00BA4126 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BD2118 | 0_2_00BD2118 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C02173 | 0_2_00C02173 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C2A17E | 0_2_00C2A17E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BB8105 | 0_2_00BB8105 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C56105 | 0_2_00C56105 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B0617E | 0_2_00B0617E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BBE15A | 0_2_00BBE15A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BCC158 | 0_2_00BCC158 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B78158 | 0_2_00B78158 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C50135 | 0_2_00C50135 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BC814E | 0_2_00BC814E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C9E133 | 0_2_00C9E133 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BEC141 | 0_2_00BEC141 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B502B0 | 0_2_00B502B0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B722B2 | 0_2_00B722B2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B9A2A1 | 0_2_00B9A2A1 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BEE2A0 | 0_2_00BEE2A0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B54299 | 0_2_00B54299 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C062F2 | 0_2_00C062F2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BA0280 | 0_2_00BA0280 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BB62FA | 0_2_00BB62FA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BF02F8 | 0_2_00BF02F8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B062F9 | 0_2_00B062F9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BA82ED | 0_2_00BA82ED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B5E2ED | 0_2_00B5E2ED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AEE2C6 | 0_2_00AEE2C6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BFC2CF | 0_2_00BFC2CF |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C602B8 | 0_2_00C602B8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C80252 | 0_2_00C80252 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C7A25A | 0_2_00C7A25A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B68212 | 0_2_00B68212 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C58274 | 0_2_00C58274 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BB420F | 0_2_00BB420F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BD6206 | 0_2_00BD6206 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C36200 | 0_2_00C36200 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B96265 | 0_2_00B96265 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B4E26A | 0_2_00B4E26A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C3E229 | 0_2_00C3E229 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B18240 | 0_2_00B18240 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C04231 | 0_2_00C04231 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B90240 | 0_2_00B90240 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C263C0 | 0_2_00C263C0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C203D4 | 0_2_00C203D4 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B44393 | 0_2_00B44393 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C5E3F0 | 0_2_00C5E3F0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ADA390 | 0_2_00ADA390 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BE03F4 | 0_2_00BE03F4 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B9C3E8 | 0_2_00B9C3E8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B663EF | 0_2_00B663EF |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C4439D | 0_2_00C4439D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C143A0 | 0_2_00C143A0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C7C3A6 | 0_2_00C7C3A6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C663BB | 0_2_00C663BB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C48345 | 0_2_00C48345 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BCC33B | 0_2_00BCC33B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B8A335 | 0_2_00B8A335 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C4034B | 0_2_00C4034B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BAA32C | 0_2_00BAA32C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BE6326 | 0_2_00BE6326 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B88313 | 0_2_00B88313 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BFA30D | 0_2_00BFA30D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00CA837D | 0_2_00CA837D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C3C379 | 0_2_00C3C379 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE6312 | 0_2_00AE6312 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C16306 | 0_2_00C16306 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C38309 | 0_2_00C38309 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B3E367 | 0_2_00B3E367 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C0E31F | 0_2_00C0E31F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B52354 | 0_2_00B52354 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BA2358 | 0_2_00BA2358 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B7035F | 0_2_00B7035F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B62345 | 0_2_00B62345 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BFE346 | 0_2_00BFE346 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C364C6 | 0_2_00C364C6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BD84B7 | 0_2_00BD84B7 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C464C9 | 0_2_00C464C9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C4C4D9 | 0_2_00C4C4D9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C304E3 | 0_2_00C304E3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C524E8 | 0_2_00C524E8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C624F4 | 0_2_00C624F4 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C804FF | 0_2_00C804FF |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B784F5 | 0_2_00B784F5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C4A4BC | 0_2_00C4A4BC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BC04C7 | 0_2_00BC04C7 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C8244B | 0_2_00C8244B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C2E44A | 0_2_00C2E44A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B52439 | 0_2_00B52439 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BEA424 | 0_2_00BEA424 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C3A458 | 0_2_00C3A458 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B7A41C | 0_2_00B7A41C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B94414 | 0_2_00B94414 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C64468 | 0_2_00C64468 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B5641A | 0_2_00B5641A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B7447E | 0_2_00B7447E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ADC470 | 0_2_00ADC470 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BFC441 | 0_2_00BFC441 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B6A5B6 | 0_2_00B6A5B6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BDA5BD | 0_2_00BDA5BD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B0E5A0 | 0_2_00B0E5A0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BA45A6 | 0_2_00BA45A6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BE85A3 | 0_2_00BE85A3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF45B0 | 0_2_00AF45B0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BF259D | 0_2_00BF259D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C385E6 | 0_2_00C385E6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF0589 | 0_2_00AF0589 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BBE59D | 0_2_00BBE59D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BC859A | 0_2_00BC859A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C2E5E9 | 0_2_00C2E5E9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B6C59A | 0_2_00B6C59A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C825E7 | 0_2_00C825E7 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BDC582 | 0_2_00BDC582 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C5A596 | 0_2_00C5A596 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C3E599 | 0_2_00C3E599 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BE45DA | 0_2_00BE45DA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B825D5 | 0_2_00B825D5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B0C530 | 0_2_00B0C530 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B9653D | 0_2_00B9653D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BB2537 | 0_2_00BB2537 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C5054B | 0_2_00C5054B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B76520 | 0_2_00B76520 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B9850F | 0_2_00B9850F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BCE507 | 0_2_00BCE507 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C1A50A | 0_2_00C1A50A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BAC577 | 0_2_00BAC577 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C76515 | 0_2_00C76515 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BD256B | 0_2_00BD256B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B4C554 | 0_2_00B4C554 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C2A520 | 0_2_00C2A520 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B02540 | 0_2_00B02540 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C1C534 | 0_2_00C1C534 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B6E540 | 0_2_00B6E540 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C3A6C2 | 0_2_00C3A6C2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B646B8 | 0_2_00B646B8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BA06AA | 0_2_00BA06AA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B906A2 | 0_2_00B906A2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BF4691 | 0_2_00BF4691 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BEE6FA | 0_2_00BEE6FA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BF06F1 | 0_2_00BF06F1 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B486E4 | 0_2_00B486E4 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C42694 | 0_2_00C42694 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B786E2 | 0_2_00B786E2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C546A2 | 0_2_00C546A2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BEC6D6 | 0_2_00BEC6D6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C7A6BF | 0_2_00C7A6BF |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C1464B | 0_2_00C1464B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BAA628 | 0_2_00BAA628 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BBC628 | 0_2_00BBC628 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BEA62B | 0_2_00BEA62B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B96622 | 0_2_00B96622 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C2265D | 0_2_00C2265D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C0A661 | 0_2_00C0A661 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C78676 | 0_2_00C78676 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B00670 | 0_2_00B00670 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C0E606 | 0_2_00C0E606 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B7C67F | 0_2_00B7C67F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ADE660 | 0_2_00ADE660 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B1266C | 0_2_00B1266C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B5E66B | 0_2_00B5E66B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B00650 | 0_2_00B00650 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B567B5 | 0_2_00B567B5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C7C7D6 | 0_2_00C7C7D6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C0E7D5 | 0_2_00C0E7D5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C607D3 | 0_2_00C607D3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C0C7DA | 0_2_00C0C7DA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B5C79D | 0_2_00B5C79D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BCA788 | 0_2_00BCA788 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BB8780 | 0_2_00BB8780 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AD2790 | 0_2_00AD2790 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B9E786 | 0_2_00B9E786 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B427F3 | 0_2_00B427F3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BE27F7 | 0_2_00BE27F7 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B747FB | 0_2_00B747FB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C5C79C | 0_2_00C5C79C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B887DA | 0_2_00B887DA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C647B5 | 0_2_00C647B5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BB67C3 | 0_2_00BB67C3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C58746 | 0_2_00C58746 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C26744 | 0_2_00C26744 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C9C75A | 0_2_00C9C75A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B6872C | 0_2_00B6872C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C2A774 | 0_2_00C2A774 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B4E70B | 0_2_00B4E70B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C34704 | 0_2_00C34704 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BBA774 | 0_2_00BBA774 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C3271E | 0_2_00C3271E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B14750 | 0_2_00B14750 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C28726 | 0_2_00C28726 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C3E72F | 0_2_00C3E72F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C6672B | 0_2_00C6672B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BA274B | 0_2_00BA274B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C68735 | 0_2_00C68735 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C6E732 | 0_2_00C6E732 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C5E8C3 | 0_2_00C5E8C3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BD08B5 | 0_2_00BD08B5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B4C8BA | 0_2_00B4C8BA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C188DA | 0_2_00C188DA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B9C8A6 | 0_2_00B9C8A6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B9A898 | 0_2_00B9A898 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BF689D | 0_2_00BF689D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C408E2 | 0_2_00C408E2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BB2892 | 0_2_00BB2892 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BD6884 | 0_2_00BD6884 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B1A88E | 0_2_00B1A88E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BCE8F4 | 0_2_00BCE8F4 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C1E88A | 0_2_00C1E88A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C4488A | 0_2_00C4488A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C3C8A1 | 0_2_00C3C8A1 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B448DD | 0_2_00B448DD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00CAA8A1 | 0_2_00CAA8A1 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B548D9 | 0_2_00B548D9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B1C8C0 | 0_2_00B1C8C0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AD4802 | 0_2_00AD4802 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B60807 | 0_2_00B60807 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C00872 | 0_2_00C00872 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B8A80F | 0_2_00B8A80F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BF887D | 0_2_00BF887D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF4860 | 0_2_00AF4860 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BA686F | 0_2_00BA686F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BCC86A | 0_2_00BCC86A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BF0854 | 0_2_00BF0854 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BC0845 | 0_2_00BC0845 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B40848 | 0_2_00B40848 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C709D4 | 0_2_00C709D4 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AF69B4 | 0_2_00AF69B4 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C309E1 | 0_2_00C309E1 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BEE99B | 0_2_00BEE99B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C009FA | 0_2_00C009FA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C3A9F9 | 0_2_00C3A9F9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B82987 | 0_2_00B82987 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C48985 | 0_2_00C48985 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B6E9C5 | 0_2_00B6E9C5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B9893B | 0_2_00B9893B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BBE930 | 0_2_00BBE930 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BFC92E | 0_2_00BFC92E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B8692B | 0_2_00B8692B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BD4928 | 0_2_00BD4928 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BE4926 | 0_2_00BE4926 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B7692A | 0_2_00B7692A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C4E965 | 0_2_00C4E965 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C1696D | 0_2_00C1696D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C84965 | 0_2_00C84965 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C36975 | 0_2_00C36975 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BB4901 | 0_2_00BB4901 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C38902 | 0_2_00C38902 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BAA979 | 0_2_00BAA979 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00CA6904 | 0_2_00CA6904 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B00962 | 0_2_00B00962 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BB0961 | 0_2_00BB0961 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BF2964 | 0_2_00BF2964 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C46921 | 0_2_00C46921 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C1C931 | 0_2_00C1C931 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BD8945 | 0_2_00BD8945 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B6C94C | 0_2_00B6C94C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B7EAB3 | 0_2_00B7EAB3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BECAA7 | 0_2_00BECAA7 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BC8A9A | 0_2_00BC8A9A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BC4A84 | 0_2_00BC4A84 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C3CAFC | 0_2_00C3CAFC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BCAAF8 | 0_2_00BCAAF8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C50A83 | 0_2_00C50A83 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BA4AFD | 0_2_00BA4AFD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C4AA89 | 0_2_00C4AA89 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C2EA8D | 0_2_00C2EA8D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B06AE5 | 0_2_00B06AE5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BD8AE2 | 0_2_00BD8AE2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B4AAD0 | 0_2_00B4AAD0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B08AC0 | 0_2_00B08AC0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BDCA3E | 0_2_00BDCA3E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C08A4D | 0_2_00C08A4D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BE0A2C | 0_2_00BE0A2C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BC2A2B | 0_2_00BC2A2B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C68A76 | 0_2_00C68A76 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B8CA00 | 0_2_00B8CA00 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C12A7C | 0_2_00C12A7C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BB4A7E | 0_2_00BB4A7E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B72A71 | 0_2_00B72A71 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B46A73 | 0_2_00B46A73 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C18A17 | 0_2_00C18A17 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C76A25 | 0_2_00C76A25 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B4EA4C | 0_2_00B4EA4C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BB8A44 | 0_2_00BB8A44 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C0CBE5 | 0_2_00C0CBE5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C2EBF6 | 0_2_00C2EBF6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C52B8E | 0_2_00C52B8E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B54BF9 | 0_2_00B54BF9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C58B97 | 0_2_00C58B97 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BA2BE9 | 0_2_00BA2BE9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C7ABA5 | 0_2_00C7ABA5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C1EBA4 | 0_2_00C1EBA4 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BDABDA | 0_2_00BDABDA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B3EBDC | 0_2_00B3EBDC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00ADCBD0 | 0_2_00ADCBD0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C64B44 | 0_2_00C64B44 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C3EB45 | 0_2_00C3EB45 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AD8B20 | 0_2_00AD8B20 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B48B3A | 0_2_00B48B3A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C22B4C | 0_2_00C22B4C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C24B52 | 0_2_00C24B52 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C6CB57 | 0_2_00C6CB57 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C5CB57 | 0_2_00C5CB57 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C14B5D | 0_2_00C14B5D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C34B5C | 0_2_00C34B5C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B8EB10 | 0_2_00B8EB10 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BA2B16 | 0_2_00BA2B16 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BA0B04 | 0_2_00BA0B04 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C5AB08 | 0_2_00C5AB08 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B14B60 | 0_2_00B14B60 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C72B13 | 0_2_00C72B13 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BAEB67 | 0_2_00BAEB67 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B5EB56 | 0_2_00B5EB56 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BDEB53 | 0_2_00BDEB53 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AD2B50 | 0_2_00AD2B50 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C2ACC2 | 0_2_00C2ACC2 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B52C9B | 0_2_00B52C9B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B1CC80 | 0_2_00B1CC80 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B8CC8E | 0_2_00B8CC8E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BB4CEB | 0_2_00BB4CEB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C10C99 | 0_2_00C10C99 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BF0CD1 | 0_2_00BF0CD1 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BCACCD | 0_2_00BCACCD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BC6CC4 | 0_2_00BC6CC4 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B7CCCB | 0_2_00B7CCCB |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C6EC4F | 0_2_00C6EC4F |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B44C3E | 0_2_00B44C3E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B90C35 | 0_2_00B90C35 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B6EC39 | 0_2_00B6EC39 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C20C52 | 0_2_00C20C52 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C5EC57 | 0_2_00C5EC57 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BCEC2B | 0_2_00BCEC2B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C06C5B | 0_2_00C06C5B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C84C57 | 0_2_00C84C57 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C02C61 | 0_2_00C02C61 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B9AC15 | 0_2_00B9AC15 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B6AC01 | 0_2_00B6AC01 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C60C7E | 0_2_00C60C7E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C6AC7D | 0_2_00C6AC7D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B70C61 | 0_2_00B70C61 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B74C56 | 0_2_00B74C56 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B42C5C | 0_2_00B42C5C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B5AC5D | 0_2_00B5AC5D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BF2C57 | 0_2_00BF2C57 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B62C5A | 0_2_00B62C5A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AEB1D8 | 0_2_00AEB1D8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BEEDB8 | 0_2_00BEEDB8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C40DC9 | 0_2_00C40DC9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00CA4DDC | 0_2_00CA4DDC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C1ADD9 | 0_2_00C1ADD9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C72DEF | 0_2_00C72DEF |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C0CDF3 | 0_2_00C0CDF3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B48D89 | 0_2_00B48D89 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C22D86 | 0_2_00C22D86 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C5AD80 | 0_2_00C5AD80 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BBCDF1 | 0_2_00BBCDF1 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C7ED90 | 0_2_00C7ED90 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BE8D3A | 0_2_00BE8D3A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C62D42 | 0_2_00C62D42 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BF4D3A | 0_2_00BF4D3A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BFCD20 | 0_2_00BFCD20 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B7ED17 | 0_2_00B7ED17 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C46D65 | 0_2_00C46D65 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C76D61 | 0_2_00C76D61 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BAAD13 | 0_2_00BAAD13 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B5CD00 | 0_2_00B5CD00 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B60D03 | 0_2_00B60D03 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BD4D03 | 0_2_00BD4D03 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B86D6C | 0_2_00B86D6C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C42D10 | 0_2_00C42D10 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BA6D58 | 0_2_00BA6D58 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BEAD5A | 0_2_00BEAD5A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AECD45 | 0_2_00AECD45 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C80D3C | 0_2_00C80D3C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C70EC6 | 0_2_00C70EC6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BFCEB6 | 0_2_00BFCEB6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C00EC9 | 0_2_00C00EC9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B56EA3 | 0_2_00B56EA3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C7AEE4 | 0_2_00C7AEE4 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BB0E94 | 0_2_00BB0E94 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B66E85 | 0_2_00B66E85 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BDEE89 | 0_2_00BDEE89 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C74EFD | 0_2_00C74EFD |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BC2E80 | 0_2_00BC2E80 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BC4E81 | 0_2_00BC4E81 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AEEEFE | 0_2_00AEEEFE |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C26E9A | 0_2_00C26E9A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C50EAA | 0_2_00C50EAA |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B6CEC5 | 0_2_00B6CEC5 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BDCEC3 | 0_2_00BDCEC3 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B8AE3B | 0_2_00B8AE3B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BE0E3A | 0_2_00BE0E3A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B7AE3C | 0_2_00B7AE3C |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C04E52 | 0_2_00C04E52 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B7CE08 | 0_2_00B7CE08 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BE4E01 | 0_2_00BE4E01 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C3AE05 | 0_2_00C3AE05 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BD8E74 | 0_2_00BD8E74 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C0EE18 | 0_2_00C0EE18 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C84E2A | 0_2_00C84E2A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B78E43 | 0_2_00B78E43 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C56E3D | 0_2_00C56E3D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B98E44 | 0_2_00B98E44 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B4EE4A | 0_2_00B4EE4A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C54E3B | 0_2_00C54E3B |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B3EFB9 | 0_2_00B3EFB9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B52FB8 | 0_2_00B52FB8 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BE0FA7 | 0_2_00BE0FA7 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C7AFDC | 0_2_00C7AFDC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B6AFA9 | 0_2_00B6AFA9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B94F99 | 0_2_00B94F99 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C82FEC | 0_2_00C82FEC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BAEF96 | 0_2_00BAEF96 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C20FEE | 0_2_00C20FEE |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C52FFC | 0_2_00C52FFC |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B7AF8D | 0_2_00B7AF8D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00AE6F90 | 0_2_00AE6F90 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B12FF0 | 0_2_00B12FF0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C68F88 | 0_2_00C68F88 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BCEFED | 0_2_00BCEFED |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B3EFE1 | 0_2_00B3EFE1 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B9EFEF | 0_2_00B9EFEF |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C14F9A | 0_2_00C14F9A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BA8FE6 | 0_2_00BA8FE6 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C2EF9D | 0_2_00C2EF9D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C0CFB0 | 0_2_00C0CFB0 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C46FB9 | 0_2_00C46FB9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C6EFB9 | 0_2_00C6EFB9 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BB8F3E | 0_2_00BB8F3E |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C5CF54 | 0_2_00C5CF54 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C58F51 | 0_2_00C58F51 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B42F2A | 0_2_00B42F2A |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C24F61 | 0_2_00C24F61 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BF6F19 | 0_2_00BF6F19 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00C30F6D | 0_2_00C30F6D |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00B74F76 | 0_2_00B74F76 |
Source: C:\Users\user\Desktop\file.exe | Code function: 0_2_00BE6F71 | 0_2_00BE6F71 |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB15A2 second address: CB15D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2B4D4AC9EBh 0x00000009 pop ebx 0x0000000a jmp 00007F2B4D4AC9F1h 0x0000000f pop esi 0x00000010 push eax 0x00000011 push edx 0x00000012 push ebx 0x00000013 jnc 00007F2B4D4AC9E6h 0x00000019 pop ebx 0x0000001a push ecx 0x0000001b push edx 0x0000001c pop edx 0x0000001d jc 00007F2B4D4AC9E6h 0x00000023 pop ecx 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB09D4 second address: CB0A22 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F2B4CC6E2A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007F2B4CC6E2B3h 0x0000000f jmp 00007F2B4CC6E2B7h 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F2B4CC6E2B8h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB0A22 second address: CB0A3B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4D4AC9F5h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB0E68 second address: CB0EB0 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F2B4CC6E2BBh 0x00000008 jmp 00007F2B4CC6E2AFh 0x0000000d jnp 00007F2B4CC6E2A6h 0x00000013 pop edx 0x00000014 pop eax 0x00000015 pushad 0x00000016 jmp 00007F2B4CC6E2B2h 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007F2B4CC6E2B4h 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB0EB0 second address: CB0EB4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB3C18 second address: CB3C72 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2B4CC6E2B3h 0x00000009 popad 0x0000000a popad 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f jmp 00007F2B4CC6E2B3h 0x00000014 mov eax, dword ptr [eax] 0x00000016 pushad 0x00000017 push edx 0x00000018 push edi 0x00000019 pop edi 0x0000001a pop edx 0x0000001b pushad 0x0000001c jmp 00007F2B4CC6E2B5h 0x00000021 push ebx 0x00000022 pop ebx 0x00000023 popad 0x00000024 popad 0x00000025 mov dword ptr [esp+04h], eax 0x00000029 push esi 0x0000002a push eax 0x0000002b push edx 0x0000002c push edx 0x0000002d pop edx 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB3CD6 second address: CB3D87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop esi 0x00000006 push eax 0x00000007 jmp 00007F2B4D4AC9EAh 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 push edx 0x00000011 jmp 00007F2B4D4AC9EEh 0x00000016 pop edx 0x00000017 mov eax, dword ptr [eax] 0x00000019 jnl 00007F2B4D4AC9ECh 0x0000001f mov dword ptr [esp+04h], eax 0x00000023 jmp 00007F2B4D4AC9F2h 0x00000028 pop eax 0x00000029 jns 00007F2B4D4AC9ECh 0x0000002f mov ecx, dword ptr [ebp+122D3760h] 0x00000035 push 00000003h 0x00000037 mov ch, dh 0x00000039 push 00000000h 0x0000003b jnc 00007F2B4D4AC9E9h 0x00000041 mov dword ptr [ebp+122D2C83h], edx 0x00000047 push 00000003h 0x00000049 mov si, 0E0Ch 0x0000004d call 00007F2B4D4AC9E9h 0x00000052 push edi 0x00000053 pushad 0x00000054 push ecx 0x00000055 pop ecx 0x00000056 js 00007F2B4D4AC9E6h 0x0000005c popad 0x0000005d pop edi 0x0000005e push eax 0x0000005f pushad 0x00000060 jne 00007F2B4D4AC9E8h 0x00000066 jl 00007F2B4D4AC9E8h 0x0000006c pushad 0x0000006d popad 0x0000006e popad 0x0000006f mov eax, dword ptr [esp+04h] 0x00000073 push eax 0x00000074 push edx 0x00000075 je 00007F2B4D4AC9ECh 0x0000007b jl 00007F2B4D4AC9E6h 0x00000081 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB3D87 second address: CB3D8C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB3D8C second address: CB3D92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB3FAC second address: CB3FB1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB4023 second address: CB4031 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov eax, dword ptr [eax] 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a push edx 0x0000000b pop edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB4031 second address: CB4036 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB4036 second address: CB406C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007F2B4D4AC9F3h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov dword ptr [esp+04h], eax 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F2B4D4AC9F5h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB406C second address: CB4101 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4CC6E2ABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a jmp 00007F2B4CC6E2AEh 0x0000000f push 00000003h 0x00000011 pushad 0x00000012 mov dword ptr [ebp+122D189Ah], ecx 0x00000018 ja 00007F2B4CC6E2A7h 0x0000001e popad 0x0000001f pushad 0x00000020 mov dword ptr [ebp+122D2C83h], esi 0x00000026 movsx edx, dx 0x00000029 popad 0x0000002a push 00000000h 0x0000002c push 00000003h 0x0000002e mov edi, 4DB82C00h 0x00000033 call 00007F2B4CC6E2A9h 0x00000038 pushad 0x00000039 jmp 00007F2B4CC6E2B0h 0x0000003e push ebx 0x0000003f jmp 00007F2B4CC6E2B1h 0x00000044 pop ebx 0x00000045 popad 0x00000046 push eax 0x00000047 jmp 00007F2B4CC6E2ADh 0x0000004c mov eax, dword ptr [esp+04h] 0x00000050 pushad 0x00000051 push eax 0x00000052 push edx 0x00000053 jmp 00007F2B4CC6E2AFh 0x00000058 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CB4101 second address: CB4149 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4D4AC9F0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F2B4D4AC9F0h 0x0000000e popad 0x0000000f mov eax, dword ptr [eax] 0x00000011 jmp 00007F2B4D4AC9F8h 0x00000016 mov dword ptr [esp+04h], eax 0x0000001a pushad 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e popad 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CD416A second address: CD4170 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CD4170 second address: CD417D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jne 00007F2B4D4AC9E6h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CD417D second address: CD41A5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4CC6E2AAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push esi 0x0000000a jnp 00007F2B4CC6E2A6h 0x00000010 pop esi 0x00000011 popad 0x00000012 push ebx 0x00000013 push ebx 0x00000014 jno 00007F2B4CC6E2A6h 0x0000001a pop ebx 0x0000001b jo 00007F2B4CC6E2B2h 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CD28ED second address: CD28F7 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F2B4D4AC9E6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CD3044 second address: CD3048 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CD32D7 second address: CD32DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CD32DD second address: CD32E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jc 00007F2B4CC6E2A6h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CD38C6 second address: CD38DC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4D4AC9EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push esi 0x0000000f pop esi 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CD38DC second address: CD3901 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4CC6E2B1h 0x00000007 jne 00007F2B4CC6E2A6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push ebx 0x00000012 pop ebx 0x00000013 js 00007F2B4CC6E2A6h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CD3901 second address: CD3905 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CD3905 second address: CD3911 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F2B4CC6E2A6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CD3911 second address: CD3924 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 jno 00007F2B4D4AC9E6h 0x0000000b je 00007F2B4D4AC9E6h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CD3924 second address: CD392D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push edi 0x00000008 pop edi 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CD3D07 second address: CD3D22 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F2B4D4AC9F5h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CD7AF3 second address: CD7B1B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 pushad 0x00000008 push edx 0x00000009 pop edx 0x0000000a jbe 00007F2B4CC6E2A6h 0x00000010 popad 0x00000011 popad 0x00000012 push eax 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007F2B4CC6E2B3h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CD8D90 second address: CD8D95 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CA12C8 second address: CA12CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CDF376 second address: CDF385 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2B4D4AC9EBh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CDFC06 second address: CDFC0C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE0C9A second address: CE0CA1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE0CA1 second address: CE0CC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push edx 0x0000000b jmp 00007F2B4CC6E2B6h 0x00000010 pop edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE0CC3 second address: CE0D3C instructions: 0x00000000 rdtsc 0x00000002 jp 00007F2B4D4AC9ECh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e jng 00007F2B4D4AC9FFh 0x00000014 mov eax, dword ptr [eax] 0x00000016 je 00007F2B4D4AC9F4h 0x0000001c jmp 00007F2B4D4AC9EEh 0x00000021 mov dword ptr [esp+04h], eax 0x00000025 push edx 0x00000026 jmp 00007F2B4D4AC9EBh 0x0000002b pop edx 0x0000002c pop eax 0x0000002d jmp 00007F2B4D4AC9EFh 0x00000032 push 98A55DEBh 0x00000037 push eax 0x00000038 push edx 0x00000039 jo 00007F2B4D4AC9E8h 0x0000003f push esi 0x00000040 pop esi 0x00000041 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE135A second address: CE1382 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jne 00007F2B4CC6E2A8h 0x0000000c popad 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F2B4CC6E2B4h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE1382 second address: CE138C instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F2B4D4AC9E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE18D7 second address: CE18DB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE1C2B second address: CE1C2F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE1E01 second address: CE1E28 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4CC6E2B8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jns 00007F2B4CC6E2A8h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE1E28 second address: CE1E83 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnp 00007F2B4D4AC9E6h 0x00000009 jmp 00007F2B4D4AC9F1h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 nop 0x00000012 push 00000000h 0x00000014 push ecx 0x00000015 call 00007F2B4D4AC9E8h 0x0000001a pop ecx 0x0000001b mov dword ptr [esp+04h], ecx 0x0000001f add dword ptr [esp+04h], 00000019h 0x00000027 inc ecx 0x00000028 push ecx 0x00000029 ret 0x0000002a pop ecx 0x0000002b ret 0x0000002c mov di, 2BDEh 0x00000030 xchg eax, ebx 0x00000031 push ebx 0x00000032 pushad 0x00000033 je 00007F2B4D4AC9E6h 0x00000039 push ecx 0x0000003a pop ecx 0x0000003b popad 0x0000003c pop ebx 0x0000003d push eax 0x0000003e push eax 0x0000003f push edx 0x00000040 push edx 0x00000041 jl 00007F2B4D4AC9E6h 0x00000047 pop edx 0x00000048 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE1E83 second address: CE1E89 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE24A1 second address: CE24B5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jg 00007F2B4D4AC9E6h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edi 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE3DDD second address: CE3DE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE3DE1 second address: CE3DE5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE3DE5 second address: CE3DEF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE3DEF second address: CE3E07 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 pushad 0x0000000a jo 00007F2B4D4AC9E6h 0x00000010 push ecx 0x00000011 pop ecx 0x00000012 popad 0x00000013 pushad 0x00000014 pushad 0x00000015 popad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE3E07 second address: CE3E3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 nop 0x00000007 push eax 0x00000008 pop esi 0x00000009 push 00000000h 0x0000000b add si, EC0Ch 0x00000010 push 00000000h 0x00000012 mov dword ptr [ebp+122D353Ch], ecx 0x00000018 xchg eax, ebx 0x00000019 jmp 00007F2B4CC6E2B0h 0x0000001e push eax 0x0000001f push eax 0x00000020 push edx 0x00000021 jbe 00007F2B4CC6E2ACh 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE5356 second address: CE5367 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2B4D4AC9EDh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE5367 second address: CE536B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE536B second address: CE53B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b mov edi, ebx 0x0000000d push 00000000h 0x0000000f push 00000000h 0x00000011 push ebx 0x00000012 call 00007F2B4D4AC9E8h 0x00000017 pop ebx 0x00000018 mov dword ptr [esp+04h], ebx 0x0000001c add dword ptr [esp+04h], 00000017h 0x00000024 inc ebx 0x00000025 push ebx 0x00000026 ret 0x00000027 pop ebx 0x00000028 ret 0x00000029 mov edi, dword ptr [ebp+122D2A83h] 0x0000002f mov esi, dword ptr [ebp+122D2A27h] 0x00000035 push 00000000h 0x00000037 mov edi, dword ptr [ebp+122D3316h] 0x0000003d xchg eax, ebx 0x0000003e pushad 0x0000003f push eax 0x00000040 push edx 0x00000041 jg 00007F2B4D4AC9E6h 0x00000047 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE69E1 second address: CE69E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE69E5 second address: CE69E9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE69E9 second address: CE69EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE69EF second address: CE69F4 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE69F4 second address: CE6A18 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 nop 0x00000008 xor esi, 6AB9D46Eh 0x0000000e push 00000000h 0x00000010 sub esi, 5D4E66C1h 0x00000016 push 00000000h 0x00000018 mov edi, dword ptr [ebp+122D2CA1h] 0x0000001e push eax 0x0000001f pushad 0x00000020 push eax 0x00000021 push edx 0x00000022 push esi 0x00000023 pop esi 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE6A18 second address: CE6A22 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE6A22 second address: CE6A26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE6A26 second address: CE6A2A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE731C second address: CE7320 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CEA567 second address: CEA5EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2B4D4AC9F5h 0x00000009 popad 0x0000000a push eax 0x0000000b pushad 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f pop edx 0x00000010 jmp 00007F2B4D4AC9F5h 0x00000015 popad 0x00000016 nop 0x00000017 sub dword ptr [ebp+122D1A43h], ecx 0x0000001d or di, 7EE7h 0x00000022 push 00000000h 0x00000024 push 00000000h 0x00000026 push ebp 0x00000027 call 00007F2B4D4AC9E8h 0x0000002c pop ebp 0x0000002d mov dword ptr [esp+04h], ebp 0x00000031 add dword ptr [esp+04h], 00000017h 0x00000039 inc ebp 0x0000003a push ebp 0x0000003b ret 0x0000003c pop ebp 0x0000003d ret 0x0000003e push 00000000h 0x00000040 jmp 00007F2B4D4AC9EAh 0x00000045 xchg eax, esi 0x00000046 jmp 00007F2B4D4AC9F1h 0x0000004b push eax 0x0000004c push ebx 0x0000004d push eax 0x0000004e push edx 0x0000004f push ebx 0x00000050 pop ebx 0x00000051 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CEC5C2 second address: CEC636 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4CC6E2B0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b jp 00007F2B4CC6E2BAh 0x00000011 jmp 00007F2B4CC6E2B4h 0x00000016 nop 0x00000017 jno 00007F2B4CC6E2ACh 0x0000001d push 00000000h 0x0000001f push 00000000h 0x00000021 push 00000000h 0x00000023 push ebx 0x00000024 call 00007F2B4CC6E2A8h 0x00000029 pop ebx 0x0000002a mov dword ptr [esp+04h], ebx 0x0000002e add dword ptr [esp+04h], 0000001Dh 0x00000036 inc ebx 0x00000037 push ebx 0x00000038 ret 0x00000039 pop ebx 0x0000003a ret 0x0000003b cmc 0x0000003c mov dword ptr [ebp+122D36AFh], edx 0x00000042 push eax 0x00000043 push eax 0x00000044 push edx 0x00000045 push ebx 0x00000046 pushad 0x00000047 popad 0x00000048 pop ebx 0x00000049 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CEA7A1 second address: CEA7A5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CEC636 second address: CEC63C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CEA7A5 second address: CEA7D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F2B4D4AC9F0h 0x0000000c jne 00007F2B4D4AC9E6h 0x00000012 popad 0x00000013 popad 0x00000014 push eax 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007F2B4D4AC9EEh 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CEC63C second address: CEC640 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CEA7D5 second address: CEA7ED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2B4D4AC9F4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CED48C second address: CED491 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CEC775 second address: CEC805 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jmp 00007F2B4D4AC9EEh 0x0000000a popad 0x0000000b mov dword ptr [esp], eax 0x0000000e push ebx 0x0000000f mov ebx, dword ptr [ebp+122D35E6h] 0x00000015 pop ebx 0x00000016 push dword ptr fs:[00000000h] 0x0000001d movzx edi, ax 0x00000020 mov dword ptr fs:[00000000h], esp 0x00000027 push 00000000h 0x00000029 push ebp 0x0000002a call 00007F2B4D4AC9E8h 0x0000002f pop ebp 0x00000030 mov dword ptr [esp+04h], ebp 0x00000034 add dword ptr [esp+04h], 00000014h 0x0000003c inc ebp 0x0000003d push ebp 0x0000003e ret 0x0000003f pop ebp 0x00000040 ret 0x00000041 call 00007F2B4D4AC9F0h 0x00000046 mov di, cx 0x00000049 pop ebx 0x0000004a sbb ebx, 4ECBE1CAh 0x00000050 mov eax, dword ptr [ebp+122D001Dh] 0x00000056 xor dword ptr [ebp+122D17E1h], edi 0x0000005c push FFFFFFFFh 0x0000005e push eax 0x0000005f pushad 0x00000060 jg 00007F2B4D4AC9F2h 0x00000066 jmp 00007F2B4D4AC9ECh 0x0000006b jns 00007F2B4D4AC9ECh 0x00000071 push eax 0x00000072 push edx 0x00000073 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CEE431 second address: CEE437 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CF0386 second address: CF03A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2B4D4AC9F5h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CF13E8 second address: CF13F1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CF05E2 second address: CF05E6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CF34EA second address: CF3523 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4CC6E2B6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ecx 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e jmp 00007F2B4CC6E2B9h 0x00000013 pop eax 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CF3523 second address: CF3529 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CF4433 second address: CF443D instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F2B4CC6E2ACh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CF443D second address: CF44B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jmp 00007F2B4D4AC9F3h 0x0000000c nop 0x0000000d push 00000000h 0x0000000f push ebp 0x00000010 call 00007F2B4D4AC9E8h 0x00000015 pop ebp 0x00000016 mov dword ptr [esp+04h], ebp 0x0000001a add dword ptr [esp+04h], 00000016h 0x00000022 inc ebp 0x00000023 push ebp 0x00000024 ret 0x00000025 pop ebp 0x00000026 ret 0x00000027 jmp 00007F2B4D4AC9F3h 0x0000002c push 00000000h 0x0000002e xor bh, FFFFFFDFh 0x00000031 push 00000000h 0x00000033 add dword ptr [ebp+122D2CF4h], ebx 0x00000039 xchg eax, esi 0x0000003a pushad 0x0000003b jl 00007F2B4D4AC9F4h 0x00000041 jmp 00007F2B4D4AC9EEh 0x00000046 push eax 0x00000047 push edx 0x00000048 ja 00007F2B4D4AC9E6h 0x0000004e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CF44B4 second address: CF44B8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CF36E4 second address: CF3701 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F2B4D4AC9F8h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CF44B8 second address: CF44C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CF256F second address: CF2575 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CF44C6 second address: CF44E2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4CC6E2B8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CF44E2 second address: CF44F3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2B4D4AC9EDh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CF5423 second address: CF542D instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F2B4CC6E2A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CF4686 second address: CF468A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CF542D second address: CF544B instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push edx 0x00000004 pop edx 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c jmp 00007F2B4CC6E2B1h 0x00000011 pop eax 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CF544B second address: CF54B6 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jne 00007F2B4D4AC9E6h 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d mov dword ptr [ebp+122D1BF1h], edx 0x00000013 push 00000000h 0x00000015 mov dword ptr [ebp+122D1F3Dh], eax 0x0000001b push 00000000h 0x0000001d jmp 00007F2B4D4AC9F9h 0x00000022 mov dword ptr [ebp+1244B46Ah], eax 0x00000028 push eax 0x00000029 pushad 0x0000002a jmp 00007F2B4D4AC9F6h 0x0000002f push eax 0x00000030 push edx 0x00000031 jmp 00007F2B4D4AC9F5h 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CF5613 second address: CF5617 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CF73C2 second address: CF73C6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CF65F9 second address: CF660B instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F2B4CC6E2A8h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edi 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CF73C6 second address: CF73D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 pushad 0x00000008 popad 0x00000009 pop edi 0x0000000a popad 0x0000000b push eax 0x0000000c push edi 0x0000000d push esi 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CF660B second address: CF660F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CF831D second address: CF8321 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CF92AB second address: CF92C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 popad 0x00000006 push eax 0x00000007 jns 00007F2B4CC6E2B4h 0x0000000d pushad 0x0000000e js 00007F2B4CC6E2A6h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CF8467 second address: CF846E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CF947D second address: CF9492 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 jl 00007F2B4CC6E2A8h 0x0000000d pushad 0x0000000e popad 0x0000000f popad 0x00000010 push eax 0x00000011 push eax 0x00000012 push ecx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CFD11F second address: CFD150 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2B4D4AC9F0h 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c jmp 00007F2B4D4AC9F8h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D03551 second address: D03572 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F2B4CC6E2A6h 0x00000008 push esi 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007F2B4CC6E2B1h 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D071A6 second address: D071AC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D071AC second address: D071B0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D0E1B4 second address: D0E1E9 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F2B4D4AC9F2h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push esi 0x0000000d jng 00007F2B4D4AC9E6h 0x00000013 jmp 00007F2B4D4AC9F5h 0x00000018 pop esi 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D0E1E9 second address: D0E1EF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D0E1EF second address: D0E1F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D0E1F5 second address: D0E1F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D0E1F9 second address: D0E222 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4D4AC9F9h 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d ja 00007F2B4D4AC9E6h 0x00000013 push esi 0x00000014 pop esi 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D0D984 second address: D0D98C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D0D98C second address: D0D9D5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4D4AC9F7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jnl 00007F2B4D4AC9F3h 0x00000010 pushad 0x00000011 push ebx 0x00000012 pop ebx 0x00000013 jc 00007F2B4D4AC9E6h 0x00000019 jo 00007F2B4D4AC9E6h 0x0000001f popad 0x00000020 push eax 0x00000021 push edx 0x00000022 pushad 0x00000023 popad 0x00000024 jg 00007F2B4D4AC9E6h 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D0D9D5 second address: D0D9DB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D0DB24 second address: D0DB28 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D0DB28 second address: D0DB46 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F2B4CC6E2B8h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D0DB46 second address: D0DB64 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2B4D4AC9F8h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D0DB64 second address: D0DB68 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D0DB68 second address: D0DBB6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jmp 00007F2B4D4AC9F1h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jnc 00007F2B4D4ACA01h 0x00000015 jp 00007F2B4D4AC9F2h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D0DD2C second address: D0DD41 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4CC6E2ACh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D0DEB6 second address: D0DEBA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D13724 second address: D1374A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ecx 0x00000007 push ebx 0x00000008 jmp 00007F2B4CC6E2AFh 0x0000000d jc 00007F2B4CC6E2A6h 0x00000013 pop ebx 0x00000014 jc 00007F2B4CC6E2ACh 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1374A second address: D13754 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D13754 second address: D13774 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 js 00007F2B4CC6E2A6h 0x0000000e jmp 00007F2B4CC6E2B2h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D138D4 second address: D138D9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D138D9 second address: D13916 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 je 00007F2B4CC6E2B6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F2B4CC6E2B5h 0x00000017 js 00007F2B4CC6E2A6h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D13916 second address: D13920 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D13920 second address: D13924 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D13924 second address: D1394F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2B4D4AC9F5h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F2B4D4AC9ECh 0x00000012 push edx 0x00000013 pop edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D13C72 second address: D13C7A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D13C7A second address: D13C7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D13C7E second address: D13C82 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1408E second address: D14095 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D143A7 second address: D143AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D143AC second address: D143B2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D143B2 second address: D143B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D146A1 second address: D146D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop esi 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d jmp 00007F2B4D4AC9F8h 0x00000012 je 00007F2B4D4AC9E6h 0x00000018 popad 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D146D1 second address: D146D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D146D7 second address: D146EA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4D4AC9EFh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D146EA second address: D146F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CCBB34 second address: CCBB38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CCBB38 second address: CCBB60 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jmp 00007F2B4CC6E2AEh 0x0000000e jmp 00007F2B4CC6E2ACh 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CCBB60 second address: CCBB87 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F2B4D4AC9F2h 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 pushad 0x00000012 popad 0x00000013 ja 00007F2B4D4AC9E6h 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CCBB87 second address: CCBBAE instructions: 0x00000000 rdtsc 0x00000002 jng 00007F2B4CC6E2B8h 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F2B4CC6E2ABh 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE87E4 second address: CE88B9 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F2B4D4AC9E8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], ebx 0x0000000d mov dword ptr [ebp+122D2434h], ebx 0x00000013 mov dword ptr [ebp+1244BB87h], ecx 0x00000019 push dword ptr fs:[00000000h] 0x00000020 add dword ptr [ebp+1246064Fh], ecx 0x00000026 mov dword ptr fs:[00000000h], esp 0x0000002d push ecx 0x0000002e sub edi, 1D1E0D30h 0x00000034 pop edi 0x00000035 mov dword ptr [ebp+124864FDh], esp 0x0000003b mov edi, dword ptr [ebp+122D3330h] 0x00000041 cmp dword ptr [ebp+122D2AF7h], 00000000h 0x00000048 jne 00007F2B4D4ACAC8h 0x0000004e push 00000000h 0x00000050 push ebp 0x00000051 call 00007F2B4D4AC9E8h 0x00000056 pop ebp 0x00000057 mov dword ptr [esp+04h], ebp 0x0000005b add dword ptr [esp+04h], 00000014h 0x00000063 inc ebp 0x00000064 push ebp 0x00000065 ret 0x00000066 pop ebp 0x00000067 ret 0x00000068 mov byte ptr [ebp+122D1CA5h], 00000047h 0x0000006f push 00000000h 0x00000071 push ebx 0x00000072 call 00007F2B4D4AC9E8h 0x00000077 pop ebx 0x00000078 mov dword ptr [esp+04h], ebx 0x0000007c add dword ptr [esp+04h], 00000017h 0x00000084 inc ebx 0x00000085 push ebx 0x00000086 ret 0x00000087 pop ebx 0x00000088 ret 0x00000089 mov eax, D49AA7D2h 0x0000008e jc 00007F2B4D4AC9E6h 0x00000094 call 00007F2B4D4AC9ECh 0x00000099 jmp 00007F2B4D4AC9F3h 0x0000009e pop edi 0x0000009f push eax 0x000000a0 push eax 0x000000a1 push edx 0x000000a2 jne 00007F2B4D4AC9F5h 0x000000a8 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE8D55 second address: CE8D69 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F2B4CC6E2ACh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE8FBE second address: CE8FC2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE9137 second address: CE914D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4CC6E2B2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE914D second address: CE9153 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE94DB second address: CE9535 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4CC6E2B7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ecx 0x0000000a push ecx 0x0000000b pop ecx 0x0000000c pop ecx 0x0000000d popad 0x0000000e mov dword ptr [esp], eax 0x00000011 push 00000000h 0x00000013 push esi 0x00000014 call 00007F2B4CC6E2A8h 0x00000019 pop esi 0x0000001a mov dword ptr [esp+04h], esi 0x0000001e add dword ptr [esp+04h], 0000001Ch 0x00000026 inc esi 0x00000027 push esi 0x00000028 ret 0x00000029 pop esi 0x0000002a ret 0x0000002b push 0000001Eh 0x0000002d mov cx, B22Fh 0x00000031 mov edx, dword ptr [ebp+122D33D8h] 0x00000037 nop 0x00000038 push eax 0x00000039 push edx 0x0000003a push eax 0x0000003b push edx 0x0000003c push eax 0x0000003d push edx 0x0000003e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE9535 second address: CE9539 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE9539 second address: CE9543 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F2B4CC6E2A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE9805 second address: CE980F instructions: 0x00000000 rdtsc 0x00000002 js 00007F2B4D4AC9E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE980F second address: CE9836 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F2B4CC6E2A8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp+04h], eax 0x0000000e push edi 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F2B4CC6E2B4h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE9897 second address: CE98C0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4D4AC9ECh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F2B4D4AC9F7h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE98C0 second address: CE98C4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D18BD5 second address: D18BD9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D18BD9 second address: D18BDF instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D18BDF second address: D18BE8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D18BE8 second address: D18BED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D18BED second address: D18BF2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D18BF2 second address: D18BFA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D18BFA second address: D18C0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ecx 0x00000006 jmp 00007F2B4D4AC9EBh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D18D65 second address: D18D6C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D18EFB second address: D18F17 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2B4D4AC9F8h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D18F17 second address: D18F1B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D18F1B second address: D18F27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 pushad 0x0000000a popad 0x0000000b pop ecx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D18F27 second address: D18F2F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D18F2F second address: D18F3C instructions: 0x00000000 rdtsc 0x00000002 je 00007F2B4D4AC9E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D19098 second address: D1909C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1949C second address: D19512 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2B4D4AC9F9h 0x00000009 pushad 0x0000000a popad 0x0000000b jmp 00007F2B4D4AC9F8h 0x00000010 popad 0x00000011 jmp 00007F2B4D4AC9F6h 0x00000016 push eax 0x00000017 push edx 0x00000018 push ebx 0x00000019 jmp 00007F2B4D4AC9ECh 0x0000001e pop ebx 0x0000001f jmp 00007F2B4D4AC9F8h 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D19659 second address: D1969C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 js 00007F2B4CC6E2A6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007F2B4CC6E2B2h 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F2B4CC6E2B0h 0x00000018 jmp 00007F2B4CC6E2B3h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1969C second address: D196AA instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jnp 00007F2B4D4AC9E6h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1E105 second address: D1E10A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1E682 second address: D1E6A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2B4D4AC9F7h 0x00000009 popad 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1E6A1 second address: D1E6AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F2B4CC6E2A6h 0x0000000a push edi 0x0000000b pop edi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1E83E second address: D1E866 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 push edx 0x00000006 pop edx 0x00000007 pop esi 0x00000008 jmp 00007F2B4D4AC9F5h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jo 00007F2B4D4AC9F2h 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1F066 second address: D1F078 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop eax 0x00000007 pushad 0x00000008 push esi 0x00000009 pop esi 0x0000000a je 00007F2B4CC6E2A6h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1F078 second address: D1F09E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007F2B4D4AC9F8h 0x0000000b jnc 00007F2B4D4AC9E6h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D1F09E second address: D1F0A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D279AC second address: D279B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D2AB50 second address: D2AB6C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F2B4CC6E2B6h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D2AB6C second address: D2AB70 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D2AB70 second address: D2AB7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D2A5E2 second address: D2A5F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b jbe 00007F2B4D4AC9E6h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D2A5F3 second address: D2A5F7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D2A88D second address: D2A89A instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D2A89A second address: D2A8A8 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F2B4CC6E2A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D2A8A8 second address: D2A8AC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D33814 second address: D33826 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 jl 00007F2B4CC6E2A6h 0x0000000c popad 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D33826 second address: D3382C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3382C second address: D3383A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a push edx 0x0000000b pop edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3383A second address: D33840 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CA6442 second address: CA6448 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CA6448 second address: CA644C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CA644C second address: CA6467 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4CC6E2B5h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CA6467 second address: CA647E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2B4D4AC9EDh 0x00000009 je 00007F2B4D4AC9E6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CA647E second address: CA6482 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D32357 second address: D32366 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edi 0x00000007 js 00007F2B4D4AC9E8h 0x0000000d push edi 0x0000000e pop edi 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D32627 second address: D3262E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3262E second address: D3263A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 ja 00007F2B4D4AC9E6h 0x0000000a push edi 0x0000000b pop edi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3263A second address: D32666 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jne 00007F2B4CC6E2AEh 0x0000000c pushad 0x0000000d popad 0x0000000e jp 00007F2B4CC6E2A6h 0x00000014 pop edx 0x00000015 pop eax 0x00000016 jnp 00007F2B4CC6E2C6h 0x0000001c js 00007F2B4CC6E2AAh 0x00000022 push ebx 0x00000023 pop ebx 0x00000024 push ecx 0x00000025 pop ecx 0x00000026 push eax 0x00000027 push edx 0x00000028 push esi 0x00000029 pop esi 0x0000002a push eax 0x0000002b push edx 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D32666 second address: D3266A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D32922 second address: D3292C instructions: 0x00000000 rdtsc 0x00000002 jg 00007F2B4CC6E2A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3292C second address: D32934 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D32934 second address: D32938 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D32BA0 second address: D32BB2 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F2B4D4AC9EAh 0x00000008 push eax 0x00000009 push edx 0x0000000a push esi 0x0000000b pop esi 0x0000000c push edi 0x0000000d pop edi 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D32BB2 second address: D32BD2 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F2B4CC6E2A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F2B4CC6E2AFh 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D32BD2 second address: D32BD6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D32BD6 second address: D32BE5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4CC6E2ABh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D36A73 second address: D36A8A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F2B4D4AC9F1h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D36FE0 second address: D36FE4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3727F second address: D37283 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D37283 second address: D3728D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edx 0x00000009 pop edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3B864 second address: D3B880 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2B4D4AC9F7h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3B880 second address: D3B886 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3B886 second address: D3B88C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D3B88C second address: D3B890 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D43BB2 second address: D43BCC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2B4D4AC9F6h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D43BCC second address: D43BDC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a jne 00007F2B4CC6E2A6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D43BDC second address: D43BE0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D43E7A second address: D43E8A instructions: 0x00000000 rdtsc 0x00000002 jg 00007F2B4CC6E2A6h 0x00000008 je 00007F2B4CC6E2A6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4442C second address: D44432 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D44432 second address: D44438 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D44438 second address: D44442 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnp 00007F2B4D4AC9E6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4472A second address: D44746 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4CC6E2AAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jg 00007F2B4CC6E2B2h 0x0000000f jc 00007F2B4CC6E2A6h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D44746 second address: D44756 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jc 00007F2B4D4AC9F6h 0x0000000b pushad 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D44756 second address: D4475C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D44CD8 second address: D44CFF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edi 0x00000007 jne 00007F2B4D4ACA04h 0x0000000d jmp 00007F2B4D4AC9F8h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CA2E0C second address: CA2E1B instructions: 0x00000000 rdtsc 0x00000002 jne 00007F2B4CC6E2A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b pushad 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CA2E1B second address: CA2E24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 push edi 0x00000008 pop edi 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4CF44 second address: D4CF5A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2B4CC6E2ACh 0x00000009 jno 00007F2B4CC6E2A6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4CF5A second address: D4CF5E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4D209 second address: D4D20F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4D20F second address: D4D23A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2B4D4AC9F0h 0x00000009 popad 0x0000000a jmp 00007F2B4D4AC9F6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4D654 second address: D4D663 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2B4CC6E2ABh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4D7F7 second address: D4D801 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D4D801 second address: D4D827 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F2B4CC6E2A6h 0x00000008 push edi 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop esi 0x0000000d push eax 0x0000000e push edx 0x0000000f push edi 0x00000010 jl 00007F2B4CC6E2A6h 0x00000016 pop edi 0x00000017 jmp 00007F2B4CC6E2AFh 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D56833 second address: D56851 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F2B4D4AC9E6h 0x0000000a jmp 00007F2B4D4AC9F2h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D54996 second address: D549B7 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jmp 00007F2B4CC6E2B8h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push edi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D549B7 second address: D549D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F2B4D4AC9F8h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D54E73 second address: D54E77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D54FB1 second address: D54FBC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F2B4D4AC9E6h 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D54FBC second address: D54FC6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D54FC6 second address: D54FCC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D54FCC second address: D54FDD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4CC6E2ADh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D5585A second address: D55873 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4D4AC9F5h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D55873 second address: D55883 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 js 00007F2B4CC6E2A6h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D55883 second address: D55887 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D55887 second address: D5588B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D5588B second address: D558BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2B4D4AC9F8h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jno 00007F2B4D4AC9E6h 0x00000013 jmp 00007F2B4D4AC9EDh 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D558BE second address: D558F2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4CC6E2B7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 jmp 00007F2B4CC6E2B2h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D558F2 second address: D558F6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D558F6 second address: D55902 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F2B4CC6E2A6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D55902 second address: D55908 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D55908 second address: D5590E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D5590E second address: D55912 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D55FDC second address: D55FEB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4CC6E2ABh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D55FEB second address: D55FF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D56680 second address: D56684 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D56684 second address: D56688 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D56688 second address: D56697 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 jne 00007F2B4CC6E2A6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D56697 second address: D5669B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D5C9F1 second address: D5C9F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D5C9F7 second address: D5CA16 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007F2B4D4AC9F7h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D5CA16 second address: D5CA1C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D6853A second address: D68544 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F2B4D4AC9E6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D68544 second address: D68567 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4CC6E2B1h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d popad 0x0000000e push esi 0x0000000f pop esi 0x00000010 pop eax 0x00000011 pop edi 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D68567 second address: D6859B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2B4D4AC9F7h 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F2B4D4AC9F6h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D6859B second address: D685C1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4CC6E2B7h 0x00000007 jmp 00007F2B4CC6E2ABh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D68284 second address: D68294 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4D4AC9EAh 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D6E4F4 second address: D6E4FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D6E4FA second address: D6E4FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D6E4FE second address: D6E504 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D6E504 second address: D6E50E instructions: 0x00000000 rdtsc 0x00000002 js 00007F2B4D4AC9F2h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D71EBF second address: D71EF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 pushad 0x00000007 jno 00007F2B4CC6E2B3h 0x0000000d jmp 00007F2B4CC6E2B0h 0x00000012 push eax 0x00000013 push edx 0x00000014 ja 00007F2B4CC6E2A6h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D88B46 second address: D88B4D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D88B4D second address: D88B5C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4CC6E2AAh 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D8763E second address: D87642 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D87642 second address: D87646 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D87921 second address: D8793A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4D4AC9F5h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D87B14 second address: D87B18 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D87C43 second address: D87C47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D87C47 second address: D87C50 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D87C50 second address: D87C6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2B4D4AC9F5h 0x00000009 push edi 0x0000000a pop edi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D87DA8 second address: D87DB9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jnl 00007F2B4CC6E2A6h 0x0000000f push edx 0x00000010 pop edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D888BF second address: D888D4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4D4AC9F0h 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D8C3C0 second address: D8C3C4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D8C3C4 second address: D8C3D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a pop eax 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D8C3D3 second address: D8C3D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D8C3D8 second address: D8C3DE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D8EC84 second address: D8EC88 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D9A7D7 second address: D9A7E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F2B4D4AC9E8h 0x0000000a pushad 0x0000000b popad 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D9D0E3 second address: D9D104 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push edi 0x00000008 jo 00007F2B4CC6E2A6h 0x0000000e pop edi 0x0000000f jno 00007F2B4CC6E2B2h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: D9D104 second address: D9D109 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DA9C93 second address: DA9CB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2B4CC6E2B7h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DAB80B second address: DAB811 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DAB811 second address: DAB815 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DAB815 second address: DAB824 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DAB824 second address: DAB82B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DAB99E second address: DAB9AC instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F2B4D4AC9E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DAB9AC second address: DAB9B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DAB9B2 second address: DAB9B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DAB9B6 second address: DAB9C9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d jg 00007F2B4CC6E2A6h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DAB9C9 second address: DAB9F7 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F2B4D4AC9E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jmp 00007F2B4D4AC9EDh 0x00000010 jmp 00007F2B4D4AC9F2h 0x00000015 push edi 0x00000016 pop edi 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DC032A second address: DC034B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F2B4CC6E2A6h 0x0000000a pop edx 0x0000000b jmp 00007F2B4CC6E2B2h 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DC034B second address: DC034F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DC049C second address: DC04C2 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F2B4CC6E2A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007F2B4CC6E2B9h 0x0000000f push ebx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DC060F second address: DC0616 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop ecx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DC0E8F second address: DC0E95 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DC0FC4 second address: DC0FDF instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007F2B4D4AC9EBh 0x00000008 push esi 0x00000009 pop esi 0x0000000a pop esi 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push edi 0x00000010 push esi 0x00000011 pop esi 0x00000012 push esi 0x00000013 pop esi 0x00000014 pop edi 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DC1187 second address: DC118B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DC2B92 second address: DC2BB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jmp 00007F2B4D4AC9F9h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DC2BB0 second address: DC2BB6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DC594D second address: DC5954 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DC5C44 second address: DC5D06 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4CC6E2B6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c push 00000000h 0x0000000e push esi 0x0000000f call 00007F2B4CC6E2A8h 0x00000014 pop esi 0x00000015 mov dword ptr [esp+04h], esi 0x00000019 add dword ptr [esp+04h], 00000016h 0x00000021 inc esi 0x00000022 push esi 0x00000023 ret 0x00000024 pop esi 0x00000025 ret 0x00000026 mov edx, dword ptr [ebp+122D2A3Bh] 0x0000002c push dword ptr [ebp+122D1942h] 0x00000032 mov edx, dword ptr [ebp+122D295Fh] 0x00000038 call 00007F2B4CC6E2A9h 0x0000003d jmp 00007F2B4CC6E2B9h 0x00000042 push eax 0x00000043 jmp 00007F2B4CC6E2B7h 0x00000048 mov eax, dword ptr [esp+04h] 0x0000004c push ebx 0x0000004d jmp 00007F2B4CC6E2B5h 0x00000052 pop ebx 0x00000053 mov eax, dword ptr [eax] 0x00000055 push edx 0x00000056 pushad 0x00000057 jnp 00007F2B4CC6E2A6h 0x0000005d pushad 0x0000005e popad 0x0000005f popad 0x00000060 pop edx 0x00000061 mov dword ptr [esp+04h], eax 0x00000065 jc 00007F2B4CC6E2B8h 0x0000006b push eax 0x0000006c push edx 0x0000006d jne 00007F2B4CC6E2A6h 0x00000073 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DC5D06 second address: DC5D0A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DC6F88 second address: DC6F8E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DC6F8E second address: DC6F92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: DC6F92 second address: DC6FAE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 js 00007F2B4CC6E2A6h 0x0000000d push edi 0x0000000e pop edi 0x0000000f popad 0x00000010 push edx 0x00000011 jp 00007F2B4CC6E2A6h 0x00000017 pop edx 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b pop eax 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE39F6 second address: CE39FC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE39FC second address: CE3A00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: CE3A00 second address: CE3A1B instructions: 0x00000000 rdtsc 0x00000002 jo 00007F2B4D4AC9E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d jbe 00007F2B4D4AC9F2h 0x00000013 js 00007F2B4D4AC9ECh 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DE0948 second address: 4DE09AC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F2B4CC6E2AFh 0x00000009 adc ecx, 0878F9FEh 0x0000000f jmp 00007F2B4CC6E2B9h 0x00000014 popfd 0x00000015 mov eax, 112F2E47h 0x0000001a popad 0x0000001b pop edx 0x0000001c pop eax 0x0000001d xchg eax, ebp 0x0000001e pushad 0x0000001f mov ah, bl 0x00000021 popad 0x00000022 push eax 0x00000023 jmp 00007F2B4CC6E2B1h 0x00000028 xchg eax, ebp 0x00000029 pushad 0x0000002a mov bx, ax 0x0000002d mov edx, esi 0x0000002f popad 0x00000030 mov ebp, esp 0x00000032 push eax 0x00000033 push edx 0x00000034 pushad 0x00000035 mov dl, 1Dh 0x00000037 push esi 0x00000038 pop edi 0x00000039 popad 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DE09AC second address: 4DE0A2A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F2B4D4AC9EBh 0x00000009 add esi, 15108A1Eh 0x0000000f jmp 00007F2B4D4AC9F9h 0x00000014 popfd 0x00000015 mov ah, 07h 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a push esp 0x0000001b pushad 0x0000001c mov ax, 83F5h 0x00000020 mov bx, cx 0x00000023 popad 0x00000024 mov dword ptr [esp], ecx 0x00000027 jmp 00007F2B4D4AC9ECh 0x0000002c xchg eax, esi 0x0000002d jmp 00007F2B4D4AC9F0h 0x00000032 push eax 0x00000033 jmp 00007F2B4D4AC9EBh 0x00000038 xchg eax, esi 0x00000039 push eax 0x0000003a push edx 0x0000003b pushad 0x0000003c movsx edx, cx 0x0000003f jmp 00007F2B4D4AC9ECh 0x00000044 popad 0x00000045 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DE0A2A second address: 4DE0A30 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DE0A30 second address: 4DE0A34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DE0A34 second address: 4DE0A38 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DE0A38 second address: 4DE0A5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 lea eax, dword ptr [ebp-04h] 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e jmp 00007F2B4D4AC9F2h 0x00000013 push ecx 0x00000014 pop edi 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DE0A5B second address: 4DE0A69 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2B4CC6E2AAh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DE0A69 second address: 4DE0A8B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F2B4D4AC9ECh 0x0000000e mov dword ptr [esp], eax 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 mov dx, 93B0h 0x00000018 pushad 0x00000019 popad 0x0000001a popad 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DE0AC2 second address: 4DE0AC6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DE0AC6 second address: 4DE0ACC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DE0ACC second address: 4DE0AF2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movzx ecx, di 0x00000006 mov ax, dx 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c cmp dword ptr [ebp-04h], 00000000h 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F2B4CC6E2B4h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD002C second address: 4DD00A6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 jmp 00007F2B4D4AC9F1h 0x0000000d xchg eax, ebp 0x0000000e jmp 00007F2B4D4AC9EEh 0x00000013 mov ebp, esp 0x00000015 jmp 00007F2B4D4AC9F0h 0x0000001a sub esp, 2Ch 0x0000001d pushad 0x0000001e push ecx 0x0000001f mov ax, bx 0x00000022 pop edx 0x00000023 call 00007F2B4D4AC9F6h 0x00000028 call 00007F2B4D4AC9F2h 0x0000002d pop eax 0x0000002e pop edi 0x0000002f popad 0x00000030 xchg eax, ebx 0x00000031 pushad 0x00000032 mov edi, eax 0x00000034 mov di, si 0x00000037 popad 0x00000038 push eax 0x00000039 pushad 0x0000003a push eax 0x0000003b push edx 0x0000003c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD00A6 second address: 4DD00E0 instructions: 0x00000000 rdtsc 0x00000002 mov ax, 7543h 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F2B4CC6E2B8h 0x0000000d popad 0x0000000e xchg eax, ebx 0x0000000f pushad 0x00000010 push ecx 0x00000011 mov ecx, edi 0x00000013 pop edx 0x00000014 mov al, 6Ch 0x00000016 popad 0x00000017 push eax 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007F2B4CC6E2ADh 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD014F second address: 4DD0155 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD0155 second address: 4DD0159 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD0159 second address: 4DD019B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4D4AC9EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b sub ebx, ebx 0x0000000d pushad 0x0000000e jmp 00007F2B4D4AC9F5h 0x00000013 mov ch, E8h 0x00000015 popad 0x00000016 mov edi, 00000000h 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007F2B4D4AC9EFh 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD019B second address: 4DD01B3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2B4CC6E2B4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD01B3 second address: 4DD01CA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4D4AC9EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b inc ebx 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f mov bl, cl 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD01CA second address: 4DD01E8 instructions: 0x00000000 rdtsc 0x00000002 mov eax, ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov ah, dl 0x00000008 popad 0x00000009 test al, al 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F2B4CC6E2B1h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD01E8 second address: 4DD0239 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F2B4D4AC9F7h 0x00000008 pushfd 0x00000009 jmp 00007F2B4D4AC9F8h 0x0000000e sub ah, FFFFFF98h 0x00000011 jmp 00007F2B4D4AC9EBh 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a je 00007F2B4D4ACBC3h 0x00000020 push eax 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 pushad 0x00000025 popad 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD0239 second address: 4DD0254 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4CC6E2B7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD036A second address: 4DD0370 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD0370 second address: 4DD0374 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD0374 second address: 4DD03B3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4D4AC9EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jg 00007F2BBE9AAAEDh 0x00000011 pushad 0x00000012 mov di, ax 0x00000015 mov edx, ecx 0x00000017 popad 0x00000018 js 00007F2B4D4ACA5Eh 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007F2B4D4AC9F9h 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD03B3 second address: 4DD03ED instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4CC6E2B1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 cmp dword ptr [ebp-14h], edi 0x0000000c jmp 00007F2B4CC6E2AEh 0x00000011 jne 00007F2BBE16C368h 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007F2B4CC6E2AAh 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD03ED second address: 4DD03F3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD03F3 second address: 4DD0404 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2B4CC6E2ADh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD0404 second address: 4DD0408 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD0408 second address: 4DD045B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebx, dword ptr [ebp+08h] 0x0000000b pushad 0x0000000c mov bh, 3Fh 0x0000000e pushfd 0x0000000f jmp 00007F2B4CC6E2B4h 0x00000014 adc ah, FFFFFFA8h 0x00000017 jmp 00007F2B4CC6E2ABh 0x0000001c popfd 0x0000001d popad 0x0000001e lea eax, dword ptr [ebp-2Ch] 0x00000021 jmp 00007F2B4CC6E2B6h 0x00000026 xchg eax, esi 0x00000027 push eax 0x00000028 push edx 0x00000029 push eax 0x0000002a push edx 0x0000002b pushad 0x0000002c popad 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD045B second address: 4DD045F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD045F second address: 4DD0465 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD0465 second address: 4DD0494 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F2B4D4AC9F1h 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F2B4D4AC9F3h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD0494 second address: 4DD0498 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD0498 second address: 4DD049E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD049E second address: 4DD04A4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD04A4 second address: 4DD04D0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4D4AC9EEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, esi 0x0000000c jmp 00007F2B4D4AC9F0h 0x00000011 nop 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD04D0 second address: 4DD04D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD04D4 second address: 4DD04D8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD04D8 second address: 4DD04DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD04DE second address: 4DD0546 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4D4AC9F4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b mov dx, 9D34h 0x0000000f pushfd 0x00000010 jmp 00007F2B4D4AC9EDh 0x00000015 or si, A4F6h 0x0000001a jmp 00007F2B4D4AC9F1h 0x0000001f popfd 0x00000020 popad 0x00000021 nop 0x00000022 pushad 0x00000023 mov ax, 8983h 0x00000027 movzx esi, di 0x0000002a popad 0x0000002b push ebp 0x0000002c push eax 0x0000002d push edx 0x0000002e jmp 00007F2B4D4AC9F7h 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DC0D45 second address: 4DC0D4B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DC0D4B second address: 4DC0D6B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ecx 0x00000009 jmp 00007F2B4D4AC9F0h 0x0000000e push eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DC0D6B second address: 4DC0D71 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD0A46 second address: 4DD0A92 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4D4AC9EDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b mov dl, 05h 0x0000000d pushfd 0x0000000e jmp 00007F2B4D4AC9F8h 0x00000013 jmp 00007F2B4D4AC9F5h 0x00000018 popfd 0x00000019 popad 0x0000001a xchg eax, ebp 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD0A92 second address: 4DD0A98 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD0A98 second address: 4DD0ABE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4D4AC9F2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F2B4D4AC9EAh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD0ABE second address: 4DD0AC4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD0B5D second address: 4DD0B63 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD0B63 second address: 4DD0B67 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DD0C2F second address: 4DD0C47 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2B4D4AC9F4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DE0BF1 second address: 4DE0C77 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov di, cx 0x00000006 mov ecx, 5462A42Bh 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f jmp 00007F2B4CC6E2B1h 0x00000014 xchg eax, ebp 0x00000015 pushad 0x00000016 call 00007F2B4CC6E2ACh 0x0000001b pushfd 0x0000001c jmp 00007F2B4CC6E2B2h 0x00000021 xor esi, 7C778618h 0x00000027 jmp 00007F2B4CC6E2ABh 0x0000002c popfd 0x0000002d pop esi 0x0000002e call 00007F2B4CC6E2B9h 0x00000033 pushad 0x00000034 popad 0x00000035 pop ecx 0x00000036 popad 0x00000037 mov ebp, esp 0x00000039 push eax 0x0000003a push edx 0x0000003b push eax 0x0000003c push edx 0x0000003d jmp 00007F2B4CC6E2AFh 0x00000042 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DE0C77 second address: 4DE0C94 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4D4AC9F9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DE0C94 second address: 4DE0C9A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DE0C9A second address: 4DE0CB5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esp 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c movsx edx, si 0x0000000f call 00007F2B4D4AC9EAh 0x00000014 pop esi 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DE0CB5 second address: 4DE0D75 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4CC6E2B0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], esi 0x0000000c jmp 00007F2B4CC6E2B0h 0x00000011 mov esi, dword ptr [ebp+0Ch] 0x00000014 pushad 0x00000015 movzx ecx, dx 0x00000018 pushfd 0x00000019 jmp 00007F2B4CC6E2B3h 0x0000001e jmp 00007F2B4CC6E2B3h 0x00000023 popfd 0x00000024 popad 0x00000025 test esi, esi 0x00000027 pushad 0x00000028 mov ax, bx 0x0000002b popad 0x0000002c je 00007F2BBE14B94Ah 0x00000032 jmp 00007F2B4CC6E2ADh 0x00000037 cmp dword ptr [7632459Ch], 05h 0x0000003e push eax 0x0000003f push edx 0x00000040 pushad 0x00000041 pushfd 0x00000042 jmp 00007F2B4CC6E2B3h 0x00000047 sbb esi, 1C8537CEh 0x0000004d jmp 00007F2B4CC6E2B9h 0x00000052 popfd 0x00000053 jmp 00007F2B4CC6E2B0h 0x00000058 popad 0x00000059 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DE0D75 second address: 4DE0D93 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4D4AC9EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007F2BBE9A20F9h 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 mov edx, 3ABFB2B6h 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DE0E20 second address: 4DE0E24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DE0E24 second address: 4DE0E28 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DE0E28 second address: 4DE0E2E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DE0E77 second address: 4DE0E7B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DE0E7B second address: 4DE0E81 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DE0E81 second address: 4DE0E9E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2B4D4AC9F9h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DE0E9E second address: 4DE0EA2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DE0EA2 second address: 4DE0EBE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop esi 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F2B4D4AC9EFh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DE0EBE second address: 4DE0EDB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2B4CC6E2B9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DE0EDB second address: 4DE0EF6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebp 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F2B4D4AC9F2h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DE0EF6 second address: 4DE0EFC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 4DE0EFC second address: 4DE0F00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbn | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchh | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cert9.db | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcellj | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbic | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcge | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfdd | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihd | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcob | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpo | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnf | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihoh | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclg | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkm | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoadd | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifb | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilc | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblb | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpak | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdaf | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnkno | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\formhistory.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkp | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdil | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdma | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbch | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcm | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklk | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddfffla | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoa | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkld | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgef | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbb | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhi | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddfffla | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnid | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcob | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafa | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncg | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For Account | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjh | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgik | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolb | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdph | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcje | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopg | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnba | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhae | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdo | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjeh | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfci | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliof | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmon | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhm | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhad | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflc | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbai | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajb | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifd | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnm | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemg | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.json | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdno | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgn | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbch | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbg | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahd | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhk | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeap | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfe | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbm | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaoc | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoa | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgk | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkd | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.db | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolaf | Jump to behavior |
Source: C:\Users\user\Desktop\file.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao | Jump to behavior |