Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7B5396 second address: 7B539F instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 pop edx 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7B539F second address: 7B53A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7B53A7 second address: 7B53DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F83146B40CCh 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jg 00007F83146B40DCh 0x00000013 jmp 00007F83146B40D6h 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c pushad 0x0000001d popad 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7B53DD second address: 7B53E3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7B57F9 second address: 7B5808 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 jne 00007F83146B40C6h 0x0000000d push edx 0x0000000e pop edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7B5A61 second address: 7B5A7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8314EA918Fh 0x00000009 jp 00007F8314EA9186h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7B5A7C second address: 7B5A8B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 jbe 00007F83146B40C6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7B5BC1 second address: 7B5BF0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push ebx 0x00000006 jg 00007F8314EA9186h 0x0000000c pop ebx 0x0000000d popad 0x0000000e js 00007F8314EA91B0h 0x00000014 push eax 0x00000015 jmp 00007F8314EA9198h 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7B83F2 second address: 7B845E instructions: 0x00000000 rdtsc 0x00000002 jne 00007F83146B40C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007F83146B40D8h 0x0000000f popad 0x00000010 nop 0x00000011 stc 0x00000012 push 00000000h 0x00000014 push ebx 0x00000015 mov dword ptr [ebp+122D28D7h], ecx 0x0000001b pop ecx 0x0000001c call 00007F83146B40C9h 0x00000021 jmp 00007F83146B40D9h 0x00000026 push eax 0x00000027 push eax 0x00000028 jg 00007F83146B40C8h 0x0000002e pop eax 0x0000002f mov eax, dword ptr [esp+04h] 0x00000033 push eax 0x00000034 push edx 0x00000035 pushad 0x00000036 push edx 0x00000037 pop edx 0x00000038 jne 00007F83146B40C6h 0x0000003e popad 0x0000003f rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7B845E second address: 7B8482 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8314EA9198h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7B8482 second address: 7B8486 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7B8486 second address: 7B848C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7B848C second address: 7B8491 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7B85B9 second address: 7B85C3 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F8314EA9186h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7B85C3 second address: 7B85D5 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 js 00007F83146B40C6h 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7B85D5 second address: 7B85E3 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F8314EA9186h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push esi 0x0000000d pop esi 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7B85E3 second address: 7B86C3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 mov cx, di 0x0000000b push 00000000h 0x0000000d sub dword ptr [ebp+122D2D8Fh], edi 0x00000013 call 00007F83146B40C9h 0x00000018 jl 00007F83146B40D6h 0x0000001e push eax 0x0000001f push esi 0x00000020 jmp 00007F83146B40D2h 0x00000025 pop esi 0x00000026 mov eax, dword ptr [esp+04h] 0x0000002a pushad 0x0000002b jmp 00007F83146B40D1h 0x00000030 jmp 00007F83146B40CFh 0x00000035 popad 0x00000036 mov eax, dword ptr [eax] 0x00000038 jmp 00007F83146B40D5h 0x0000003d mov dword ptr [esp+04h], eax 0x00000041 jmp 00007F83146B40D6h 0x00000046 pop eax 0x00000047 pushad 0x00000048 movzx eax, di 0x0000004b mov edx, esi 0x0000004d popad 0x0000004e push 00000003h 0x00000050 mov edi, ecx 0x00000052 push 00000000h 0x00000054 call 00007F83146B40D7h 0x00000059 add edi, 2AF3090Ah 0x0000005f pop edi 0x00000060 push 00000003h 0x00000062 sub dword ptr [ebp+122D2DB7h], eax 0x00000068 push 851B503Eh 0x0000006d ja 00007F83146B40D0h 0x00000073 pushad 0x00000074 push eax 0x00000075 push edx 0x00000076 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7B86C3 second address: 7B8705 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 xor dword ptr [esp], 451B503Eh 0x0000000e sbb si, 2EE7h 0x00000013 lea ebx, dword ptr [ebp+1244C24Ch] 0x00000019 push 00000000h 0x0000001b push ebp 0x0000001c call 00007F8314EA9188h 0x00000021 pop ebp 0x00000022 mov dword ptr [esp+04h], ebp 0x00000026 add dword ptr [esp+04h], 00000017h 0x0000002e inc ebp 0x0000002f push ebp 0x00000030 ret 0x00000031 pop ebp 0x00000032 ret 0x00000033 movsx edx, dx 0x00000036 xchg eax, ebx 0x00000037 push eax 0x00000038 push edx 0x00000039 push eax 0x0000003a push edx 0x0000003b push ecx 0x0000003c pop ecx 0x0000003d rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7B8705 second address: 7B8714 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F83146B40CBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7B87C2 second address: 7B8806 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov dword ptr [esp], eax 0x00000008 sub dword ptr [ebp+122D19BEh], edi 0x0000000e push 00000000h 0x00000010 push 00000000h 0x00000012 push ecx 0x00000013 call 00007F8314EA9188h 0x00000018 pop ecx 0x00000019 mov dword ptr [esp+04h], ecx 0x0000001d add dword ptr [esp+04h], 00000018h 0x00000025 inc ecx 0x00000026 push ecx 0x00000027 ret 0x00000028 pop ecx 0x00000029 ret 0x0000002a mov ecx, dword ptr [ebp+122D397Dh] 0x00000030 push C60C050Fh 0x00000035 pushad 0x00000036 push eax 0x00000037 push edx 0x00000038 jl 00007F8314EA9186h 0x0000003e rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7B8806 second address: 7B8822 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F83146B40D4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7B8822 second address: 7B8826 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7B8826 second address: 7B88A9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F83146B40CFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a add dword ptr [esp], 39F3FB71h 0x00000011 mov ecx, 47217D8Bh 0x00000016 push 00000003h 0x00000018 mov esi, dword ptr [ebp+122D1FAEh] 0x0000001e sub edx, dword ptr [ebp+122D3A65h] 0x00000024 push 00000000h 0x00000026 mov dword ptr [ebp+122D1A8Bh], eax 0x0000002c push 00000003h 0x0000002e or dword ptr [ebp+122D306Fh], edx 0x00000034 pushad 0x00000035 push edi 0x00000036 mov dword ptr [ebp+122D308Ah], esi 0x0000003c pop ebx 0x0000003d add ax, 02BBh 0x00000042 popad 0x00000043 call 00007F83146B40C9h 0x00000048 jne 00007F83146B40DCh 0x0000004e push eax 0x0000004f pushad 0x00000050 push eax 0x00000051 push edx 0x00000052 jmp 00007F83146B40CDh 0x00000057 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7B88A9 second address: 7B88BD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F8314EA918Ch 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7B88BD second address: 7B8942 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F83146B40CBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e jmp 00007F83146B40D8h 0x00000013 mov eax, dword ptr [eax] 0x00000015 jmp 00007F83146B40CEh 0x0000001a mov dword ptr [esp+04h], eax 0x0000001e ja 00007F83146B40CEh 0x00000024 pop eax 0x00000025 push 00000000h 0x00000027 push ebp 0x00000028 call 00007F83146B40C8h 0x0000002d pop ebp 0x0000002e mov dword ptr [esp+04h], ebp 0x00000032 add dword ptr [esp+04h], 00000017h 0x0000003a inc ebp 0x0000003b push ebp 0x0000003c ret 0x0000003d pop ebp 0x0000003e ret 0x0000003f xor esi, 399D2605h 0x00000045 lea ebx, dword ptr [ebp+1244C257h] 0x0000004b add esi, 5714BCAFh 0x00000051 push eax 0x00000052 pushad 0x00000053 pushad 0x00000054 push eax 0x00000055 push edx 0x00000056 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7B8942 second address: 7B894D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7B894D second address: 7B8951 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7D7FCB second address: 7D800A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jg 00007F8314EA9199h 0x0000000e push eax 0x0000000f push edx 0x00000010 jno 00007F8314EA918Eh 0x00000016 jnl 00007F8314EA918Eh 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7A4623 second address: 7A463E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F83146B40CEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a ja 00007F83146B40C6h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7A463E second address: 7A4644 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7D61A2 second address: 7D61A6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7D6562 second address: 7D6566 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7D6566 second address: 7D6591 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F83146B40D0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jnc 00007F83146B40D7h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7D6591 second address: 7D6597 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7D686F second address: 7D68B2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pushad 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push edi 0x0000000e pop edi 0x0000000f jns 00007F83146B40C6h 0x00000015 pushad 0x00000016 popad 0x00000017 popad 0x00000018 jng 00007F83146B40CAh 0x0000001e pushad 0x0000001f push eax 0x00000020 pop eax 0x00000021 jmp 00007F83146B40D6h 0x00000026 je 00007F83146B40C6h 0x0000002c push eax 0x0000002d push edx 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7D6A25 second address: 7D6A2A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7D6A2A second address: 7D6A34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7D6A34 second address: 7D6A73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jnp 00007F8314EA918Ch 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pushad 0x0000000e jng 00007F8314EA919Eh 0x00000014 jno 00007F8314EA9188h 0x0000001a pushad 0x0000001b pushad 0x0000001c popad 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7D6BA2 second address: 7D6BA8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7D6BA8 second address: 7D6BAC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7D6BAC second address: 7D6BB0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7D6D08 second address: 7D6D0D instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7D7156 second address: 7D7176 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F83146B40D3h 0x0000000c jbe 00007F83146B40C6h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7D7895 second address: 7D78A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 jnl 00007F8314EA9186h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7D78A2 second address: 7D78A6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7D78A6 second address: 7D78AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7D78AC second address: 7D78BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F83146B40CAh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7D78BF second address: 7D78E2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8314EA9197h 0x00000007 push eax 0x00000008 push edx 0x00000009 jnl 00007F8314EA9186h 0x0000000f push eax 0x00000010 pop eax 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7D7E11 second address: 7D7E42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F83146B40C6h 0x0000000a ja 00007F83146B40C6h 0x00000010 js 00007F83146B40C6h 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007F83146B40D6h 0x0000001e push esi 0x0000001f pop esi 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7DA275 second address: 7DA285 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F8314EA9192h 0x00000008 js 00007F8314EA9186h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7DA285 second address: 7DA28D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7DEB47 second address: 7DEB4B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7DEB4B second address: 7DEB4F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7A95FC second address: 7A9603 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E36E1 second address: 7E36E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E36E7 second address: 7E36F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E3874 second address: 7E3883 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jg 00007F83146B40CAh 0x0000000b pushad 0x0000000c popad 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E3883 second address: 7E3888 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E3888 second address: 7E38A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push ecx 0x0000000a pushad 0x0000000b popad 0x0000000c jne 00007F83146B40C6h 0x00000012 pop ecx 0x00000013 pushad 0x00000014 pushad 0x00000015 popad 0x00000016 pushad 0x00000017 popad 0x00000018 push eax 0x00000019 pop eax 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E38A4 second address: 7E38A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E4A0A second address: 7E4A3D instructions: 0x00000000 rdtsc 0x00000002 jne 00007F83146B40C8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b ja 00007F83146B40DEh 0x00000011 mov eax, dword ptr [esp+04h] 0x00000015 pushad 0x00000016 pushad 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E4A3D second address: 7E4A4C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F8314EA9186h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E4A4C second address: 7E4A5B instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov eax, dword ptr [eax] 0x00000009 push eax 0x0000000a push edx 0x0000000b push esi 0x0000000c pushad 0x0000000d popad 0x0000000e pop esi 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E4A5B second address: 7E4A61 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E4A61 second address: 7E4A65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E4A65 second address: 7E4A69 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E4A69 second address: 7E4AE3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp+04h], eax 0x0000000c je 00007F83146B40DEh 0x00000012 jo 00007F83146B40D8h 0x00000018 jmp 00007F83146B40D2h 0x0000001d pop eax 0x0000001e sub dword ptr [ebp+122D306Fh], esi 0x00000024 call 00007F83146B40C9h 0x00000029 jnc 00007F83146B40DCh 0x0000002f push eax 0x00000030 push ebx 0x00000031 jmp 00007F83146B40D7h 0x00000036 pop ebx 0x00000037 mov eax, dword ptr [esp+04h] 0x0000003b push eax 0x0000003c push edx 0x0000003d push eax 0x0000003e pushad 0x0000003f popad 0x00000040 pop eax 0x00000041 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E4AE3 second address: 7E4B12 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F8314EA9188h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [eax] 0x0000000c jmp 00007F8314EA9193h 0x00000011 mov dword ptr [esp+04h], eax 0x00000015 push eax 0x00000016 push edx 0x00000017 jo 00007F8314EA918Ch 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E4B12 second address: 7E4B16 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E4E59 second address: 7E4E7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8314EA9196h 0x00000009 popad 0x0000000a jnp 00007F8314EA918Ch 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E505D second address: 7E5067 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jns 00007F83146B40C6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E56DD second address: 7E56EF instructions: 0x00000000 rdtsc 0x00000002 jns 00007F8314EA9186h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ecx 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push eax 0x00000010 pop eax 0x00000011 pop eax 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E56EF second address: 7E56F4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E56F4 second address: 7E5724 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 xchg eax, ebx 0x00000008 mov di, dx 0x0000000b mov si, bx 0x0000000e nop 0x0000000f push edx 0x00000010 push ecx 0x00000011 jmp 00007F8314EA9194h 0x00000016 pop ecx 0x00000017 pop edx 0x00000018 push eax 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c push edi 0x0000001d pop edi 0x0000001e pushad 0x0000001f popad 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E5A71 second address: 7E5A77 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E5C3E second address: 7E5C91 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8314EA9198h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c push 00000000h 0x0000000e push ecx 0x0000000f call 00007F8314EA9188h 0x00000014 pop ecx 0x00000015 mov dword ptr [esp+04h], ecx 0x00000019 add dword ptr [esp+04h], 00000017h 0x00000021 inc ecx 0x00000022 push ecx 0x00000023 ret 0x00000024 pop ecx 0x00000025 ret 0x00000026 sub edi, dword ptr [ebp+122D3B6Dh] 0x0000002c xchg eax, ebx 0x0000002d push eax 0x0000002e push edx 0x0000002f jng 00007F8314EA918Ch 0x00000035 jl 00007F8314EA9186h 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E61BA second address: 7E61C4 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F83146B40C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E61C4 second address: 7E624C instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jmp 00007F8314EA9193h 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jmp 00007F8314EA9190h 0x00000011 nop 0x00000012 push 00000000h 0x00000014 push esi 0x00000015 call 00007F8314EA9188h 0x0000001a pop esi 0x0000001b mov dword ptr [esp+04h], esi 0x0000001f add dword ptr [esp+04h], 00000017h 0x00000027 inc esi 0x00000028 push esi 0x00000029 ret 0x0000002a pop esi 0x0000002b ret 0x0000002c sub esi, dword ptr [ebp+122D3A09h] 0x00000032 push 00000000h 0x00000034 call 00007F8314EA9196h 0x00000039 add dword ptr [ebp+122D1CE9h], eax 0x0000003f pop esi 0x00000040 push 00000000h 0x00000042 call 00007F8314EA918Bh 0x00000047 pop edi 0x00000048 xchg eax, ebx 0x00000049 push eax 0x0000004a push edx 0x0000004b push eax 0x0000004c push edx 0x0000004d jne 00007F8314EA9186h 0x00000053 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E624C second address: 7E6250 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E6250 second address: 7E6256 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E6256 second address: 7E6276 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F83146B40D5h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E6276 second address: 7E627C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E6A4E second address: 7E6A5D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jbe 00007F83146B40C6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E8572 second address: 7E85B1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8314EA9199h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c js 00007F8314EA918Bh 0x00000012 push ecx 0x00000013 movsx esi, bx 0x00000016 pop edi 0x00000017 push 00000000h 0x00000019 movzx edi, ax 0x0000001c push 00000000h 0x0000001e jnc 00007F8314EA9187h 0x00000024 push eax 0x00000025 pushad 0x00000026 push eax 0x00000027 push edx 0x00000028 push edx 0x00000029 pop edx 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E85B1 second address: 7E85BF instructions: 0x00000000 rdtsc 0x00000002 jg 00007F83146B40C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E85BF second address: 7E85C3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E9051 second address: 7E90BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 jo 00007F83146B40D6h 0x0000000d jne 00007F83146B40D0h 0x00000013 nop 0x00000014 push 00000000h 0x00000016 push edx 0x00000017 call 00007F83146B40C8h 0x0000001c pop edx 0x0000001d mov dword ptr [esp+04h], edx 0x00000021 add dword ptr [esp+04h], 00000015h 0x00000029 inc edx 0x0000002a push edx 0x0000002b ret 0x0000002c pop edx 0x0000002d ret 0x0000002e sub dword ptr [ebp+124465CFh], esi 0x00000034 push 00000000h 0x00000036 push 00000000h 0x00000038 push 00000000h 0x0000003a push edx 0x0000003b call 00007F83146B40C8h 0x00000040 pop edx 0x00000041 mov dword ptr [esp+04h], edx 0x00000045 add dword ptr [esp+04h], 00000017h 0x0000004d inc edx 0x0000004e push edx 0x0000004f ret 0x00000050 pop edx 0x00000051 ret 0x00000052 push eax 0x00000053 pushad 0x00000054 push eax 0x00000055 push edx 0x00000056 jne 00007F83146B40C6h 0x0000005c rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E90BF second address: 7E90CD instructions: 0x00000000 rdtsc 0x00000002 js 00007F8314EA9186h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E9B9B second address: 7E9BA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E9BA0 second address: 7E9BB7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jnp 00007F8314EA9186h 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 push ebx 0x00000012 pop ebx 0x00000013 popad 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7E9BB7 second address: 7E9BBD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7EA579 second address: 7EA5D5 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F8314EA9188h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d jg 00007F8314EA9194h 0x00000013 nop 0x00000014 mov esi, dword ptr [ebp+122D235Fh] 0x0000001a push 00000000h 0x0000001c push 00000000h 0x0000001e push ebx 0x0000001f call 00007F8314EA9188h 0x00000024 pop ebx 0x00000025 mov dword ptr [esp+04h], ebx 0x00000029 add dword ptr [esp+04h], 0000001Ah 0x00000031 inc ebx 0x00000032 push ebx 0x00000033 ret 0x00000034 pop ebx 0x00000035 ret 0x00000036 cld 0x00000037 push 00000000h 0x00000039 mov esi, dword ptr [ebp+122D2DEEh] 0x0000003f xchg eax, ebx 0x00000040 push eax 0x00000041 push edx 0x00000042 push eax 0x00000043 push edx 0x00000044 pushad 0x00000045 popad 0x00000046 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7EA5D5 second address: 7EA5DB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7ECBC9 second address: 7ECBE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jnp 00007F8314EA9197h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7ACD15 second address: 7ACD19 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7ACD19 second address: 7ACD41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F8314EA9190h 0x0000000b push esi 0x0000000c pushad 0x0000000d popad 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 pop esi 0x00000011 popad 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 jnc 00007F8314EA9186h 0x0000001b push eax 0x0000001c pop eax 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7ACD41 second address: 7ACD71 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F83146B40C6h 0x00000008 js 00007F83146B40C6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push esi 0x00000011 pushad 0x00000012 popad 0x00000013 jns 00007F83146B40C6h 0x00000019 pop esi 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007F83146B40D2h 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7ACD71 second address: 7ACD75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7ACD75 second address: 7ACD84 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F83146B40C6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7ACD84 second address: 7ACD8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7F0E5E second address: 7F0E64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7F0E64 second address: 7F0EB3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F8314EA9198h 0x0000000a jmp 00007F8314EA9196h 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 push edi 0x00000015 pop edi 0x00000016 jmp 00007F8314EA9195h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7F0EB3 second address: 7F0EB9 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7F2437 second address: 7F2440 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7F2440 second address: 7F2444 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7F33C3 second address: 7F3449 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 mov dword ptr [esp], eax 0x0000000a mov bl, 81h 0x0000000c call 00007F8314EA9198h 0x00000011 mov bl, 49h 0x00000013 pop edi 0x00000014 push 00000000h 0x00000016 movzx ebx, bx 0x00000019 push 00000000h 0x0000001b push 00000000h 0x0000001d push eax 0x0000001e call 00007F8314EA9188h 0x00000023 pop eax 0x00000024 mov dword ptr [esp+04h], eax 0x00000028 add dword ptr [esp+04h], 00000017h 0x00000030 inc eax 0x00000031 push eax 0x00000032 ret 0x00000033 pop eax 0x00000034 ret 0x00000035 call 00007F8314EA918Ah 0x0000003a mov ebx, dword ptr [ebp+122D380Dh] 0x00000040 pop edi 0x00000041 mov dword ptr [ebp+122D2E2Ah], edx 0x00000047 xchg eax, esi 0x00000048 push esi 0x00000049 pushad 0x0000004a jp 00007F8314EA9186h 0x00000050 jmp 00007F8314EA9192h 0x00000055 popad 0x00000056 pop esi 0x00000057 push eax 0x00000058 pushad 0x00000059 push edi 0x0000005a push eax 0x0000005b push edx 0x0000005c rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7F26D6 second address: 7F26DA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7F358C second address: 7F3590 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7F5392 second address: 7F5398 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7F465F second address: 7F4664 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7F54C7 second address: 7F54E0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F83146B40D5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7F54E0 second address: 7F54FF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 jmp 00007F8314EA918Ch 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e js 00007F8314EA91A6h 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7F7321 second address: 7F73A4 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jp 00007F83146B40C6h 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d push 00000000h 0x0000000f push edx 0x00000010 call 00007F83146B40C8h 0x00000015 pop edx 0x00000016 mov dword ptr [esp+04h], edx 0x0000001a add dword ptr [esp+04h], 00000014h 0x00000022 inc edx 0x00000023 push edx 0x00000024 ret 0x00000025 pop edx 0x00000026 ret 0x00000027 mov di, DC91h 0x0000002b push 00000000h 0x0000002d call 00007F83146B40CAh 0x00000032 jmp 00007F83146B40CBh 0x00000037 pop ebx 0x00000038 push 00000000h 0x0000003a push 00000000h 0x0000003c push ebp 0x0000003d call 00007F83146B40C8h 0x00000042 pop ebp 0x00000043 mov dword ptr [esp+04h], ebp 0x00000047 add dword ptr [esp+04h], 0000001Ah 0x0000004f inc ebp 0x00000050 push ebp 0x00000051 ret 0x00000052 pop ebp 0x00000053 ret 0x00000054 mov ebx, dword ptr [ebp+122D3084h] 0x0000005a xchg eax, esi 0x0000005b pushad 0x0000005c pushad 0x0000005d jnc 00007F83146B40C6h 0x00000063 push edx 0x00000064 pop edx 0x00000065 popad 0x00000066 push eax 0x00000067 push edx 0x00000068 je 00007F83146B40C6h 0x0000006e rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7F752D second address: 7F7532 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7F8707 second address: 7F870C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7F94FB second address: 7F94FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7F94FF second address: 7F95A4 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push ebx 0x0000000d call 00007F83146B40C8h 0x00000012 pop ebx 0x00000013 mov dword ptr [esp+04h], ebx 0x00000017 add dword ptr [esp+04h], 0000001Ch 0x0000001f inc ebx 0x00000020 push ebx 0x00000021 ret 0x00000022 pop ebx 0x00000023 ret 0x00000024 jmp 00007F83146B40D5h 0x00000029 push dword ptr fs:[00000000h] 0x00000030 sub edi, 57289D00h 0x00000036 mov dword ptr fs:[00000000h], esp 0x0000003d xor dword ptr [ebp+122D2D86h], esi 0x00000043 mov eax, dword ptr [ebp+122D1355h] 0x00000049 jmp 00007F83146B40D1h 0x0000004e push FFFFFFFFh 0x00000050 push 00000000h 0x00000052 push eax 0x00000053 call 00007F83146B40C8h 0x00000058 pop eax 0x00000059 mov dword ptr [esp+04h], eax 0x0000005d add dword ptr [esp+04h], 0000001Dh 0x00000065 inc eax 0x00000066 push eax 0x00000067 ret 0x00000068 pop eax 0x00000069 ret 0x0000006a nop 0x0000006b push ecx 0x0000006c jng 00007F83146B40CCh 0x00000072 push eax 0x00000073 push edx 0x00000074 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7F95A4 second address: 7F95B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7F95B0 second address: 7F95B4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7F95B4 second address: 7F95BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7FE682 second address: 7FE68C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7FE68C second address: 7FE690 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7FE838 second address: 7FE863 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007F83146B40D3h 0x00000008 pop esi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d jg 00007F83146B40CCh 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7FE863 second address: 7FE867 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7FFA8B second address: 7FFB3C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edi 0x00000006 push eax 0x00000007 jmp 00007F83146B40D1h 0x0000000c nop 0x0000000d mov dword ptr [ebp+122D308Ah], eax 0x00000013 push dword ptr fs:[00000000h] 0x0000001a push 00000000h 0x0000001c push ecx 0x0000001d call 00007F83146B40C8h 0x00000022 pop ecx 0x00000023 mov dword ptr [esp+04h], ecx 0x00000027 add dword ptr [esp+04h], 00000017h 0x0000002f inc ecx 0x00000030 push ecx 0x00000031 ret 0x00000032 pop ecx 0x00000033 ret 0x00000034 mov dword ptr fs:[00000000h], esp 0x0000003b mov bl, 15h 0x0000003d mov eax, dword ptr [ebp+122D1549h] 0x00000043 jl 00007F83146B40D8h 0x00000049 push edx 0x0000004a call 00007F83146B40CFh 0x0000004f pop ebx 0x00000050 pop ebx 0x00000051 mov dword ptr [ebp+122D2E86h], esi 0x00000057 push FFFFFFFFh 0x00000059 push 00000000h 0x0000005b push ebp 0x0000005c call 00007F83146B40C8h 0x00000061 pop ebp 0x00000062 mov dword ptr [esp+04h], ebp 0x00000066 add dword ptr [esp+04h], 00000019h 0x0000006e inc ebp 0x0000006f push ebp 0x00000070 ret 0x00000071 pop ebp 0x00000072 ret 0x00000073 add bx, 5406h 0x00000078 nop 0x00000079 push eax 0x0000007a push edx 0x0000007b jmp 00007F83146B40D4h 0x00000080 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 806856 second address: 80685A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 80685A second address: 806863 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7AE96F second address: 7AE98F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F8314EA9193h 0x0000000c jne 00007F8314EA9186h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7AE98F second address: 7AE999 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7AE999 second address: 7AE99D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 80B44E second address: 80B458 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F83146B40C6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 80B458 second address: 80B464 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a push edi 0x0000000b pop edi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 80B464 second address: 80B489 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F83146B40D4h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edi 0x0000000c push eax 0x0000000d push edx 0x0000000e jns 00007F83146B40E0h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 80B489 second address: 80B4A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8314EA9194h 0x00000009 js 00007F8314EA9188h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 80F4FB second address: 80F4FF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 80F4FF second address: 80F520 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F8314EA9198h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 80F520 second address: 80F530 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a jns 00007F83146B40C6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8157EF second address: 8157F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8157F5 second address: 815845 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jmp 00007F83146B40D6h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 jmp 00007F83146B40D6h 0x00000015 push ecx 0x00000016 pop ecx 0x00000017 jmp 00007F83146B40CCh 0x0000001c jmp 00007F83146B40CAh 0x00000021 popad 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 815845 second address: 81584A instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 814CEC second address: 814D0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F83146B40D5h 0x00000009 push esi 0x0000000a pop esi 0x0000000b popad 0x0000000c pop edi 0x0000000d push eax 0x0000000e push ecx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 814F6F second address: 814F79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F8314EA9186h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8153FA second address: 8153FE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 819BD8 second address: 819BED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pushad 0x00000007 popad 0x00000008 push edx 0x00000009 pop edx 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jg 00007F8314EA9186h 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 819BED second address: 819C1F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F83146B40D5h 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007F83146B40D1h 0x00000010 popad 0x00000011 push esi 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 819C1F second address: 819C25 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 819C25 second address: 819C29 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 818996 second address: 8189A2 instructions: 0x00000000 rdtsc 0x00000002 je 00007F8314EA9186h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8189A2 second address: 8189A9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7ED70E second address: 7ED714 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7ED714 second address: 7ED77E instructions: 0x00000000 rdtsc 0x00000002 jno 00007F83146B40CCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d push 00000000h 0x0000000f push eax 0x00000010 call 00007F83146B40C8h 0x00000015 pop eax 0x00000016 mov dword ptr [esp+04h], eax 0x0000001a add dword ptr [esp+04h], 00000018h 0x00000022 inc eax 0x00000023 push eax 0x00000024 ret 0x00000025 pop eax 0x00000026 ret 0x00000027 lea eax, dword ptr [ebp+124813F9h] 0x0000002d push 00000000h 0x0000002f push edx 0x00000030 call 00007F83146B40C8h 0x00000035 pop edx 0x00000036 mov dword ptr [esp+04h], edx 0x0000003a add dword ptr [esp+04h], 00000015h 0x00000042 inc edx 0x00000043 push edx 0x00000044 ret 0x00000045 pop edx 0x00000046 ret 0x00000047 or dword ptr [ebp+122D1C25h], ecx 0x0000004d push eax 0x0000004e pushad 0x0000004f jnp 00007F83146B40C8h 0x00000055 push eax 0x00000056 push edx 0x00000057 push edx 0x00000058 pop edx 0x00000059 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7EDE6A second address: 7EDE8B instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xor dword ptr [esp], 105DDA01h 0x0000000f mov dx, BCD2h 0x00000013 call 00007F8314EA9189h 0x00000018 push esi 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c popad 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7EDE8B second address: 7EDE8F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7EDE8F second address: 7EDE9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 push eax 0x00000008 pushad 0x00000009 pushad 0x0000000a push edx 0x0000000b pop edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7EDE9D second address: 7EDEC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jno 00007F83146B40D4h 0x0000000b popad 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 pop eax 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7EDEC1 second address: 7EDECB instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F8314EA9186h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7EDECB second address: 7EDED0 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7EEB86 second address: 7EEB8A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7EEC75 second address: 7EECA8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop esi 0x00000006 mov dword ptr [esp], eax 0x00000009 mov dword ptr [ebp+122D1C25h], edx 0x0000000f jno 00007F83146B40CCh 0x00000015 lea eax, dword ptr [ebp+1248143Dh] 0x0000001b cmc 0x0000001c nop 0x0000001d push eax 0x0000001e push edx 0x0000001f push edx 0x00000020 jmp 00007F83146B40CCh 0x00000025 pop edx 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7EECA8 second address: 7EECB2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jo 00007F8314EA9186h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7EECB2 second address: 7EECB6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7EECB6 second address: 7D009B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jnc 00007F8314EA9196h 0x0000000f jmp 00007F8314EA9190h 0x00000014 nop 0x00000015 push 00000000h 0x00000017 push edx 0x00000018 call 00007F8314EA9188h 0x0000001d pop edx 0x0000001e mov dword ptr [esp+04h], edx 0x00000022 add dword ptr [esp+04h], 0000001Bh 0x0000002a inc edx 0x0000002b push edx 0x0000002c ret 0x0000002d pop edx 0x0000002e ret 0x0000002f pushad 0x00000030 mov dword ptr [ebp+122D1CC2h], ebx 0x00000036 pushad 0x00000037 mov eax, edx 0x00000039 mov edi, esi 0x0000003b popad 0x0000003c popad 0x0000003d lea eax, dword ptr [ebp+124813F9h] 0x00000043 movzx edi, cx 0x00000046 push eax 0x00000047 jmp 00007F8314EA9191h 0x0000004c mov dword ptr [esp], eax 0x0000004f call 00007F8314EA918Eh 0x00000054 pop edi 0x00000055 call dword ptr [ebp+122D31AAh] 0x0000005b jmp 00007F8314EA9191h 0x00000060 push ebx 0x00000061 push eax 0x00000062 push edx 0x00000063 push ebx 0x00000064 pop ebx 0x00000065 jc 00007F8314EA9186h 0x0000006b rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 819457 second address: 81945C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 81945C second address: 819462 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 819462 second address: 819466 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 819714 second address: 819718 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 819718 second address: 819728 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jnc 00007F83146B40C6h 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 819728 second address: 81972C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 81972C second address: 819732 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 819732 second address: 819738 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 819738 second address: 81973C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 81DDAE second address: 81DDB2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 81DDB2 second address: 81DDB6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 81DDB6 second address: 81DDD8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F8314EA9198h 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 81DDD8 second address: 81DE20 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push ebx 0x0000000a jmp 00007F83146B40D7h 0x0000000f push eax 0x00000010 pop eax 0x00000011 pop ebx 0x00000012 jnl 00007F83146B40E4h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 81E240 second address: 81E258 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8314EA9194h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 81E647 second address: 81E65F instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jmp 00007F83146B40D2h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 81E65F second address: 81E68A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8314EA9190h 0x00000007 push edx 0x00000008 jmp 00007F8314EA9190h 0x0000000d pop edx 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 81E68A second address: 81E690 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 81E690 second address: 81E694 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 81E931 second address: 81E93B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F83146B40C6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 81E93B second address: 81E93F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 81E93F second address: 81E94A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 81E94A second address: 81E951 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 81E951 second address: 81E964 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F83146B40CEh 0x00000008 push edx 0x00000009 pop edx 0x0000000a jnl 00007F83146B40C6h 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 81E964 second address: 81E96C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 81EAE5 second address: 81EAEB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 81EAEB second address: 81EAEF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 81EAEF second address: 81EAF3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 81EAF3 second address: 81EB0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jl 00007F8314EA9186h 0x0000000d jl 00007F8314EA9186h 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 81EB0B second address: 81EB0F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 81F03C second address: 81F040 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 81F040 second address: 81F053 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F83146B40CFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 81F053 second address: 81F079 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F8314EA9188h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F8314EA9194h 0x00000011 push eax 0x00000012 push edx 0x00000013 push edx 0x00000014 pop edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 81F079 second address: 81F083 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F83146B40C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 81F083 second address: 81F0A3 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F8314EA9197h 0x00000008 jmp 00007F8314EA9191h 0x0000000d pushad 0x0000000e push edi 0x0000000f pop edi 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8226F0 second address: 822703 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F83146B40CAh 0x00000008 pushad 0x00000009 popad 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f push edi 0x00000010 pop edi 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 82BFC9 second address: 82BFE0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8314EA9191h 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 82B4F4 second address: 82B4FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 82AAC0 second address: 82AACA instructions: 0x00000000 rdtsc 0x00000002 jp 00007F8314EA9186h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 82AACA second address: 82AAD2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 82AAD2 second address: 82AAD6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 82AAD6 second address: 82AAE3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 82AAE3 second address: 82AAE7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 82EDC5 second address: 82EDC9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 82EDC9 second address: 82EDD3 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F8314EA9186h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 82EDD3 second address: 82EDE7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jne 00007F83146B40CEh 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 82EDE7 second address: 82EDF1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jo 00007F8314EA9186h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 82E678 second address: 82E67C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 82E67C second address: 82E6B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 push eax 0x00000008 push edx 0x00000009 push ebx 0x0000000a jmp 00007F8314EA9192h 0x0000000f jl 00007F8314EA9186h 0x00000015 pop ebx 0x00000016 jnc 00007F8314EA9192h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 82E6B1 second address: 82E6C1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F83146B40CAh 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 82E823 second address: 82E83F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8314EA9190h 0x00000009 jg 00007F8314EA9186h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8312F7 second address: 831312 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F83146B40C6h 0x0000000a pop ecx 0x0000000b pop esi 0x0000000c pushad 0x0000000d ja 00007F83146B40C8h 0x00000013 pushad 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 popad 0x00000019 push ecx 0x0000001a pop ecx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 837090 second address: 837094 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 837094 second address: 83709E instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F83146B40C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 837229 second address: 83722D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 83722D second address: 83724F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F83146B40CEh 0x0000000d popad 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 jnp 00007F83146B40C6h 0x00000017 push esi 0x00000018 pop esi 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 83724F second address: 837255 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 837255 second address: 837269 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jl 00007F83146B40D2h 0x0000000c jno 00007F83146B40C6h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 837269 second address: 837281 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jmp 00007F8314EA9191h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 837281 second address: 837290 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F83146B40C6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 837290 second address: 837294 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 83739E second address: 8373C1 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F83146B40C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007F83146B40D9h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 837672 second address: 83767E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 ja 00007F8314EA9186h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 83767E second address: 83768B instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F83146B40C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 83768B second address: 8376B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b popad 0x0000000c pushad 0x0000000d push edi 0x0000000e ja 00007F8314EA9186h 0x00000014 pop edi 0x00000015 jmp 00007F8314EA9191h 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d popad 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8376B5 second address: 8376B9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8376B9 second address: 8376C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8376C5 second address: 8376CB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7EE66F second address: 7EE673 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7EE673 second address: 7EE679 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7EE679 second address: 7EE67F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 7EE67F second address: 7EE6A8 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b call 00007F83146B40CBh 0x00000010 and dl, FFFFFF80h 0x00000013 pop edi 0x00000014 push 00000004h 0x00000016 mov dword ptr [ebp+122D1C14h], edx 0x0000001c push eax 0x0000001d push ecx 0x0000001e pushad 0x0000001f pushad 0x00000020 popad 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 837A7C second address: 837A9C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jmp 00007F8314EA9198h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 837A9C second address: 837AA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 837AA0 second address: 837AA4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 837AA4 second address: 837AC4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 jmp 00007F83146B40D7h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 83ADF6 second address: 83ADFA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 83ADFA second address: 83AE0C instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F83146B40CCh 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 83E69A second address: 83E69E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 83E69E second address: 83E6A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 83E812 second address: 83E83B instructions: 0x00000000 rdtsc 0x00000002 jp 00007F8314EA9186h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b pushad 0x0000000c jp 00007F8314EA91A1h 0x00000012 jmp 00007F8314EA9195h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 83E83B second address: 83E842 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 83E842 second address: 83E848 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 83E994 second address: 83E9AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F83146B40D5h 0x00000009 pop ecx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 83EB10 second address: 83EB1F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8314EA918Bh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 83EB1F second address: 83EB23 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 83EB23 second address: 83EB3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jnp 00007F8314EA9198h 0x00000010 push eax 0x00000011 jp 00007F8314EA9186h 0x00000017 pop eax 0x00000018 push edi 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 844F97 second address: 844F9F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 844F9F second address: 844FAA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 844FAA second address: 844FB0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 844FB0 second address: 844FBF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 pushad 0x00000008 push edi 0x00000009 pushad 0x0000000a popad 0x0000000b pop edi 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 844FBF second address: 844FD9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F83146B40C6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F83146B40CBh 0x00000012 push esi 0x00000013 pop esi 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 844FD9 second address: 844FEC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8314EA918Fh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8454E6 second address: 845505 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a jmp 00007F83146B40D5h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 845D28 second address: 845D64 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F8314EA9186h 0x00000008 jc 00007F8314EA9186h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 jmp 00007F8314EA9199h 0x00000019 push edi 0x0000001a pop edi 0x0000001b jmp 00007F8314EA918Ch 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 845D64 second address: 845D6C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 845D6C second address: 845D70 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 849AE8 second address: 849AF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 849AF1 second address: 849AFA instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pop edi 0x00000006 push ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 849AFA second address: 849B0A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 jo 00007F83146B40DFh 0x0000000d push ecx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 849C73 second address: 849C7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F8314EA9186h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 849C7D second address: 849C8E instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jl 00007F83146B40C6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 849C8E second address: 849CB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F8314EA9186h 0x0000000a popad 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e pushad 0x0000000f popad 0x00000010 jmp 00007F8314EA918Dh 0x00000015 popad 0x00000016 popad 0x00000017 push edi 0x00000018 pushad 0x00000019 jns 00007F8314EA9186h 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 849F63 second address: 849F84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F83146B40C6h 0x0000000a jmp 00007F83146B40D2h 0x0000000f popad 0x00000010 push ebx 0x00000011 push edi 0x00000012 pop edi 0x00000013 pop ebx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 84A109 second address: 84A15C instructions: 0x00000000 rdtsc 0x00000002 jns 00007F8314EA9186h 0x00000008 jmp 00007F8314EA9195h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jnc 00007F8314EA919Bh 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007F8314EA9197h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 84A2C9 second address: 84A2E6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F83146B40D9h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 84A2E6 second address: 84A323 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 jp 00007F8314EA9186h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push edi 0x0000000d jmp 00007F8314EA9199h 0x00000012 jmp 00007F8314EA918Eh 0x00000017 pop edi 0x00000018 pop edx 0x00000019 pop eax 0x0000001a push eax 0x0000001b push edx 0x0000001c push esi 0x0000001d push ebx 0x0000001e pop ebx 0x0000001f pop esi 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 84A4B3 second address: 84A4C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F83146B40CCh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 84A4C3 second address: 84A4D1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jnp 00007F8314EA9186h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 854A9D second address: 854AA1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 854AA1 second address: 854AA5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 854E8E second address: 854EC0 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F83146B40C6h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jne 00007F83146B40D2h 0x00000012 pushad 0x00000013 jmp 00007F83146B40D1h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 854EC0 second address: 854EE3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8314EA9198h 0x00000009 popad 0x0000000a popad 0x0000000b push ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 854EE3 second address: 854EE7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 854EE7 second address: 854EED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8551BE second address: 8551C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 85541A second address: 85543A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8314EA9193h 0x00000009 popad 0x0000000a js 00007F8314EA918Ch 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 85543A second address: 85543E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 85543E second address: 855443 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 855E7D second address: 855E81 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 85660D second address: 856619 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 je 00007F8314EA9186h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 856619 second address: 856624 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 856624 second address: 856647 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F8314EA9199h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 856647 second address: 85666C instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F83146B40C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jmp 00007F83146B40D0h 0x00000010 jl 00007F83146B40C6h 0x00000016 push edi 0x00000017 pop edi 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 85F415 second address: 85F41C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 85F41C second address: 85F422 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 86C0CE second address: 86C0D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 86C0D2 second address: 86C0E7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F83146B40D1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 86C0E7 second address: 86C129 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8314EA9192h 0x00000007 je 00007F8314EA918Ah 0x0000000d pushad 0x0000000e popad 0x0000000f push edx 0x00000010 pop edx 0x00000011 pop edx 0x00000012 pop eax 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007F8314EA918Fh 0x0000001c jmp 00007F8314EA918Fh 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 86C129 second address: 86C157 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F83146B40D7h 0x00000007 push edx 0x00000008 pop edx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007F83146B40D1h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 86BCD7 second address: 86BD0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8314EA9191h 0x00000009 pop esi 0x0000000a pushad 0x0000000b jng 00007F8314EA9186h 0x00000011 jmp 00007F8314EA918Eh 0x00000016 pushad 0x00000017 popad 0x00000018 jne 00007F8314EA9186h 0x0000001e popad 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 86BD0B second address: 86BD25 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F83146B40D4h 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 86BE56 second address: 86BE5C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8710C1 second address: 8710C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8710C5 second address: 8710C9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8710C9 second address: 8710DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jl 00007F83146B40C6h 0x0000000e je 00007F83146B40C6h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 870A96 second address: 870A9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 870A9A second address: 870AA0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 870AA0 second address: 870AA9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8763E0 second address: 8763E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 87E222 second address: 87E22E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F8314EA9186h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 87E086 second address: 87E0C3 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F83146B40DEh 0x00000008 jmp 00007F83146B40D8h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F83146B40D8h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 87E0C3 second address: 87E0C7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 881551 second address: 881557 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 881557 second address: 881570 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 je 00007F8314EA9188h 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push ebx 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 881570 second address: 881574 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8838E4 second address: 8838EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8838EA second address: 88391B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jnc 00007F83146B40CEh 0x0000000b pushad 0x0000000c push esi 0x0000000d pop esi 0x0000000e jc 00007F83146B40C6h 0x00000014 jne 00007F83146B40C6h 0x0000001a popad 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007F83146B40CCh 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8879E7 second address: 8879EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8879EC second address: 8879F6 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F83146B40CCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 887B39 second address: 887B45 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F8314EA9186h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 887B45 second address: 887B5C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F83146B40D1h 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 887B5C second address: 887B60 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 887EC4 second address: 887ED7 instructions: 0x00000000 rdtsc 0x00000002 js 00007F83146B40C6h 0x00000008 jnl 00007F83146B40C6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 887ED7 second address: 887EDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 887EDC second address: 887EE2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 887EE2 second address: 887EE8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 88805F second address: 888065 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 888065 second address: 888070 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 pushad 0x00000006 popad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 888070 second address: 888075 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 888075 second address: 88807A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 88C6FB second address: 88C701 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 88C701 second address: 88C709 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 88C709 second address: 88C718 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F83146B40C6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 88C718 second address: 88C71E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8975B0 second address: 8975CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edx 0x00000006 jl 00007F83146B40C6h 0x0000000c jp 00007F83146B40C6h 0x00000012 pop edx 0x00000013 jo 00007F83146B40D8h 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c popad 0x0000001d push eax 0x0000001e pop eax 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8975CF second address: 8975D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8A5291 second address: 8A52B3 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F83146B40C6h 0x00000008 jmp 00007F83146B40D1h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 push edi 0x00000011 pop edi 0x00000012 push eax 0x00000013 pop eax 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8A512E second address: 8A5148 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F8314EA9191h 0x0000000c push edx 0x0000000d pop edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8A5148 second address: 8A515D instructions: 0x00000000 rdtsc 0x00000002 je 00007F83146B40C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f jnl 00007F83146B40C6h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8AACE1 second address: 8AAD01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F8314EA9199h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8AA81A second address: 8AA833 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jmp 00007F83146B40CBh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jns 00007F83146B40C8h 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8AA833 second address: 8AA83B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8AA83B second address: 8AA83F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8AA83F second address: 8AA895 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8314EA9198h 0x00000007 jmp 00007F8314EA9199h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jmp 00007F8314EA9198h 0x00000013 pop edx 0x00000014 pop eax 0x00000015 push eax 0x00000016 push edx 0x00000017 push ebx 0x00000018 pushad 0x00000019 popad 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8AA895 second address: 8AA89A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8AA89A second address: 8AA8A1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8AA8A1 second address: 8AA8A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8AE4B6 second address: 8AE4BE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 push esi 0x00000007 pop esi 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8AE4BE second address: 8AE4C2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8C19A3 second address: 8C19A8 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8C1B4C second address: 8C1B66 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F83146B40D3h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8C1B66 second address: 8C1B82 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8314EA9192h 0x00000007 jne 00007F8314EA9186h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8C1FD7 second address: 8C2006 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jmp 00007F83146B40CAh 0x00000008 jmp 00007F83146B40CAh 0x0000000d pop edi 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push esi 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F83146B40D2h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8C2323 second address: 8C236F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop eax 0x00000007 pushad 0x00000008 jmp 00007F8314EA9198h 0x0000000d push esi 0x0000000e pop esi 0x0000000f popad 0x00000010 pushad 0x00000011 jmp 00007F8314EA9190h 0x00000016 jl 00007F8314EA9186h 0x0000001c ja 00007F8314EA9186h 0x00000022 pushad 0x00000023 popad 0x00000024 popad 0x00000025 pushad 0x00000026 jne 00007F8314EA9186h 0x0000002c push eax 0x0000002d push edx 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8C24FD second address: 8C2501 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8C2622 second address: 8C262B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8C262B second address: 8C2668 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F83146B40C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b pushad 0x0000000c jmp 00007F83146B40D7h 0x00000011 jnp 00007F83146B40CCh 0x00000017 jne 00007F83146B40C6h 0x0000001d push edx 0x0000001e jmp 00007F83146B40CBh 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8C6BC9 second address: 8C6BCD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8C6DE7 second address: 8C6DF4 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F83146B40C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push edi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8C6DF4 second address: 8C6E4D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 nop 0x00000007 mov edx, 62EE8640h 0x0000000c cmc 0x0000000d push 00000004h 0x0000000f jmp 00007F8314EA9192h 0x00000014 call 00007F8314EA918Fh 0x00000019 add dword ptr [ebp+122D2397h], edx 0x0000001f pop edx 0x00000020 call 00007F8314EA9189h 0x00000025 push eax 0x00000026 push edx 0x00000027 jg 00007F8314EA9197h 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8C6E4D second address: 8C6EAC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F83146B40D1h 0x00000008 jo 00007F83146B40C6h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 jmp 00007F83146B40D7h 0x00000017 mov eax, dword ptr [esp+04h] 0x0000001b pushad 0x0000001c jl 00007F83146B40C8h 0x00000022 push edi 0x00000023 pop edi 0x00000024 pushad 0x00000025 push edi 0x00000026 pop edi 0x00000027 push ecx 0x00000028 pop ecx 0x00000029 popad 0x0000002a popad 0x0000002b mov eax, dword ptr [eax] 0x0000002d push eax 0x0000002e push edx 0x0000002f pushad 0x00000030 jmp 00007F83146B40CAh 0x00000035 jne 00007F83146B40C6h 0x0000003b popad 0x0000003c rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8C6EAC second address: 8C6EE1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8314EA9191h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F8314EA9199h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 8C89BB second address: 8C8A0A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 jns 00007F83146B40C6h 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e jmp 00007F83146B40CDh 0x00000013 pop edx 0x00000014 pop eax 0x00000015 pushad 0x00000016 push edi 0x00000017 pushad 0x00000018 popad 0x00000019 pop edi 0x0000001a jmp 00007F83146B40D7h 0x0000001f pushad 0x00000020 jmp 00007F83146B40D3h 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B08AF second address: 51B08B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B08B3 second address: 51B08C2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F83146B40CBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B08C2 second address: 51B08C8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B08C8 second address: 51B08CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B08CC second address: 51B0959 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 jmp 00007F8314EA918Ch 0x0000000e mov dword ptr [esp], ebp 0x00000011 pushad 0x00000012 mov si, 86DDh 0x00000016 pushfd 0x00000017 jmp 00007F8314EA918Ah 0x0000001c sbb eax, 4C824138h 0x00000022 jmp 00007F8314EA918Bh 0x00000027 popfd 0x00000028 popad 0x00000029 mov ebp, esp 0x0000002b pushad 0x0000002c movzx esi, di 0x0000002f pushfd 0x00000030 jmp 00007F8314EA9191h 0x00000035 or cx, 77D6h 0x0000003a jmp 00007F8314EA9191h 0x0000003f popfd 0x00000040 popad 0x00000041 xchg eax, ecx 0x00000042 jmp 00007F8314EA918Eh 0x00000047 push eax 0x00000048 jmp 00007F8314EA918Bh 0x0000004d xchg eax, ecx 0x0000004e push eax 0x0000004f push edx 0x00000050 push eax 0x00000051 push edx 0x00000052 push eax 0x00000053 push edx 0x00000054 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B0959 second address: 51B095D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B095D second address: 51B0978 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8314EA9197h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B0978 second address: 51B0A29 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov si, dx 0x00000006 mov esi, edx 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ebp 0x0000000c jmp 00007F83146B40CAh 0x00000011 mov dword ptr [esp], esi 0x00000014 pushad 0x00000015 pushfd 0x00000016 jmp 00007F83146B40CEh 0x0000001b and eax, 2777D1E8h 0x00000021 jmp 00007F83146B40CBh 0x00000026 popfd 0x00000027 call 00007F83146B40D8h 0x0000002c mov ax, D2E1h 0x00000030 pop esi 0x00000031 popad 0x00000032 lea eax, dword ptr [ebp-04h] 0x00000035 jmp 00007F83146B40CDh 0x0000003a nop 0x0000003b pushad 0x0000003c pushad 0x0000003d mov si, 5E89h 0x00000041 pushfd 0x00000042 jmp 00007F83146B40D6h 0x00000047 sbb esi, 670409D8h 0x0000004d jmp 00007F83146B40CBh 0x00000052 popfd 0x00000053 popad 0x00000054 push eax 0x00000055 call 00007F83146B40CFh 0x0000005a pop ecx 0x0000005b pop ebx 0x0000005c popad 0x0000005d push eax 0x0000005e pushad 0x0000005f push eax 0x00000060 push edx 0x00000061 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B0A29 second address: 51B0A59 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F8314EA918Eh 0x00000008 sbb eax, 70563B68h 0x0000000e jmp 00007F8314EA918Bh 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 movzx eax, dx 0x00000019 popad 0x0000001a nop 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B0A59 second address: 51B0A75 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F83146B40D8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B0A75 second address: 51B0A9E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8314EA918Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push dword ptr [ebp+08h] 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F8314EA9195h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B0A9E second address: 51B0AAE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F83146B40CCh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B0AF8 second address: 51B0AFE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B0AFE second address: 51B0B36 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov esi, eax 0x0000000a pushad 0x0000000b mov bx, 2760h 0x0000000f mov ax, dx 0x00000012 popad 0x00000013 je 00007F83146B40FFh 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c mov di, si 0x0000001f jmp 00007F83146B40D8h 0x00000024 popad 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B0B5D second address: 51B0B63 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B0B63 second address: 51B0B67 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B0B67 second address: 51B0B6B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B0B6B second address: 51B0BB2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop esi 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007F83146B40D7h 0x00000012 and esi, 1ADC01AEh 0x00000018 jmp 00007F83146B40D9h 0x0000001d popfd 0x0000001e mov ah, BEh 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B0BB2 second address: 51A0010 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ah, 3Dh 0x00000005 pushfd 0x00000006 jmp 00007F8314EA9195h 0x0000000b sub ecx, 18B38096h 0x00000011 jmp 00007F8314EA9191h 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a leave 0x0000001b pushad 0x0000001c mov dx, cx 0x0000001f movzx ecx, dx 0x00000022 popad 0x00000023 retn 0004h 0x00000026 nop 0x00000027 sub esp, 04h 0x0000002a xor ebx, ebx 0x0000002c cmp eax, 00000000h 0x0000002f je 00007F8314EA9328h 0x00000035 mov dword ptr [esp], 0000000Dh 0x0000003c call 00007F8319A2E241h 0x00000041 mov edi, edi 0x00000043 push eax 0x00000044 push edx 0x00000045 push eax 0x00000046 push edx 0x00000047 jmp 00007F8314EA918Ah 0x0000004c rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A0010 second address: 51A0014 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A0014 second address: 51A001A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A001A second address: 51A003D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F83146B40CEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b mov esi, 58E5236Dh 0x00000010 mov ch, 89h 0x00000012 popad 0x00000013 push eax 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A003D second address: 51A0041 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A0041 second address: 51A0052 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F83146B40CDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A0052 second address: 51A0058 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A0058 second address: 51A00BB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F83146B40D3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F83146B40D4h 0x00000013 sbb si, 11C8h 0x00000018 jmp 00007F83146B40CBh 0x0000001d popfd 0x0000001e mov ax, 8B3Fh 0x00000022 popad 0x00000023 mov ebp, esp 0x00000025 jmp 00007F83146B40D2h 0x0000002a sub esp, 2Ch 0x0000002d push eax 0x0000002e push edx 0x0000002f push eax 0x00000030 push edx 0x00000031 push eax 0x00000032 push edx 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A00BB second address: 51A00BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A00BF second address: 51A00C5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A00C5 second address: 51A00D4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8314EA918Bh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A00D4 second address: 51A017A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F83146B40D9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebx 0x0000000c pushad 0x0000000d movzx ecx, dx 0x00000010 push edx 0x00000011 mov cx, C20Bh 0x00000015 pop ecx 0x00000016 popad 0x00000017 push eax 0x00000018 jmp 00007F83146B40CEh 0x0000001d xchg eax, ebx 0x0000001e jmp 00007F83146B40D0h 0x00000023 xchg eax, edi 0x00000024 pushad 0x00000025 call 00007F83146B40CEh 0x0000002a movzx eax, dx 0x0000002d pop edx 0x0000002e pushfd 0x0000002f jmp 00007F83146B40CCh 0x00000034 and ah, FFFFFFA8h 0x00000037 jmp 00007F83146B40CBh 0x0000003c popfd 0x0000003d popad 0x0000003e push eax 0x0000003f jmp 00007F83146B40D9h 0x00000044 xchg eax, edi 0x00000045 push eax 0x00000046 push edx 0x00000047 jmp 00007F83146B40CDh 0x0000004c rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A01D2 second address: 51A01E1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8314EA918Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A01E1 second address: 51A024E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F83146B40CFh 0x00000009 add cx, B06Eh 0x0000000e jmp 00007F83146B40D9h 0x00000013 popfd 0x00000014 pushfd 0x00000015 jmp 00007F83146B40D0h 0x0000001a sbb cl, FFFFFFE8h 0x0000001d jmp 00007F83146B40CBh 0x00000022 popfd 0x00000023 popad 0x00000024 pop edx 0x00000025 pop eax 0x00000026 inc ebx 0x00000027 pushad 0x00000028 call 00007F83146B40D4h 0x0000002d push eax 0x0000002e push edx 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A024E second address: 51A026A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 mov ecx, edx 0x00000007 popad 0x00000008 test al, al 0x0000000a pushad 0x0000000b mov bh, 80h 0x0000000d push ecx 0x0000000e pushad 0x0000000f popad 0x00000010 pop edi 0x00000011 popad 0x00000012 je 00007F8314EA9393h 0x00000018 pushad 0x00000019 push esi 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A02C8 second address: 51A02CE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A02CE second address: 51A02FA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8314EA918Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F8314EA9197h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A02FA second address: 51A0326 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F83146B40D9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F83146B40CCh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A0326 second address: 51A0338 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8314EA918Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A039A second address: 51A0407 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 jg 00007F8384F721B2h 0x0000000c pushad 0x0000000d jmp 00007F83146B40D8h 0x00000012 pushfd 0x00000013 jmp 00007F83146B40D2h 0x00000018 sub al, 00000038h 0x0000001b jmp 00007F83146B40CBh 0x00000020 popfd 0x00000021 popad 0x00000022 js 00007F83146B4151h 0x00000028 jmp 00007F83146B40D6h 0x0000002d cmp dword ptr [ebp-14h], edi 0x00000030 push eax 0x00000031 push edx 0x00000032 push eax 0x00000033 push edx 0x00000034 push eax 0x00000035 push edx 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A0407 second address: 51A040B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A040B second address: 51A040F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A040F second address: 51A0415 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A0415 second address: 51A041B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A041B second address: 51A041F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A041F second address: 51A0423 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A0423 second address: 51A0461 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jne 00007F83857671F6h 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 mov si, dx 0x00000014 pushfd 0x00000015 jmp 00007F8314EA918Bh 0x0000001a adc cl, 0000000Eh 0x0000001d jmp 00007F8314EA9199h 0x00000022 popfd 0x00000023 popad 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A0461 second address: 51A0467 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A0467 second address: 51A046B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A046B second address: 51A048F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebx, dword ptr [ebp+08h] 0x0000000b jmp 00007F83146B40CFh 0x00000010 lea eax, dword ptr [ebp-2Ch] 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 mov ax, A091h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A048F second address: 51A0543 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F8314EA918Eh 0x00000008 and cl, FFFFFFE8h 0x0000000b jmp 00007F8314EA918Bh 0x00000010 popfd 0x00000011 pop edx 0x00000012 pop eax 0x00000013 pushfd 0x00000014 jmp 00007F8314EA9198h 0x00000019 sbb cx, 3448h 0x0000001e jmp 00007F8314EA918Bh 0x00000023 popfd 0x00000024 popad 0x00000025 xchg eax, esi 0x00000026 pushad 0x00000027 pushfd 0x00000028 jmp 00007F8314EA9194h 0x0000002d sub cx, 76A8h 0x00000032 jmp 00007F8314EA918Bh 0x00000037 popfd 0x00000038 pushfd 0x00000039 jmp 00007F8314EA9198h 0x0000003e jmp 00007F8314EA9195h 0x00000043 popfd 0x00000044 popad 0x00000045 push eax 0x00000046 push eax 0x00000047 push edx 0x00000048 jmp 00007F8314EA918Ch 0x0000004d rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A0543 second address: 51A058F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F83146B40CBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a pushad 0x0000000b mov dx, ax 0x0000000e push eax 0x0000000f mov ecx, ebx 0x00000011 pop edi 0x00000012 popad 0x00000013 nop 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 pushfd 0x00000018 jmp 00007F83146B40CBh 0x0000001d and cx, 175Eh 0x00000022 jmp 00007F83146B40D9h 0x00000027 popfd 0x00000028 movzx eax, dx 0x0000002b popad 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A058F second address: 51A05A3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8314EA918Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A05A3 second address: 51A05B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F83146B40CAh 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A05B2 second address: 51A05ED instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8314EA918Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a jmp 00007F8314EA9196h 0x0000000f xchg eax, ebx 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 jmp 00007F8314EA918Dh 0x00000018 mov di, si 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 5190ABD second address: 5190AC3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 5190AC3 second address: 5190AC7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 5190AC7 second address: 5190B57 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 pushad 0x0000000a pushfd 0x0000000b jmp 00007F83146B40D4h 0x00000010 sbb eax, 1DC782E8h 0x00000016 jmp 00007F83146B40CBh 0x0000001b popfd 0x0000001c pushad 0x0000001d push esi 0x0000001e pop edx 0x0000001f mov bh, ah 0x00000021 popad 0x00000022 popad 0x00000023 mov dword ptr [esp], ebp 0x00000026 pushad 0x00000027 call 00007F83146B40D3h 0x0000002c mov ch, 34h 0x0000002e pop ebx 0x0000002f pushfd 0x00000030 jmp 00007F83146B40D2h 0x00000035 and si, 57A8h 0x0000003a jmp 00007F83146B40CBh 0x0000003f popfd 0x00000040 popad 0x00000041 mov ebp, esp 0x00000043 push eax 0x00000044 push edx 0x00000045 jmp 00007F83146B40D5h 0x0000004a rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 5190B57 second address: 5190B7C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8314EA9191h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F8314EA918Dh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 5190B7C second address: 5190BAE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ebx, 2CDB65B2h 0x00000008 mov ecx, edx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 movsx ebx, ax 0x00000014 pushfd 0x00000015 jmp 00007F83146B40CAh 0x0000001a add eax, 2821BEC8h 0x00000020 jmp 00007F83146B40CBh 0x00000025 popfd 0x00000026 popad 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 5190BAE second address: 5190BC6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8314EA9194h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A0A99 second address: 51A0A9F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A0A9F second address: 51A0AD1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8314EA918Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jmp 00007F8314EA9199h 0x00000011 xchg eax, ebp 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A0AD1 second address: 51A0AE4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F83146B40CFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A0AE4 second address: 51A0B9E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F8314EA918Fh 0x00000009 xor eax, 3A7C3E3Eh 0x0000000f jmp 00007F8314EA9199h 0x00000014 popfd 0x00000015 pushfd 0x00000016 jmp 00007F8314EA9190h 0x0000001b or si, 8338h 0x00000020 jmp 00007F8314EA918Bh 0x00000025 popfd 0x00000026 popad 0x00000027 pop edx 0x00000028 pop eax 0x00000029 mov ebp, esp 0x0000002b pushad 0x0000002c push eax 0x0000002d movsx edi, si 0x00000030 pop ecx 0x00000031 pushfd 0x00000032 jmp 00007F8314EA918Dh 0x00000037 xor esi, 7B4D89D6h 0x0000003d jmp 00007F8314EA9191h 0x00000042 popfd 0x00000043 popad 0x00000044 cmp dword ptr [75AB459Ch], 05h 0x0000004b jmp 00007F8314EA918Eh 0x00000050 je 00007F8385757005h 0x00000056 jmp 00007F8314EA9190h 0x0000005b pop ebp 0x0000005c pushad 0x0000005d push eax 0x0000005e push edx 0x0000005f mov cx, D6C3h 0x00000063 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A0C3F second address: 51A0C6C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F83146B40D1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F83146B40D3h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A0C6C second address: 51A0C70 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A0C70 second address: 51A0C76 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A0C76 second address: 51A0CCF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8314EA9194h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d pushad 0x0000000e pushad 0x0000000f call 00007F8314EA9197h 0x00000014 pop ecx 0x00000015 mov cx, dx 0x00000018 popad 0x00000019 push edx 0x0000001a mov ch, 70h 0x0000001c pop edi 0x0000001d popad 0x0000001e mov eax, dword ptr [eax] 0x00000020 push eax 0x00000021 push edx 0x00000022 jmp 00007F8314EA9196h 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A0CCF second address: 51A0D38 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F83146B40CBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d jmp 00007F83146B40D9h 0x00000012 pop eax 0x00000013 pushad 0x00000014 mov cx, 91A3h 0x00000018 jmp 00007F83146B40D8h 0x0000001d popad 0x0000001e call 00007F8384F68F1Eh 0x00000023 push 75A52B70h 0x00000028 push dword ptr fs:[00000000h] 0x0000002f mov eax, dword ptr [esp+10h] 0x00000033 mov dword ptr [esp+10h], ebp 0x00000037 lea ebp, dword ptr [esp+10h] 0x0000003b sub esp, eax 0x0000003d push ebx 0x0000003e push esi 0x0000003f push edi 0x00000040 mov eax, dword ptr [75AB4538h] 0x00000045 xor dword ptr [ebp-04h], eax 0x00000048 xor eax, ebp 0x0000004a push eax 0x0000004b mov dword ptr [ebp-18h], esp 0x0000004e push dword ptr [ebp-08h] 0x00000051 mov eax, dword ptr [ebp-04h] 0x00000054 mov dword ptr [ebp-04h], FFFFFFFEh 0x0000005b mov dword ptr [ebp-08h], eax 0x0000005e lea eax, dword ptr [ebp-10h] 0x00000061 mov dword ptr fs:[00000000h], eax 0x00000067 ret 0x00000068 push eax 0x00000069 push edx 0x0000006a jmp 00007F83146B40D7h 0x0000006f rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A0D38 second address: 51A0D63 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8314EA9199h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 sub esi, esi 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F8314EA918Ah 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A0DCB second address: 51A0DE6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F83146B40D7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A0DE6 second address: 51A0E14 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8314EA9199h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test al, al 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F8314EA918Dh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A0E14 second address: 51A0E1A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A0E1A second address: 51A0E3D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 je 00007F838574CCE9h 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F8314EA9191h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A0E3D second address: 51A0E43 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51A0E43 second address: 51A0E49 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B0C06 second address: 51B0C6B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F83146B40CBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007F83146B40D4h 0x00000011 or cx, 0A48h 0x00000016 jmp 00007F83146B40CBh 0x0000001b popfd 0x0000001c mov esi, 32310DBFh 0x00000021 popad 0x00000022 push eax 0x00000023 pushad 0x00000024 push edi 0x00000025 pushfd 0x00000026 jmp 00007F83146B40CEh 0x0000002b xor si, 4CA8h 0x00000030 jmp 00007F83146B40CBh 0x00000035 popfd 0x00000036 pop ecx 0x00000037 push eax 0x00000038 push edx 0x00000039 push edx 0x0000003a pop eax 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B0C6B second address: 51B0C89 instructions: 0x00000000 rdtsc 0x00000002 mov di, A616h 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F8314EA918Dh 0x0000000f mov ebp, esp 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B0C89 second address: 51B0C90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov dh, 55h 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B0C90 second address: 51B0CBD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, dx 0x00000006 call 00007F8314EA918Dh 0x0000000b pop esi 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push esi 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F8314EA9193h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B0CBD second address: 51B0CC3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B0CC3 second address: 51B0CC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B0CC7 second address: 51B0CCB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B0CCB second address: 51B0D07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], esi 0x0000000b jmp 00007F8314EA9197h 0x00000010 mov esi, dword ptr [ebp+0Ch] 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007F8314EA9195h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B0D07 second address: 51B0D0C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B0D0C second address: 51B0D29 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov bl, 1Bh 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test esi, esi 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F8314EA918Eh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B0D29 second address: 51B0D2D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B0D2D second address: 51B0D33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B0D33 second address: 51B0DB8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F83146B40CEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007F8384F51738h 0x0000000f pushad 0x00000010 pushfd 0x00000011 jmp 00007F83146B40CEh 0x00000016 xor ax, 3E18h 0x0000001b jmp 00007F83146B40CBh 0x00000020 popfd 0x00000021 mov si, A1CFh 0x00000025 popad 0x00000026 cmp dword ptr [75AB459Ch], 05h 0x0000002d pushad 0x0000002e mov si, FBC7h 0x00000032 mov ax, 8D63h 0x00000036 popad 0x00000037 je 00007F8384F697DBh 0x0000003d jmp 00007F83146B40D6h 0x00000042 xchg eax, esi 0x00000043 pushad 0x00000044 mov bh, ch 0x00000046 mov bh, 18h 0x00000048 popad 0x00000049 push eax 0x0000004a push eax 0x0000004b push edx 0x0000004c jmp 00007F83146B40D0h 0x00000051 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B0EAC second address: 51B0EB2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B0EB2 second address: 51B0EB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random(2).exe | RDTSC instruction interceptor: First address: 51B0EB6 second address: 51B0EBA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |