Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DBD9D3 second address: DBD9D9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DBD9D9 second address: DBD9DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DBCAC0 second address: DBCADD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edi 0x00000006 pushad 0x00000007 jmp 00007F8874D4CC94h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DBCC56 second address: DBCC6A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jnc 00007F887475ED96h 0x0000000d jc 00007F887475ED96h 0x00000013 pop eax 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DBCC6A second address: DBCC7E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8874D4CC8Eh 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DBCC7E second address: DBCC82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DBCC82 second address: DBCC86 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DBD0C5 second address: DBD0CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DBF863 second address: DBF867 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DBF9CF second address: DBFA0C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 nop 0x00000007 add ecx, dword ptr [ebp+122D2FDEh] 0x0000000d push 00000000h 0x0000000f add esi, 78FF51EDh 0x00000015 call 00007F887475ED99h 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d jmp 00007F887475EDA9h 0x00000022 pushad 0x00000023 popad 0x00000024 popad 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DBFA0C second address: DBFA62 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8874D4CC8Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push ebx 0x0000000b jmp 00007F8874D4CC8Dh 0x00000010 pop ebx 0x00000011 mov eax, dword ptr [esp+04h] 0x00000015 jmp 00007F8874D4CC99h 0x0000001a mov eax, dword ptr [eax] 0x0000001c ja 00007F8874D4CC8Eh 0x00000022 mov dword ptr [esp+04h], eax 0x00000026 push ecx 0x00000027 push eax 0x00000028 push edx 0x00000029 push edi 0x0000002a pop edi 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DBFA62 second address: DBFA66 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DBFA66 second address: DBFA9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 pop eax 0x00000008 jmp 00007F8874D4CC8Ah 0x0000000d push 00000003h 0x0000000f mov dword ptr [ebp+122D1E3Eh], edx 0x00000015 push 00000000h 0x00000017 mov ecx, dword ptr [ebp+122D2E02h] 0x0000001d push 00000003h 0x0000001f jmp 00007F8874D4CC8Ah 0x00000024 push 6203841Bh 0x00000029 push edi 0x0000002a push esi 0x0000002b push eax 0x0000002c push edx 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DBFA9D second address: DBFACF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop edi 0x00000006 add dword ptr [esp], 5DFC7BE5h 0x0000000d mov edx, dword ptr [ebp+122D2CF2h] 0x00000013 lea ebx, dword ptr [ebp+1245D73Bh] 0x00000019 mov edi, dword ptr [ebp+122D2C92h] 0x0000001f push eax 0x00000020 push eax 0x00000021 push edx 0x00000022 jmp 00007F887475EDA0h 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DBFB23 second address: DBFB3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8874D4CC91h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DBFB3D second address: DBFB41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DE16E4 second address: DE1701 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8874D4CC95h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DE1701 second address: DE171A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475EDA5h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DDF895 second address: DDF89F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F8874D4CC86h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DDFC67 second address: DDFC6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DDFC6B second address: DDFC7E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8874D4CC8Dh 0x00000007 push edi 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DDFC7E second address: DDFC98 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F887475EDA4h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DDFDDF second address: DDFDF8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 jmp 00007F8874D4CC8Ah 0x0000000c pop ebx 0x0000000d popad 0x0000000e push edi 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DDFDF8 second address: DDFDFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DE00CC second address: DE00E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8874D4CC93h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DE00E5 second address: DE00F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jp 00007F887475ED9Eh 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DD801A second address: DD8026 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 push ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DE089A second address: DE08A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DE0FB0 second address: DE0FB4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DAC410 second address: DAC418 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DE763B second address: DE7641 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DE7641 second address: DE764C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F887475ED96h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DE9CD3 second address: DE9CD7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DE9CD7 second address: DE9CE5 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F887475ED96h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DEDF81 second address: DEDF89 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DEDF89 second address: DEDF8D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DEE231 second address: DEE245 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a jp 00007F8874D4CC86h 0x00000010 pop edx 0x00000011 push ebx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DEE507 second address: DEE519 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push esi 0x00000008 pop esi 0x00000009 pushad 0x0000000a popad 0x0000000b pop ecx 0x0000000c pop edi 0x0000000d push eax 0x0000000e push edx 0x0000000f push esi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DEE519 second address: DEE524 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F8874D4CC86h 0x0000000a pop esi 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DEE524 second address: DEE546 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007F887475EDA8h 0x0000000a pop edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DEE6CE second address: DEE6D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F8874D4CC86h 0x0000000a pop edi 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DEE6D9 second address: DEE6F4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475ED9Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jl 00007F887475ED96h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DEE6F4 second address: DEE6F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DEE6F8 second address: DEE6FC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DEE6FC second address: DEE702 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DF29EB second address: DF29F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F887475ED96h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DF29F6 second address: DF29FB instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DF2D7A second address: DF2D80 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DF2D80 second address: DF2D94 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F8874D4CC8Bh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DF2D94 second address: DF2D9A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DF330E second address: DF3329 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F8874D4CC8Ch 0x00000008 jns 00007F8874D4CC86h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 jc 00007F8874D4CC88h 0x00000019 push edi 0x0000001a pop edi 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DF3390 second address: DF3395 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DF3395 second address: DF33AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], ebx 0x0000000c nop 0x0000000d push eax 0x0000000e push edx 0x0000000f jnl 00007F8874D4CC88h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DF33AC second address: DF33C8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475EDA2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DF3E2D second address: DF3ECD instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jmp 00007F8874D4CC94h 0x0000000c nop 0x0000000d push 00000000h 0x0000000f push edx 0x00000010 call 00007F8874D4CC88h 0x00000015 pop edx 0x00000016 mov dword ptr [esp+04h], edx 0x0000001a add dword ptr [esp+04h], 0000001Dh 0x00000022 inc edx 0x00000023 push edx 0x00000024 ret 0x00000025 pop edx 0x00000026 ret 0x00000027 mov dword ptr [ebp+122D3142h], eax 0x0000002d push 00000000h 0x0000002f push 00000000h 0x00000031 push edi 0x00000032 call 00007F8874D4CC88h 0x00000037 pop edi 0x00000038 mov dword ptr [esp+04h], edi 0x0000003c add dword ptr [esp+04h], 0000001Dh 0x00000044 inc edi 0x00000045 push edi 0x00000046 ret 0x00000047 pop edi 0x00000048 ret 0x00000049 ja 00007F8874D4CC8Bh 0x0000004f push 00000000h 0x00000051 jmp 00007F8874D4CC8Ch 0x00000056 push eax 0x00000057 push eax 0x00000058 push edx 0x00000059 jmp 00007F8874D4CC96h 0x0000005e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DF481B second address: DF4897 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475ED9Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F887475EDA4h 0x0000000e popad 0x0000000f nop 0x00000010 mov si, 5AB3h 0x00000014 push 00000000h 0x00000016 push 00000000h 0x00000018 push eax 0x00000019 call 00007F887475ED98h 0x0000001e pop eax 0x0000001f mov dword ptr [esp+04h], eax 0x00000023 add dword ptr [esp+04h], 0000001Ch 0x0000002b inc eax 0x0000002c push eax 0x0000002d ret 0x0000002e pop eax 0x0000002f ret 0x00000030 mov edi, dword ptr [ebp+122D2D4Ah] 0x00000036 push 00000000h 0x00000038 sub dword ptr [ebp+122D1E57h], ebx 0x0000003e xchg eax, ebx 0x0000003f pushad 0x00000040 jmp 00007F887475EDA5h 0x00000045 push eax 0x00000046 push edx 0x00000047 push eax 0x00000048 push edx 0x00000049 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DF4897 second address: DF489B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DF5A2E second address: DF5A34 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DF6EE5 second address: DF6EF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop edi 0x00000006 push eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jg 00007F8874D4CC86h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DF7880 second address: DF7884 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DF7884 second address: DF788A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DF8344 second address: DF839D instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F887475ED96h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edi 0x0000000b push eax 0x0000000c push eax 0x0000000d jmp 00007F887475EDA1h 0x00000012 pop eax 0x00000013 nop 0x00000014 or dword ptr [ebp+122D2C06h], ecx 0x0000001a push 00000000h 0x0000001c push 00000000h 0x0000001e push esi 0x0000001f call 00007F887475ED98h 0x00000024 pop esi 0x00000025 mov dword ptr [esp+04h], esi 0x00000029 add dword ptr [esp+04h], 00000019h 0x00000031 inc esi 0x00000032 push esi 0x00000033 ret 0x00000034 pop esi 0x00000035 ret 0x00000036 push 00000000h 0x00000038 push eax 0x00000039 pushad 0x0000003a jno 00007F887475ED98h 0x00000040 push eax 0x00000041 push edx 0x00000042 push edx 0x00000043 pop edx 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DF839D second address: DF83A1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DFC153 second address: DFC157 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DFC157 second address: DFC15B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DF8C82 second address: DF8CA5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F887475ED96h 0x0000000a popad 0x0000000b jmp 00007F887475EDA0h 0x00000010 popad 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DFC15B second address: DFC1B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jng 00007F8874D4CC8Ch 0x0000000c jns 00007F8874D4CC86h 0x00000012 popad 0x00000013 push eax 0x00000014 pushad 0x00000015 jng 00007F8874D4CC88h 0x0000001b pushad 0x0000001c popad 0x0000001d pushad 0x0000001e jp 00007F8874D4CC86h 0x00000024 jne 00007F8874D4CC86h 0x0000002a popad 0x0000002b popad 0x0000002c nop 0x0000002d mov bh, cl 0x0000002f push 00000000h 0x00000031 push 00000000h 0x00000033 jmp 00007F8874D4CC92h 0x00000038 xchg eax, esi 0x00000039 pushad 0x0000003a jno 00007F8874D4CC8Ch 0x00000040 push eax 0x00000041 push edx 0x00000042 push ebx 0x00000043 pop ebx 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DF8CA5 second address: DF8CA9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DF8CA9 second address: DF8CAD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DF8CAD second address: DF8CB3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DF8CB3 second address: DF8CB8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E03422 second address: E03429 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E01471 second address: E01475 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E03429 second address: E0344A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jnc 00007F887475ED96h 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e push ebx 0x0000000f jmp 00007F887475EDA0h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E01475 second address: E0151A instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F8874D4CC95h 0x0000000b popad 0x0000000c mov dword ptr [esp], eax 0x0000000f mov di, bx 0x00000012 mov dword ptr [ebp+12464E19h], edx 0x00000018 push dword ptr fs:[00000000h] 0x0000001f or di, ECCBh 0x00000024 mov dword ptr fs:[00000000h], esp 0x0000002b or dword ptr [ebp+122D1D85h], esi 0x00000031 mov eax, dword ptr [ebp+122D0E09h] 0x00000037 mov edi, dword ptr [ebp+122D304Ch] 0x0000003d push FFFFFFFFh 0x0000003f push 00000000h 0x00000041 push edi 0x00000042 call 00007F8874D4CC88h 0x00000047 pop edi 0x00000048 mov dword ptr [esp+04h], edi 0x0000004c add dword ptr [esp+04h], 00000017h 0x00000054 inc edi 0x00000055 push edi 0x00000056 ret 0x00000057 pop edi 0x00000058 ret 0x00000059 xor dword ptr [ebp+122D315Bh], edx 0x0000005f nop 0x00000060 jmp 00007F8874D4CC99h 0x00000065 push eax 0x00000066 jo 00007F8874D4CC9Ch 0x0000006c push eax 0x0000006d push edx 0x0000006e jmp 00007F8874D4CC8Eh 0x00000073 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E03A2E second address: E03A47 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475ED9Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d pushad 0x0000000e popad 0x0000000f pop ecx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E03A47 second address: E03ABD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8874D4CC8Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push 00000000h 0x0000000c push ebp 0x0000000d call 00007F8874D4CC88h 0x00000012 pop ebp 0x00000013 mov dword ptr [esp+04h], ebp 0x00000017 add dword ptr [esp+04h], 00000015h 0x0000001f inc ebp 0x00000020 push ebp 0x00000021 ret 0x00000022 pop ebp 0x00000023 ret 0x00000024 add dword ptr [ebp+122D26D6h], eax 0x0000002a jo 00007F8874D4CC8Bh 0x00000030 xor bx, 97EFh 0x00000035 push 00000000h 0x00000037 mov ebx, 70E59A7Bh 0x0000003c push 00000000h 0x0000003e push 00000000h 0x00000040 push ebx 0x00000041 call 00007F8874D4CC88h 0x00000046 pop ebx 0x00000047 mov dword ptr [esp+04h], ebx 0x0000004b add dword ptr [esp+04h], 00000014h 0x00000053 inc ebx 0x00000054 push ebx 0x00000055 ret 0x00000056 pop ebx 0x00000057 ret 0x00000058 push eax 0x00000059 pushad 0x0000005a pushad 0x0000005b push ecx 0x0000005c pop ecx 0x0000005d jne 00007F8874D4CC86h 0x00000063 popad 0x00000064 pushad 0x00000065 push eax 0x00000066 push edx 0x00000067 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E04AB0 second address: E04AB5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E06A9F second address: E06AB2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8874D4CC8Fh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E06AB2 second address: E06AC3 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F887475ED96h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E07B21 second address: E07B25 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E07B25 second address: E07B3F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475EDA6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E07B3F second address: E07BD1 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jnc 00007F8874D4CC86h 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp], eax 0x0000000f push 00000000h 0x00000011 push ebx 0x00000012 call 00007F8874D4CC88h 0x00000017 pop ebx 0x00000018 mov dword ptr [esp+04h], ebx 0x0000001c add dword ptr [esp+04h], 00000019h 0x00000024 inc ebx 0x00000025 push ebx 0x00000026 ret 0x00000027 pop ebx 0x00000028 ret 0x00000029 mov edi, dword ptr [ebp+122D59C8h] 0x0000002f xor di, 53EDh 0x00000034 push 00000000h 0x00000036 add ebx, dword ptr [ebp+122D2F0Eh] 0x0000003c push 00000000h 0x0000003e push 00000000h 0x00000040 push edx 0x00000041 call 00007F8874D4CC88h 0x00000046 pop edx 0x00000047 mov dword ptr [esp+04h], edx 0x0000004b add dword ptr [esp+04h], 00000014h 0x00000053 inc edx 0x00000054 push edx 0x00000055 ret 0x00000056 pop edx 0x00000057 ret 0x00000058 or dword ptr [ebp+122D266Dh], eax 0x0000005e js 00007F8874D4CC8Bh 0x00000064 and bx, 0B43h 0x00000069 xchg eax, esi 0x0000006a push ecx 0x0000006b push edx 0x0000006c push ebx 0x0000006d pop ebx 0x0000006e pop edx 0x0000006f pop ecx 0x00000070 push eax 0x00000071 jp 00007F8874D4CCB3h 0x00000077 push eax 0x00000078 push edx 0x00000079 jmp 00007F8874D4CC90h 0x0000007e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E05C63 second address: E05C7E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475EDA3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c pop eax 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E06C75 second address: E06C7A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E08CA8 second address: E08CAD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E08CAD second address: E08CB3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E08CB3 second address: E08CD7 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007F887475EDA5h 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E08CD7 second address: E08CF0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8874D4CC95h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E0B547 second address: E0B54B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E0C52F second address: E0C535 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E0B681 second address: E0B685 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E0C535 second address: E0C53A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E0B685 second address: E0B68B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E0B68B second address: E0B715 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8874D4CC8Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c and bx, 6E9Eh 0x00000011 push dword ptr fs:[00000000h] 0x00000018 jns 00007F8874D4CC89h 0x0000001e mov dword ptr fs:[00000000h], esp 0x00000025 push 00000000h 0x00000027 push ebx 0x00000028 call 00007F8874D4CC88h 0x0000002d pop ebx 0x0000002e mov dword ptr [esp+04h], ebx 0x00000032 add dword ptr [esp+04h], 00000014h 0x0000003a inc ebx 0x0000003b push ebx 0x0000003c ret 0x0000003d pop ebx 0x0000003e ret 0x0000003f mov eax, dword ptr [ebp+122D0DA5h] 0x00000045 call 00007F8874D4CC8Fh 0x0000004a mov ebx, 4C08D1B8h 0x0000004f pop ebx 0x00000050 push FFFFFFFFh 0x00000052 push 00000000h 0x00000054 push edi 0x00000055 call 00007F8874D4CC88h 0x0000005a pop edi 0x0000005b mov dword ptr [esp+04h], edi 0x0000005f add dword ptr [esp+04h], 00000015h 0x00000067 inc edi 0x00000068 push edi 0x00000069 ret 0x0000006a pop edi 0x0000006b ret 0x0000006c nop 0x0000006d push edi 0x0000006e push eax 0x0000006f push edx 0x00000070 push edi 0x00000071 pop edi 0x00000072 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E0B715 second address: E0B739 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475EDA8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edi 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E0B739 second address: E0B73D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E0E447 second address: E0E464 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475EDA2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push eax 0x0000000e pop eax 0x0000000f pop eax 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E0C78E second address: E0C793 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E0B73D second address: E0B743 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E0E464 second address: E0E46A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E0B743 second address: E0B749 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E0E46A second address: E0E4EE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8874D4CC8Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c push 00000000h 0x0000000e push ebp 0x0000000f call 00007F8874D4CC88h 0x00000014 pop ebp 0x00000015 mov dword ptr [esp+04h], ebp 0x00000019 add dword ptr [esp+04h], 00000017h 0x00000021 inc ebp 0x00000022 push ebp 0x00000023 ret 0x00000024 pop ebp 0x00000025 ret 0x00000026 mov dword ptr [ebp+1247EA4Bh], edx 0x0000002c call 00007F8874D4CC8Ah 0x00000031 mov ebx, dword ptr [ebp+122D2C8Eh] 0x00000037 pop ebx 0x00000038 push 00000000h 0x0000003a mov ebx, dword ptr [ebp+1247EA4Bh] 0x00000040 push 00000000h 0x00000042 push 00000000h 0x00000044 push ebx 0x00000045 call 00007F8874D4CC88h 0x0000004a pop ebx 0x0000004b mov dword ptr [esp+04h], ebx 0x0000004f add dword ptr [esp+04h], 00000014h 0x00000057 inc ebx 0x00000058 push ebx 0x00000059 ret 0x0000005a pop ebx 0x0000005b ret 0x0000005c mov dword ptr [ebp+122D281Dh], ecx 0x00000062 push eax 0x00000063 push eax 0x00000064 push edx 0x00000065 jne 00007F8874D4CC8Ch 0x0000006b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E0E4EE second address: E0E500 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F887475ED9Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E10BCC second address: E10BE7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F8874D4CC96h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E10BE7 second address: E10BF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push edi 0x0000000d pop edi 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E10BF5 second address: E10BFB instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E1367C second address: E13680 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E13680 second address: E136A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 ja 00007F8874D4CC86h 0x0000000d push eax 0x0000000e pop eax 0x0000000f popad 0x00000010 pop esi 0x00000011 pushad 0x00000012 jmp 00007F8874D4CC8Bh 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E136A0 second address: E136C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F887475EDA9h 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c jno 00007F887475ED96h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E14E63 second address: E14E7D instructions: 0x00000000 rdtsc 0x00000002 js 00007F8874D4CC86h 0x00000008 jmp 00007F8874D4CC90h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E18C14 second address: E18C1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E18C1A second address: E18C1F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E18C1F second address: E18C24 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E18F44 second address: E18F60 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8874D4CC90h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jo 00007F8874D4CC8Eh 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E18F60 second address: E18F66 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E1D6BB second address: E1D6BF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E1D6BF second address: E1D6C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E1D6C9 second address: E1D6CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E1D6CD second address: E1D6D1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E1D6D1 second address: E1D6FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 jmp 00007F8874D4CC99h 0x0000000e jbe 00007F8874D4CC8Ch 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E1D6FB second address: E1D719 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov eax, dword ptr [esp+04h] 0x00000009 jmp 00007F887475ED9Ah 0x0000000e mov eax, dword ptr [eax] 0x00000010 push esi 0x00000011 jp 00007F887475ED9Ch 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E24092 second address: E2409C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop ebx 0x00000007 push ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E2409C second address: E240A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E241F5 second address: E24214 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnp 00007F8874D4CC86h 0x0000000a jmp 00007F8874D4CC95h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E24214 second address: E24218 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E2490D second address: E24927 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8874D4CC96h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E24927 second address: E24940 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F887475ED96h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push ecx 0x0000000e pushad 0x0000000f popad 0x00000010 pop ecx 0x00000011 jns 00007F887475ED98h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E24940 second address: E24945 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E24945 second address: E2494B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DFA144 second address: DFA15C instructions: 0x00000000 rdtsc 0x00000002 jns 00007F8874D4CC86h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c push edi 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f pop edi 0x00000010 je 00007F8874D4CC8Ch 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DFA15C second address: DD801A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 nop 0x00000006 call 00007F887475ED9Ch 0x0000000b mov ecx, dword ptr [ebp+122D2F7Ah] 0x00000011 pop edx 0x00000012 call dword ptr [ebp+122D3B70h] 0x00000018 js 00007F887475EDA0h 0x0000001e pushad 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DFA73C second address: DFA75C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F8874D4CC98h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DFA75C second address: DFA760 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DFA87F second address: DFA883 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DFA883 second address: DFA893 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 xchg eax, esi 0x00000008 mov dh, E1h 0x0000000a nop 0x0000000b push edi 0x0000000c push eax 0x0000000d push edx 0x0000000e push edi 0x0000000f pop edi 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DFA893 second address: DFA897 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DFAFC8 second address: DFAFCE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DFB150 second address: DFB155 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DFB2DF second address: DFB2E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DFB2E3 second address: DFB307 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 mov eax, dword ptr [esp+04h] 0x0000000b push ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F8874D4CC96h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DFB307 second address: DFB315 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 mov eax, dword ptr [eax] 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push esi 0x0000000d pop esi 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DFB3AA second address: DFB411 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F8874D4CC88h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d push 00000000h 0x0000000f push ebx 0x00000010 call 00007F8874D4CC88h 0x00000015 pop ebx 0x00000016 mov dword ptr [esp+04h], ebx 0x0000001a add dword ptr [esp+04h], 0000001Dh 0x00000022 inc ebx 0x00000023 push ebx 0x00000024 ret 0x00000025 pop ebx 0x00000026 ret 0x00000027 cmc 0x00000028 lea eax, dword ptr [ebp+12497E68h] 0x0000002e push 00000000h 0x00000030 push ebx 0x00000031 call 00007F8874D4CC88h 0x00000036 pop ebx 0x00000037 mov dword ptr [esp+04h], ebx 0x0000003b add dword ptr [esp+04h], 00000014h 0x00000043 inc ebx 0x00000044 push ebx 0x00000045 ret 0x00000046 pop ebx 0x00000047 ret 0x00000048 mov cx, bx 0x0000004b nop 0x0000004c push eax 0x0000004d push edx 0x0000004e jmp 00007F8874D4CC8Ah 0x00000053 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DFB411 second address: DFB435 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a jmp 00007F887475EDA2h 0x0000000f push eax 0x00000010 push edx 0x00000011 ja 00007F887475ED96h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DFB435 second address: DFB477 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 lea eax, dword ptr [ebp+12497E24h] 0x0000000e mov dword ptr [ebp+122D1CF7h], edi 0x00000014 jmp 00007F8874D4CC91h 0x00000019 nop 0x0000001a js 00007F8874D4CC8Ah 0x00000020 push ecx 0x00000021 push edx 0x00000022 pop edx 0x00000023 pop ecx 0x00000024 push eax 0x00000025 push eax 0x00000026 push edx 0x00000027 jmp 00007F8874D4CC8Fh 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DFB477 second address: DFB47C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DFB47C second address: DD8B85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a jl 00007F8874D4CC88h 0x00000010 mov cl, bl 0x00000012 call dword ptr [ebp+122D3903h] 0x00000018 pushad 0x00000019 push eax 0x0000001a push edx 0x0000001b jng 00007F8874D4CC86h 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DD8B85 second address: DD8B89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DD8B89 second address: DD8BC2 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edi 0x00000009 jc 00007F8874D4CC86h 0x0000000f pop edi 0x00000010 jns 00007F8874D4CC8Ah 0x00000016 popad 0x00000017 jo 00007F8874D4CCA4h 0x0000001d push eax 0x0000001e push edx 0x0000001f jmp 00007F8874D4CC96h 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E2D3A4 second address: E2D3AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E2D3AA second address: E2D3B8 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F8874D4CC86h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E2D509 second address: E2D544 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475EDA5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007F887475EDA0h 0x00000013 jmp 00007F887475ED9Ah 0x00000018 pushad 0x00000019 popad 0x0000001a popad 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E2D6B2 second address: E2D6C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8874D4CC90h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E2D6C8 second address: E2D6CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E2D6CD second address: E2D6D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E2D6D3 second address: E2D6D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E2D98C second address: E2D992 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E2DC0F second address: E2DC30 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F887475ED9Ah 0x00000009 jmp 00007F887475EDA3h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E2DD98 second address: E2DD9E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E2F82F second address: E2F877 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475EDA2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push esi 0x0000000b push esi 0x0000000c pop esi 0x0000000d pop esi 0x0000000e jmp 00007F887475ED9Fh 0x00000013 push edx 0x00000014 je 00007F887475ED96h 0x0000001a pop edx 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007F887475EDA2h 0x00000022 pushad 0x00000023 popad 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E2F877 second address: E2F87D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E349CE second address: E349D2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E35994 second address: E35998 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E38DD2 second address: E38DDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F887475ED96h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E38DDC second address: E38DE2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E38DE2 second address: E38DE8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E38DE8 second address: E38E0C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8874D4CC8Fh 0x00000007 push eax 0x00000008 push edx 0x00000009 push edi 0x0000000a pop edi 0x0000000b jmp 00007F8874D4CC8Fh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E3DBCC second address: E3DBD2 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E3DBD2 second address: E3DBDE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 js 00007F8874D4CC86h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E3DD57 second address: E3DD67 instructions: 0x00000000 rdtsc 0x00000002 js 00007F887475ED96h 0x00000008 jns 00007F887475ED96h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E3DE90 second address: E3DE9A instructions: 0x00000000 rdtsc 0x00000002 jo 00007F8874D4CC86h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E3DFEA second address: E3DFF1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E3DFF1 second address: E3DFF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E3DFF7 second address: E3E01F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F887475ED9Eh 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d js 00007F887475ED9Ah 0x00000013 pushad 0x00000014 popad 0x00000015 pushad 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 jg 00007F887475ED96h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E3E144 second address: E3E149 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E3E2EF second address: E3E2F3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E3E2F3 second address: E3E309 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8874D4CC90h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E3E309 second address: E3E319 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 js 00007F887475ED96h 0x0000000b pop ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E3E319 second address: E3E31D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E3E31D second address: E3E321 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E3E321 second address: E3E34B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jmp 00007F8874D4CC97h 0x00000010 jc 00007F8874D4CC99h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E41EE9 second address: E41F10 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jne 00007F887475ED96h 0x0000000b jmp 00007F887475EDA1h 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 jnp 00007F887475ED96h 0x00000019 push eax 0x0000001a pop eax 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E42044 second address: E4208A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jp 00007F8874D4CC8Ch 0x0000000d jnp 00007F8874D4CC86h 0x00000013 jno 00007F8874D4CC8Eh 0x00000019 popad 0x0000001a push ebx 0x0000001b jnc 00007F8874D4CC9Fh 0x00000021 push eax 0x00000022 push edx 0x00000023 pushad 0x00000024 popad 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E44D2A second address: E44D30 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E44D30 second address: E44D48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push esi 0x0000000a pop esi 0x0000000b jmp 00007F8874D4CC8Dh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E44D48 second address: E44D4C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E44D4C second address: E44D52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E44ECA second address: E44ECE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E44ECE second address: E44ED4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E44ED4 second address: E44EDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E44EDA second address: E44EF3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F8874D4CC93h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E450A3 second address: E450B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jnc 00007F887475ED9Ah 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E450B5 second address: E450BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E4B1C9 second address: E4B1F9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push esi 0x0000000a pop esi 0x0000000b push edx 0x0000000c pop edx 0x0000000d jmp 00007F887475EDA8h 0x00000012 popad 0x00000013 jc 00007F887475ED9Eh 0x00000019 pushad 0x0000001a popad 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DAA90E second address: DAA914 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DAA914 second address: DAA91A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DAA91A second address: DAA91F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DAA91F second address: DAA927 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DAA927 second address: DAA92B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DAA92B second address: DAA95B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475ED9Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ecx 0x0000000c jl 00007F887475EDA6h 0x00000012 jmp 00007F887475EDA0h 0x00000017 push eax 0x00000018 push edx 0x00000019 push ecx 0x0000001a pop ecx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E4A47C second address: E4A484 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E4A484 second address: E4A4A6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jns 00007F887475ED96h 0x00000009 jmp 00007F887475EDA1h 0x0000000e jnc 00007F887475ED96h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E4A4A6 second address: E4A4CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jo 00007F8874D4CCA4h 0x0000000b jmp 00007F8874D4CC98h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E4A5F2 second address: E4A5FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F887475ED96h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E4A5FC second address: E4A602 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E4ABC7 second address: E4ABD8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F887475ED9Dh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E4ABD8 second address: E4ABF2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8874D4CC94h 0x00000007 push edx 0x00000008 pop edx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E4ABF2 second address: E4AC07 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007F887475ED9Ch 0x00000008 pop esi 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E4AC07 second address: E4AC0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E4AC0D second address: E4AC33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jmp 00007F887475EDA8h 0x0000000f push eax 0x00000010 push edx 0x00000011 push edx 0x00000012 pop edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E4AC33 second address: E4AC4A instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 jc 00007F8874D4CC86h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jnc 00007F8874D4CC86h 0x00000013 push eax 0x00000014 pop eax 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E4E359 second address: E4E35E instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E5294D second address: E52951 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E52951 second address: E52961 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 jng 00007F887475ED96h 0x0000000d pushad 0x0000000e popad 0x0000000f pop ecx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E52961 second address: E5296C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jbe 00007F8874D4CC86h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E5296C second address: E52979 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E52979 second address: E5297D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DFAD70 second address: DFADF3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475ED9Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push esi 0x0000000a jmp 00007F887475ED9Ah 0x0000000f pop esi 0x00000010 popad 0x00000011 mov dword ptr [esp], eax 0x00000014 push 00000000h 0x00000016 push ebx 0x00000017 call 00007F887475ED98h 0x0000001c pop ebx 0x0000001d mov dword ptr [esp+04h], ebx 0x00000021 add dword ptr [esp+04h], 0000001Bh 0x00000029 inc ebx 0x0000002a push ebx 0x0000002b ret 0x0000002c pop ebx 0x0000002d ret 0x0000002e mov ebx, dword ptr [ebp+12497E63h] 0x00000034 mov dword ptr [ebp+122D34F1h], esi 0x0000003a add eax, ebx 0x0000003c jmp 00007F887475EDA9h 0x00000041 push eax 0x00000042 push eax 0x00000043 push edx 0x00000044 push ebx 0x00000045 jmp 00007F887475EDA5h 0x0000004a pop ebx 0x0000004b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DFADF3 second address: DFADF8 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DFADF8 second address: DFAE2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov dword ptr [esp], eax 0x0000000a mov dword ptr [ebp+124664ECh], ebx 0x00000010 push 00000004h 0x00000012 mov cx, 9BC1h 0x00000016 jmp 00007F887475EDA4h 0x0000001b nop 0x0000001c push eax 0x0000001d push edx 0x0000001e push edx 0x0000001f ja 00007F887475ED96h 0x00000025 pop edx 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DFAE2D second address: DFAE37 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F8874D4CC8Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DFAE37 second address: DFAE44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DFAE44 second address: DFAE48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DFAE48 second address: DFAE5B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475ED9Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E531D9 second address: E531E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 push edi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E531E3 second address: E53202 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 jmp 00007F887475EDA7h 0x0000000a push ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E59BCA second address: E59BDF instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 push ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F8874D4CC8Bh 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E59BDF second address: E59C11 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475EDA2h 0x00000007 jmp 00007F887475EDA4h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jbe 00007F887475ED9Ch 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E5A427 second address: E5A44F instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jng 00007F8874D4CC86h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007F8874D4CC98h 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E5A44F second address: E5A469 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F887475EDA6h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E5A469 second address: E5A495 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F8874D4CC86h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F8874D4CC97h 0x00000012 jp 00007F8874D4CC88h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E5AA78 second address: E5AA9F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jmp 00007F887475EDA4h 0x0000000a push eax 0x0000000b push edx 0x0000000c jnl 00007F887475ED96h 0x00000012 jne 00007F887475ED96h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E5AD16 second address: E5AD1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E5AD1A second address: E5AD47 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 je 00007F887475ED9Ah 0x0000000e pushad 0x0000000f popad 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 jg 00007F887475ED96h 0x0000001c jnc 00007F887475ED96h 0x00000022 pushad 0x00000023 popad 0x00000024 popad 0x00000025 push eax 0x00000026 push edx 0x00000027 js 00007F887475ED96h 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E5AD47 second address: E5AD51 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F8874D4CC86h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E5AD51 second address: E5AD56 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E5AD56 second address: E5AD5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E5AFF5 second address: E5B018 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F887475EDA0h 0x00000009 pop edx 0x0000000a js 00007F887475ED9Eh 0x00000010 push edi 0x00000011 pop edi 0x00000012 jnp 00007F887475ED96h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E5B018 second address: E5B023 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push esi 0x00000006 pop esi 0x00000007 popad 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E5B63E second address: E5B646 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push esi 0x00000007 pop esi 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E5B646 second address: E5B64A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E5B64A second address: E5B65A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E5B65A second address: E5B65E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E5B65E second address: E5B676 instructions: 0x00000000 rdtsc 0x00000002 je 00007F887475ED96h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push esi 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d jmp 00007F887475ED9Ah 0x00000012 pop esi 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E615A2 second address: E615B5 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 jmp 00007F8874D4CC8Dh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E615B5 second address: E615C0 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jng 00007F887475ED96h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E6475E second address: E6478D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 pushad 0x00000007 jmp 00007F8874D4CC99h 0x0000000c jmp 00007F8874D4CC8Ah 0x00000011 push edx 0x00000012 push eax 0x00000013 pop eax 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E648E9 second address: E6491C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F887475EDA6h 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e push esi 0x0000000f pop esi 0x00000010 jmp 00007F887475EDA2h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E6491C second address: E64935 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F8874D4CC8Bh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b popad 0x0000000c push edi 0x0000000d push eax 0x0000000e push edx 0x0000000f push esi 0x00000010 pop esi 0x00000011 push eax 0x00000012 pop eax 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E6512E second address: E65132 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E65132 second address: E65143 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jc 00007F8874D4CC86h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E65143 second address: E65160 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F887475EDA6h 0x00000009 push edi 0x0000000a pop edi 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E65160 second address: E65173 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F8874D4CC8Ch 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E652D5 second address: E6531C instructions: 0x00000000 rdtsc 0x00000002 jns 00007F887475EDAAh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e jns 00007F887475ED96h 0x00000014 push edi 0x00000015 pop edi 0x00000016 jmp 00007F887475EDA8h 0x0000001b popad 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E6531C second address: E65320 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E6B7D7 second address: E6B7F5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475EDA9h 0x00000007 push ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E6B7F5 second address: E6B809 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 js 00007F8874D4CC88h 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E6B937 second address: E6B956 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F887475EDA7h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E6BC23 second address: E6BC33 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F8874D4CC86h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push esi 0x0000000d pop esi 0x0000000e push edx 0x0000000f pop edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E6BC33 second address: E6BC3D instructions: 0x00000000 rdtsc 0x00000002 jl 00007F887475ED96h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E6BC3D second address: E6BC53 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8874D4CC92h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E6BDC7 second address: E6BDFD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F887475EDA9h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F887475EDA3h 0x00000012 push ecx 0x00000013 pop ecx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E6BDFD second address: E6BE05 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E6C0EF second address: E6C10E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop edi 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F887475EDA1h 0x0000000d push ecx 0x0000000e push edx 0x0000000f pop edx 0x00000010 push edx 0x00000011 pop edx 0x00000012 pop ecx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E6C10E second address: E6C116 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E6C116 second address: E6C11A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E6CE51 second address: E6CE65 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007F8874D4CC8Ah 0x00000008 pushad 0x00000009 popad 0x0000000a pop ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E6D5FD second address: E6D601 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E6D601 second address: E6D63C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 push edi 0x0000000a pop edi 0x0000000b jno 00007F8874D4CC86h 0x00000011 push eax 0x00000012 pop eax 0x00000013 popad 0x00000014 pushad 0x00000015 jno 00007F8874D4CC86h 0x0000001b push eax 0x0000001c pop eax 0x0000001d jmp 00007F8874D4CC8Dh 0x00000022 popad 0x00000023 popad 0x00000024 push eax 0x00000025 push edx 0x00000026 pushad 0x00000027 js 00007F8874D4CC86h 0x0000002d pushad 0x0000002e popad 0x0000002f push ebx 0x00000030 pop ebx 0x00000031 push eax 0x00000032 push edx 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E6D63C second address: E6D641 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E75F9C second address: E75FA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E75FA0 second address: E75FC2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475ED9Ah 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007F887475ED9Eh 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E75FC2 second address: E75FC8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E75CB8 second address: E75CBE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E75CBE second address: E75CC2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E81C61 second address: E81C66 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E833A3 second address: E833AF instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E833AF second address: E833BB instructions: 0x00000000 rdtsc 0x00000002 jne 00007F887475ED96h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DADF17 second address: DADF1F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DADF1F second address: DADF23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DADF23 second address: DADF35 instructions: 0x00000000 rdtsc 0x00000002 js 00007F8874D4CC86h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jp 00007F8874D4CC86h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DADF35 second address: DADF39 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DADF39 second address: DADF3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E85EE6 second address: E85EF2 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F887475ED9Eh 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E96133 second address: E9613F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E9613F second address: E96145 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E96145 second address: E96149 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E9D8B4 second address: E9D8DE instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 ja 00007F887475ED96h 0x0000000b pop esi 0x0000000c pushad 0x0000000d jmp 00007F887475EDA3h 0x00000012 jp 00007F887475ED96h 0x00000018 pushad 0x00000019 popad 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E9D8DE second address: E9D8FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 je 00007F8874D4CC93h 0x0000000e push eax 0x0000000f push edx 0x00000010 push ecx 0x00000011 pop ecx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E9DA28 second address: E9DA2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E9DA2C second address: E9DA30 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E9DA30 second address: E9DA36 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E9DA36 second address: E9DA41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: E9DE07 second address: E9DE1B instructions: 0x00000000 rdtsc 0x00000002 jng 00007F887475ED96h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c js 00007F887475EDA2h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: EA1C97 second address: EA1CC6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8874D4CC8Fh 0x00000007 pushad 0x00000008 jmp 00007F8874D4CC90h 0x0000000d push edi 0x0000000e pop edi 0x0000000f push edx 0x00000010 pop edx 0x00000011 popad 0x00000012 pop edx 0x00000013 pop eax 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 push edi 0x00000019 pop edi 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: EA1CC6 second address: EA1CCA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: EA1CCA second address: EA1CD0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: EA1CD0 second address: EA1CEA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F887475EDA5h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: EA1CEA second address: EA1D0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8874D4CC97h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: EA1D0C second address: EA1D10 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: EA747D second address: EA7481 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: EA7481 second address: EA748C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push edx 0x00000008 pop edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: EB209A second address: EB20A0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: EB7166 second address: EB716C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: EAFF45 second address: EAFF50 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: EAFF50 second address: EAFF6F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F887475EDA8h 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: EC45E2 second address: EC45F9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 pushad 0x00000008 jo 00007F8874D4CC8Ah 0x0000000e push esi 0x0000000f pop esi 0x00000010 push eax 0x00000011 pop eax 0x00000012 pushad 0x00000013 push edi 0x00000014 pop edi 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: EC42E7 second address: EC42F5 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F887475ED98h 0x00000008 push eax 0x00000009 push edx 0x0000000a push ecx 0x0000000b pop ecx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: EC6040 second address: EC6044 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: EC6044 second address: EC6050 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: EC6050 second address: EC6059 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: EC6059 second address: EC605F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: EC5EB6 second address: EC5EBA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: ED9B83 second address: ED9B89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: ED9B89 second address: ED9B8D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: ED9B8D second address: ED9B93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: ED9B93 second address: ED9B98 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: ED9B98 second address: ED9B9E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: ED9F8A second address: ED9FB3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8874D4CC94h 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jp 00007F8874D4CC86h 0x00000014 jg 00007F8874D4CC86h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: ED9FB3 second address: ED9FFE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475EDA2h 0x00000007 jng 00007F887475ED96h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 jmp 00007F887475EDA9h 0x00000015 push ebx 0x00000016 pop ebx 0x00000017 jg 00007F887475ED96h 0x0000001d popad 0x0000001e popad 0x0000001f pushad 0x00000020 push eax 0x00000021 push edx 0x00000022 push edx 0x00000023 pop edx 0x00000024 jnc 00007F887475ED96h 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: EDA133 second address: EDA139 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: EDA139 second address: EDA143 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F887475ED96h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: EDA143 second address: EDA17F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8874D4CC97h 0x00000007 jo 00007F8874D4CC86h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F8874D4CC97h 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: EDEB57 second address: EDEB7C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F887475EDA7h 0x0000000b jng 00007F887475ED9Eh 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: EE082B second address: EE0843 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 pushad 0x00000006 popad 0x00000007 jmp 00007F8874D4CC90h 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DB658F second address: DB6594 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DB6594 second address: DB65B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8874D4CC8Dh 0x00000009 pop edi 0x0000000a push eax 0x0000000b push edx 0x0000000c jns 00007F8874D4CC86h 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DF53E4 second address: DF53E9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: DF5613 second address: DF5617 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860855 second address: 48608AF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 call 00007F887475EDA5h 0x0000000a pop ecx 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push ebp 0x0000000f jmp 00007F887475ED9Ch 0x00000014 mov dword ptr [esp], ebp 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a pushfd 0x0000001b jmp 00007F887475ED9Dh 0x00000020 or ecx, 5F7DBD76h 0x00000026 jmp 00007F887475EDA1h 0x0000002b popfd 0x0000002c mov ebx, eax 0x0000002e popad 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 48608AF second address: 48608CB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8874D4CC98h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 48608CB second address: 4860935 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007F887475ED9Dh 0x00000011 sbb al, 00000036h 0x00000014 jmp 00007F887475EDA1h 0x00000019 popfd 0x0000001a pushfd 0x0000001b jmp 00007F887475EDA0h 0x00000020 add esi, 4BE2DF58h 0x00000026 jmp 00007F887475ED9Bh 0x0000002b popfd 0x0000002c popad 0x0000002d xchg eax, ecx 0x0000002e pushad 0x0000002f call 00007F887475EDA4h 0x00000034 push eax 0x00000035 push edx 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860935 second address: 4860982 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 mov cl, bh 0x00000007 popad 0x00000008 push eax 0x00000009 jmp 00007F8874D4CC93h 0x0000000e xchg eax, ecx 0x0000000f jmp 00007F8874D4CC96h 0x00000014 xchg eax, esi 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007F8874D4CC97h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860982 second address: 4860988 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860988 second address: 486098C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 486098C second address: 48609A4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F887475ED9Dh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860AAB second address: 4860AB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860AB0 second address: 4860ACB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F887475EDA7h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860B26 second address: 4860B2C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860B2C second address: 4860B30 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860B30 second address: 4860B4A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8874D4CC8Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b cmp dword ptr [ebp-04h], 00000000h 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860B4A second address: 4860B67 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475EDA9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860B67 second address: 4860B8C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ecx, ebx 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov esi, eax 0x0000000c pushad 0x0000000d mov al, dh 0x0000000f mov ecx, 21229CEDh 0x00000014 popad 0x00000015 je 00007F8874D4CCB3h 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e mov si, di 0x00000021 mov si, di 0x00000024 popad 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860B8C second address: 4860B92 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860BDD second address: 4860BF7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ebx, ecx 0x00000005 push ecx 0x00000006 pop ebx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop esi 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F8874D4CC8Dh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860BF7 second address: 4860C3C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475EDA1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 leave 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d jmp 00007F887475EDA3h 0x00000012 jmp 00007F887475EDA8h 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860C3C second address: 485009F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8874D4CC8Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 retn 0004h 0x0000000c nop 0x0000000d sub esp, 04h 0x00000010 xor ebx, ebx 0x00000012 cmp eax, 00000000h 0x00000015 je 00007F8874D4CDEFh 0x0000001b mov dword ptr [esp], 0000000Dh 0x00000022 call 00007F887898DD45h 0x00000027 mov edi, edi 0x00000029 jmp 00007F8874D4CC8Fh 0x0000002e xchg eax, ebp 0x0000002f pushad 0x00000030 push eax 0x00000031 pushfd 0x00000032 jmp 00007F8874D4CC8Bh 0x00000037 xor ecx, 7C3AAA0Eh 0x0000003d jmp 00007F8874D4CC99h 0x00000042 popfd 0x00000043 pop eax 0x00000044 push edi 0x00000045 jmp 00007F8874D4CC8Ch 0x0000004a pop esi 0x0000004b popad 0x0000004c push eax 0x0000004d jmp 00007F8874D4CC90h 0x00000052 xchg eax, ebp 0x00000053 jmp 00007F8874D4CC90h 0x00000058 mov ebp, esp 0x0000005a pushad 0x0000005b pushad 0x0000005c pushfd 0x0000005d jmp 00007F8874D4CC8Ch 0x00000062 sbb esi, 19B14E18h 0x00000068 jmp 00007F8874D4CC8Bh 0x0000006d popfd 0x0000006e mov esi, 2967F1CFh 0x00000073 popad 0x00000074 push eax 0x00000075 push edx 0x00000076 push ecx 0x00000077 pop edi 0x00000078 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 485009F second address: 48500AF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 sub esp, 2Ch 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 48500AF second address: 48500B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 48500B3 second address: 48500B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 48500B7 second address: 48500BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 48500BD second address: 48500C3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 48500C3 second address: 48500C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 48500C7 second address: 48500FE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c mov di, 9E54h 0x00000010 pushfd 0x00000011 jmp 00007F887475ED9Dh 0x00000016 sbb esi, 70568116h 0x0000001c jmp 00007F887475EDA1h 0x00000021 popfd 0x00000022 popad 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 48500FE second address: 4850154 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8874D4CC91h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007F8874D4CC91h 0x0000000f xchg eax, ebx 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 pushfd 0x00000014 jmp 00007F8874D4CC93h 0x00000019 jmp 00007F8874D4CC93h 0x0000001e popfd 0x0000001f mov edx, esi 0x00000021 popad 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850154 second address: 485015D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, 5536h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 485015D second address: 4850181 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 pushad 0x00000009 jmp 00007F8874D4CC96h 0x0000000e push eax 0x0000000f push edx 0x00000010 mov di, cx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 48501AE second address: 48501D4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475EDA2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 sub edi, edi 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F887475ED9Ch 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 48501D4 second address: 4850221 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ecx 0x00000005 mov ah, bl 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a inc ebx 0x0000000b jmp 00007F8874D4CC94h 0x00000010 test al, al 0x00000012 pushad 0x00000013 call 00007F8874D4CC8Eh 0x00000018 mov bl, ah 0x0000001a pop ebx 0x0000001b mov al, 68h 0x0000001d popad 0x0000001e je 00007F8874D4CEC3h 0x00000024 pushad 0x00000025 mov cx, di 0x00000028 mov ax, bx 0x0000002b popad 0x0000002c lea ecx, dword ptr [ebp-14h] 0x0000002f push eax 0x00000030 push edx 0x00000031 push eax 0x00000032 push edx 0x00000033 push eax 0x00000034 push edx 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850221 second address: 4850225 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850225 second address: 485022B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850292 second address: 48502D2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475ED9Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F887475EDA3h 0x00000013 jmp 00007F887475EDA3h 0x00000018 popfd 0x00000019 push ecx 0x0000001a pop edx 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 48502D2 second address: 48502D8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 48502D8 second address: 48502DC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 48502DC second address: 48502FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F8874D4CC94h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 48502FD second address: 4850301 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850301 second address: 4850307 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850307 second address: 4850318 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F887475ED9Dh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850318 second address: 485031C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850354 second address: 4850363 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475ED9Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850363 second address: 48503F1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8874D4CC99h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test eax, eax 0x0000000b jmp 00007F8874D4CC8Eh 0x00000010 jg 00007F88E749AD82h 0x00000016 jmp 00007F8874D4CC90h 0x0000001b js 00007F8874D4CD27h 0x00000021 pushad 0x00000022 mov al, 52h 0x00000024 pushfd 0x00000025 jmp 00007F8874D4CC93h 0x0000002a xor si, 2B0Eh 0x0000002f jmp 00007F8874D4CC99h 0x00000034 popfd 0x00000035 popad 0x00000036 cmp dword ptr [ebp-14h], edi 0x00000039 push eax 0x0000003a push edx 0x0000003b pushad 0x0000003c pushad 0x0000003d popad 0x0000003e mov ebx, 74DEF79Ch 0x00000043 popad 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 48503F1 second address: 4850406 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F887475EDA1h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850406 second address: 485040A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 485040A second address: 485041E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jne 00007F88E6EACE1Fh 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 485041E second address: 4850422 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850422 second address: 4850426 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850426 second address: 485042C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 485042C second address: 4850456 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F887475EDA7h 0x00000008 pop ecx 0x00000009 movsx edx, si 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f mov ebx, dword ptr [ebp+08h] 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850456 second address: 485045A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 485045A second address: 4850477 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475EDA9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850477 second address: 485047D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 485047D second address: 4850481 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850481 second address: 48504D3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8874D4CC93h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b lea eax, dword ptr [ebp-2Ch] 0x0000000e jmp 00007F8874D4CC96h 0x00000013 xchg eax, esi 0x00000014 pushad 0x00000015 movzx eax, bx 0x00000018 mov dh, ABh 0x0000001a popad 0x0000001b push eax 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f call 00007F8874D4CC8Eh 0x00000024 pop ecx 0x00000025 mov bx, 14D6h 0x00000029 popad 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 48504D3 second address: 48504EA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F887475EDA3h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 48504EA second address: 4850552 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8874D4CC99h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, esi 0x0000000c pushad 0x0000000d pushad 0x0000000e movzx eax, dx 0x00000011 popad 0x00000012 pushfd 0x00000013 jmp 00007F8874D4CC8Bh 0x00000018 sbb si, F36Eh 0x0000001d jmp 00007F8874D4CC99h 0x00000022 popfd 0x00000023 popad 0x00000024 nop 0x00000025 jmp 00007F8874D4CC8Eh 0x0000002a push eax 0x0000002b push eax 0x0000002c push edx 0x0000002d push eax 0x0000002e push edx 0x0000002f push eax 0x00000030 push edx 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850552 second address: 4850556 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850556 second address: 4850572 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8874D4CC98h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850572 second address: 48505A7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F887475EDA1h 0x00000008 push eax 0x00000009 pop edi 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d nop 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F887475EDA9h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 48505A7 second address: 48505C5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop ecx 0x00000005 mov bh, 48h 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xchg eax, ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F8874D4CC91h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 48505C5 second address: 48505F9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F887475EDA7h 0x00000008 mov bx, ax 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f pushad 0x00000010 mov edi, 43DF5FD6h 0x00000015 mov ebx, 5BC9A362h 0x0000001a popad 0x0000001b xchg eax, ebx 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 48505F9 second address: 48505FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 48505FD second address: 4850603 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 485063D second address: 4850641 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850641 second address: 485065E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475EDA9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 485065E second address: 48506A6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8874D4CC91h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test esi, esi 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e call 00007F8874D4CC93h 0x00000013 pop eax 0x00000014 jmp 00007F8874D4CC99h 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4840D5B second address: 4840D61 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4840D61 second address: 4840D9A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8874D4CC8Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ecx 0x0000000c jmp 00007F8874D4CC96h 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F8874D4CC8Eh 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4840D9A second address: 4840DC1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475ED9Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F887475EDA5h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850A97 second address: 4850A9D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850A9D second address: 4850AA1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850AA1 second address: 4850AA5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850AA5 second address: 4850AF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], ebp 0x0000000b jmp 00007F887475EDA7h 0x00000010 mov ebp, esp 0x00000012 pushad 0x00000013 movzx esi, bx 0x00000016 popad 0x00000017 cmp dword ptr [76FF459Ch], 05h 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 call 00007F887475EDA4h 0x00000026 pop ecx 0x00000027 mov si, di 0x0000002a popad 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850AF1 second address: 4850AF7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850AF7 second address: 4850AFB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850AFB second address: 4850B9D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8874D4CC96h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b je 00007F88E748AB6Eh 0x00000011 pushad 0x00000012 mov di, ax 0x00000015 push esi 0x00000016 pushfd 0x00000017 jmp 00007F8874D4CC99h 0x0000001c xor si, 7FF6h 0x00000021 jmp 00007F8874D4CC91h 0x00000026 popfd 0x00000027 pop eax 0x00000028 popad 0x00000029 pop ebp 0x0000002a push eax 0x0000002b push edx 0x0000002c pushad 0x0000002d pushfd 0x0000002e jmp 00007F8874D4CC98h 0x00000033 or eax, 724C5848h 0x00000039 jmp 00007F8874D4CC8Bh 0x0000003e popfd 0x0000003f jmp 00007F8874D4CC98h 0x00000044 popad 0x00000045 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850C1D second address: 4850C21 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850C21 second address: 4850C3F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp+04h], eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F8874D4CC91h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850C3F second address: 4850C77 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475EDA1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a pushad 0x0000000b mov cl, 4Fh 0x0000000d mov cx, bx 0x00000010 popad 0x00000011 call 00007F88E6EA3CACh 0x00000016 push 76F92B70h 0x0000001b push dword ptr fs:[00000000h] 0x00000022 mov eax, dword ptr [esp+10h] 0x00000026 mov dword ptr [esp+10h], ebp 0x0000002a lea ebp, dword ptr [esp+10h] 0x0000002e sub esp, eax 0x00000030 push ebx 0x00000031 push esi 0x00000032 push edi 0x00000033 mov eax, dword ptr [76FF4538h] 0x00000038 xor dword ptr [ebp-04h], eax 0x0000003b xor eax, ebp 0x0000003d push eax 0x0000003e mov dword ptr [ebp-18h], esp 0x00000041 push dword ptr [ebp-08h] 0x00000044 mov eax, dword ptr [ebp-04h] 0x00000047 mov dword ptr [ebp-04h], FFFFFFFEh 0x0000004e mov dword ptr [ebp-08h], eax 0x00000051 lea eax, dword ptr [ebp-10h] 0x00000054 mov dword ptr fs:[00000000h], eax 0x0000005a ret 0x0000005b pushad 0x0000005c mov dh, 33h 0x0000005e jmp 00007F887475ED9Ah 0x00000063 popad 0x00000064 sub esi, esi 0x00000066 push eax 0x00000067 push edx 0x00000068 push eax 0x00000069 push edx 0x0000006a pushad 0x0000006b popad 0x0000006c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850C77 second address: 4850C7B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850C7B second address: 4850C81 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850C81 second address: 4850C95 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop ecx 0x00000005 movsx edi, si 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [ebp-1Ch], esi 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850C95 second address: 4850C99 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4850C99 second address: 4850C9F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860C81 second address: 4860CAB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475ED9Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F887475ED9Eh 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 mov cx, E4B3h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860CAB second address: 4860CB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860CB0 second address: 4860CE9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475ED9Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F887475ED9Eh 0x00000013 sub eax, 338DA9E8h 0x00000019 jmp 00007F887475ED9Bh 0x0000001e popfd 0x0000001f popad 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860CE9 second address: 4860D01 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8874D4CC94h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860D01 second address: 4860D26 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475ED9Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d pushad 0x0000000e mov di, si 0x00000011 mov si, CFB7h 0x00000015 popad 0x00000016 xchg eax, esi 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a mov eax, edx 0x0000001c pushad 0x0000001d popad 0x0000001e popad 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860D26 second address: 4860D2C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860D2C second address: 4860D30 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860D30 second address: 4860D57 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a jmp 00007F8874D4CC95h 0x0000000f pushad 0x00000010 mov eax, 6FFEC5DDh 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860D57 second address: 4860D66 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 xchg eax, esi 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c mov ecx, ebx 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860D66 second address: 4860D6C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860D6C second address: 4860DB1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov esi, dword ptr [ebp+0Ch] 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007F887475ED9Dh 0x00000014 add cx, 5AD6h 0x00000019 jmp 00007F887475EDA1h 0x0000001e popfd 0x0000001f call 00007F887475EDA0h 0x00000024 pop esi 0x00000025 popad 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860DB1 second address: 4860DE8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8874D4CC90h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test esi, esi 0x0000000b jmp 00007F8874D4CC90h 0x00000010 je 00007F88E747A266h 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 mov dx, 0D70h 0x0000001d movsx edx, ax 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860DE8 second address: 4860E15 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475ED9Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 cmp dword ptr [76FF459Ch], 05h 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F887475EDA5h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860E15 second address: 4860EB1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dl, 72h 0x00000005 pushfd 0x00000006 jmp 00007F8874D4CC98h 0x0000000b jmp 00007F8874D4CC95h 0x00000010 popfd 0x00000011 popad 0x00000012 pop edx 0x00000013 pop eax 0x00000014 je 00007F88E74922D1h 0x0000001a pushad 0x0000001b movzx ecx, di 0x0000001e call 00007F8874D4CC99h 0x00000023 movzx ecx, di 0x00000026 pop edi 0x00000027 popad 0x00000028 xchg eax, esi 0x00000029 jmp 00007F8874D4CC98h 0x0000002e push eax 0x0000002f push eax 0x00000030 push edx 0x00000031 pushad 0x00000032 pushfd 0x00000033 jmp 00007F8874D4CC8Ch 0x00000038 or ah, 00000068h 0x0000003b jmp 00007F8874D4CC8Bh 0x00000040 popfd 0x00000041 mov bx, cx 0x00000044 popad 0x00000045 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860EB1 second address: 4860EB7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860EB7 second address: 4860EBB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860EBB second address: 4860EBF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860EBF second address: 4860ECD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, esi 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860ECD second address: 4860ED4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860ED4 second address: 4860EDA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860F1E second address: 4860F22 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860F22 second address: 4860F28 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860F28 second address: 4860F4F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475ED9Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007F887475ED9Bh 0x0000000f xchg eax, esi 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 pushad 0x00000014 popad 0x00000015 push edx 0x00000016 pop esi 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860F69 second address: 4860F6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860F6D second address: 4860F8A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475EDA9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860F8A second address: 4860F90 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860F90 second address: 4860F94 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860F94 second address: 4860FB6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8874D4CC93h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop esi 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f mov dh, 3Eh 0x00000011 mov edx, esi 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860FB6 second address: 4860FBC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860FBC second address: 4860FC0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860FC0 second address: 4860FE6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F887475ED9Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F887475EDA0h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 4860FE6 second address: 4860FEC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |