Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: EE6011 second address: EE6017 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: EE6017 second address: EE58CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FA8D8E164B5h 0x0000000a popad 0x0000000b nop 0x0000000c pushad 0x0000000d mov ebx, 5AB8C46Bh 0x00000012 jmp 00007FA8D8E164B8h 0x00000017 popad 0x00000018 push dword ptr [ebp+122D05A5h] 0x0000001e cmc 0x0000001f xor dword ptr [ebp+122D1EF6h], edi 0x00000025 call dword ptr [ebp+122D1FBEh] 0x0000002b pushad 0x0000002c jmp 00007FA8D8E164ABh 0x00000031 xor eax, eax 0x00000033 add dword ptr [ebp+122D1B6Fh], edx 0x00000039 mov edx, dword ptr [esp+28h] 0x0000003d js 00007FA8D8E164ACh 0x00000043 add dword ptr [ebp+122D2B2Dh], eax 0x00000049 mov dword ptr [ebp+122D3679h], eax 0x0000004f mov dword ptr [ebp+122D1913h], eax 0x00000055 mov esi, 0000003Ch 0x0000005a pushad 0x0000005b movzx ebx, cx 0x0000005e and eax, dword ptr [ebp+122D3659h] 0x00000064 popad 0x00000065 add esi, dword ptr [esp+24h] 0x00000069 jmp 00007FA8D8E164B8h 0x0000006e lodsw 0x00000070 jmp 00007FA8D8E164AFh 0x00000075 add eax, dword ptr [esp+24h] 0x00000079 sub dword ptr [ebp+122D201Dh], esi 0x0000007f sub dword ptr [ebp+122D2B2Dh], ecx 0x00000085 mov ebx, dword ptr [esp+24h] 0x00000089 stc 0x0000008a nop 0x0000008b pushad 0x0000008c pushad 0x0000008d pushad 0x0000008e popad 0x0000008f push eax 0x00000090 push edx 0x00000091 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: EE58CD second address: EE58E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FA8D8E1DD00h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: EE58E4 second address: EE58E8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: EE58E8 second address: EE5902 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 ja 00007FA8D8E1DCF8h 0x0000000f push esi 0x00000010 pop esi 0x00000011 pushad 0x00000012 jng 00007FA8D8E1DCF6h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 105D029 second address: 105D02D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 105D02D second address: 105D047 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E1DD06h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 105C200 second address: 105C207 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 105C207 second address: 105C210 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 105C210 second address: 105C214 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 105C368 second address: 105C38E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FA8D8E1DD00h 0x0000000b jnp 00007FA8D8E1DCF6h 0x00000011 popad 0x00000012 push ecx 0x00000013 jnc 00007FA8D8E1DCF6h 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 105C4E6 second address: 105C4EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 105C4EC second address: 105C4FC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 js 00007FA8D8E1DD0Ah 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 105C4FC second address: 105C500 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 105C7C7 second address: 105C7CB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 105C90C second address: 105C929 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FA8D8E164A6h 0x00000008 jmp 00007FA8D8E164B3h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 105E285 second address: 105E2E2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E1DD07h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 add dword ptr [esp], 1199B93Dh 0x00000010 mov dword ptr [ebp+122D2AFFh], ebx 0x00000016 lea ebx, dword ptr [ebp+1244C0D1h] 0x0000001c push 00000000h 0x0000001e push esi 0x0000001f call 00007FA8D8E1DCF8h 0x00000024 pop esi 0x00000025 mov dword ptr [esp+04h], esi 0x00000029 add dword ptr [esp+04h], 00000017h 0x00000031 inc esi 0x00000032 push esi 0x00000033 ret 0x00000034 pop esi 0x00000035 ret 0x00000036 or edi, dword ptr [ebp+122D34A1h] 0x0000003c push eax 0x0000003d pushad 0x0000003e je 00007FA8D8E1DCFCh 0x00000044 push eax 0x00000045 push edx 0x00000046 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 105E2E2 second address: 105E2FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jmp 00007FA8D8E164B4h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 105E367 second address: 105E3AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FA8D8E1DCF6h 0x0000000a popad 0x0000000b popad 0x0000000c nop 0x0000000d push 00000000h 0x0000000f push edx 0x00000010 call 00007FA8D8E1DCF8h 0x00000015 pop edx 0x00000016 mov dword ptr [esp+04h], edx 0x0000001a add dword ptr [esp+04h], 00000017h 0x00000022 inc edx 0x00000023 push edx 0x00000024 ret 0x00000025 pop edx 0x00000026 ret 0x00000027 stc 0x00000028 push 00000000h 0x0000002a jmp 00007FA8D8E1DCFDh 0x0000002f push D0F41FD6h 0x00000034 push eax 0x00000035 push edx 0x00000036 pushad 0x00000037 push eax 0x00000038 push edx 0x00000039 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 105E3AD second address: 105E3C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA8D8E164B1h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 105E3C3 second address: 105E442 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E1DD03h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 add dword ptr [esp], 2F0BE0AAh 0x00000010 mov dword ptr [ebp+122D19F8h], eax 0x00000016 mov dword ptr [ebp+122D287Eh], ebx 0x0000001c push 00000003h 0x0000001e call 00007FA8D8E1DCFBh 0x00000023 clc 0x00000024 pop edx 0x00000025 push 00000000h 0x00000027 mov cl, 2Fh 0x00000029 push 00000003h 0x0000002b call 00007FA8D8E1DD01h 0x00000030 jnc 00007FA8D8E1DCFCh 0x00000036 pop esi 0x00000037 call 00007FA8D8E1DCF9h 0x0000003c push eax 0x0000003d push edx 0x0000003e push ebx 0x0000003f jmp 00007FA8D8E1DD05h 0x00000044 pop ebx 0x00000045 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 105E442 second address: 105E4E5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 ja 00007FA8D8E164A6h 0x00000009 push eax 0x0000000a pop eax 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f jg 00007FA8D8E164B0h 0x00000015 mov eax, dword ptr [esp+04h] 0x00000019 jnl 00007FA8D8E164B8h 0x0000001f mov eax, dword ptr [eax] 0x00000021 pushad 0x00000022 push eax 0x00000023 pushad 0x00000024 popad 0x00000025 pop eax 0x00000026 push eax 0x00000027 jc 00007FA8D8E164A6h 0x0000002d pop eax 0x0000002e popad 0x0000002f mov dword ptr [esp+04h], eax 0x00000033 jmp 00007FA8D8E164ADh 0x00000038 pop eax 0x00000039 push 00000000h 0x0000003b push eax 0x0000003c call 00007FA8D8E164A8h 0x00000041 pop eax 0x00000042 mov dword ptr [esp+04h], eax 0x00000046 add dword ptr [esp+04h], 0000001Ch 0x0000004e inc eax 0x0000004f push eax 0x00000050 ret 0x00000051 pop eax 0x00000052 ret 0x00000053 mov dword ptr [ebp+122D1FA7h], ebx 0x00000059 mov ecx, dword ptr [ebp+122D37E5h] 0x0000005f lea ebx, dword ptr [ebp+1244C0DAh] 0x00000065 mov edi, 77043047h 0x0000006a xchg eax, ebx 0x0000006b jbe 00007FA8D8E164B4h 0x00000071 push eax 0x00000072 push edx 0x00000073 pushad 0x00000074 popad 0x00000075 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 105E4E5 second address: 105E4E9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 105E56F second address: 105E5C7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E164B4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push 00000000h 0x0000000c push ebx 0x0000000d call 00007FA8D8E164A8h 0x00000012 pop ebx 0x00000013 mov dword ptr [esp+04h], ebx 0x00000017 add dword ptr [esp+04h], 00000018h 0x0000001f inc ebx 0x00000020 push ebx 0x00000021 ret 0x00000022 pop ebx 0x00000023 ret 0x00000024 mov ecx, dword ptr [ebp+122D1F1Dh] 0x0000002a push 00000000h 0x0000002c push ebx 0x0000002d mov dh, DCh 0x0000002f pop ecx 0x00000030 push B4297ECEh 0x00000035 jl 00007FA8D8E164C6h 0x0000003b push eax 0x0000003c push edx 0x0000003d jng 00007FA8D8E164A6h 0x00000043 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10446CC second address: 10446D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10446D0 second address: 10446D4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 107D836 second address: 107D83F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push edx 0x00000007 pop edx 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 107D83F second address: 107D849 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnl 00007FA8D8E164A6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 107D849 second address: 107D84D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 107D84D second address: 107D85E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b jo 00007FA8D8E164A6h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 107D85E second address: 107D89F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jbe 00007FA8D8E1DD15h 0x0000000c jmp 00007FA8D8E1DD09h 0x00000011 jno 00007FA8D8E1DCF6h 0x00000017 jno 00007FA8D8E1DCFCh 0x0000001d push eax 0x0000001e push edx 0x0000001f je 00007FA8D8E1DCF6h 0x00000025 push eax 0x00000026 pop eax 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 107D9DD second address: 107D9E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 pushad 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 107DE20 second address: 107DE31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA8D8E1DCFDh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 107DE31 second address: 107DE3E instructions: 0x00000000 rdtsc 0x00000002 jp 00007FA8D8E164A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 107E13A second address: 107E145 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 107E145 second address: 107E14B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10761CD second address: 10761FC instructions: 0x00000000 rdtsc 0x00000002 ja 00007FA8D8E1DD02h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FA8D8E1DD04h 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10761FC second address: 1076219 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA8D8E164B6h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1076219 second address: 1076235 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA8D8E1DD06h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1076235 second address: 1076239 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1076239 second address: 1076243 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FA8D8E1DCF6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1047CC7 second address: 1047CCD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1047CCD second address: 1047CEC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 jmp 00007FA8D8E1DD08h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 107F2D9 second address: 107F307 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FA8D8E164A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FA8D8E164B6h 0x0000000f pop edi 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FA8D8E164AAh 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1081668 second address: 108166C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 108166C second address: 1081675 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 104621B second address: 104622D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FA8D8E1DCF6h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d push ebx 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 104622D second address: 1046235 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1046235 second address: 104623B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 104623B second address: 1046241 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1046241 second address: 1046247 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1046247 second address: 1046252 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1046252 second address: 1046256 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1086B6E second address: 1086B74 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10872BA second address: 108731B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E1DD00h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push eax 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f jnl 00007FA8D8E1DCF6h 0x00000015 popad 0x00000016 pop eax 0x00000017 mov eax, dword ptr [esp+04h] 0x0000001b pushad 0x0000001c jng 00007FA8D8E1DCFCh 0x00000022 jg 00007FA8D8E1DCF6h 0x00000028 jmp 00007FA8D8E1DD05h 0x0000002d popad 0x0000002e mov eax, dword ptr [eax] 0x00000030 pushad 0x00000031 jmp 00007FA8D8E1DD01h 0x00000036 push eax 0x00000037 push edx 0x00000038 push eax 0x00000039 push edx 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 108731B second address: 108731F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 108731F second address: 1087323 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10874BF second address: 10874C4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 108ACD2 second address: 108ACD8 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 108C7D8 second address: 108C7DC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 108C8D7 second address: 108C8EC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA8D8E1DD01h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 108CFD5 second address: 108CFD9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 108CFD9 second address: 108D01E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jnl 00007FA8D8E1DCF6h 0x0000000d jmp 00007FA8D8E1DD06h 0x00000012 popad 0x00000013 popad 0x00000014 push eax 0x00000015 push esi 0x00000016 jmp 00007FA8D8E1DD06h 0x0000001b pop esi 0x0000001c xchg eax, ebx 0x0000001d cmc 0x0000001e push eax 0x0000001f push esi 0x00000020 push edx 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 108D1F7 second address: 108D21C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA8D8E164ADh 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FA8D8E164ADh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 108D399 second address: 108D39F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 108D39F second address: 108D3BA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E164AAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jno 00007FA8D8E164A8h 0x00000014 pushad 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 108D647 second address: 108D64D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 108D64D second address: 108D652 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 108DAC2 second address: 108DB3D instructions: 0x00000000 rdtsc 0x00000002 jng 00007FA8D8E1DD0Fh 0x00000008 jmp 00007FA8D8E1DD09h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f nop 0x00000010 jmp 00007FA8D8E1DD07h 0x00000015 push 00000000h 0x00000017 mov edi, dword ptr [ebp+122D37C9h] 0x0000001d push 00000000h 0x0000001f push 00000000h 0x00000021 push ecx 0x00000022 call 00007FA8D8E1DCF8h 0x00000027 pop ecx 0x00000028 mov dword ptr [esp+04h], ecx 0x0000002c add dword ptr [esp+04h], 0000001Ah 0x00000034 inc ecx 0x00000035 push ecx 0x00000036 ret 0x00000037 pop ecx 0x00000038 ret 0x00000039 xchg eax, ebx 0x0000003a push eax 0x0000003b push edx 0x0000003c jmp 00007FA8D8E1DD01h 0x00000041 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 108E2B0 second address: 108E2B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 108EC4B second address: 108EC50 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 108F611 second address: 108F615 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 108F615 second address: 108F661 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp], eax 0x00000009 push 00000000h 0x0000000b push edi 0x0000000c call 00007FA8D8E1DCF8h 0x00000011 pop edi 0x00000012 mov dword ptr [esp+04h], edi 0x00000016 add dword ptr [esp+04h], 0000001Ch 0x0000001e inc edi 0x0000001f push edi 0x00000020 ret 0x00000021 pop edi 0x00000022 ret 0x00000023 sbb edi, 79C3FE84h 0x00000029 push 00000000h 0x0000002b sub dword ptr [ebp+122D2911h], ebx 0x00000031 push 00000000h 0x00000033 sub dword ptr [ebp+122D1DDBh], edi 0x00000039 push eax 0x0000003a push eax 0x0000003b push edx 0x0000003c pushad 0x0000003d pushad 0x0000003e popad 0x0000003f pushad 0x00000040 popad 0x00000041 popad 0x00000042 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1090120 second address: 1090124 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1090124 second address: 1090172 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push ecx 0x0000000d call 00007FA8D8E1DCF8h 0x00000012 pop ecx 0x00000013 mov dword ptr [esp+04h], ecx 0x00000017 add dword ptr [esp+04h], 00000019h 0x0000001f inc ecx 0x00000020 push ecx 0x00000021 ret 0x00000022 pop ecx 0x00000023 ret 0x00000024 mov di, 725Ah 0x00000028 push 00000000h 0x0000002a push 00000000h 0x0000002c jmp 00007FA8D8E1DCFAh 0x00000031 xchg eax, ebx 0x00000032 push eax 0x00000033 push edx 0x00000034 pushad 0x00000035 jng 00007FA8D8E1DCF6h 0x0000003b jg 00007FA8D8E1DCF6h 0x00000041 popad 0x00000042 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1090172 second address: 109017C instructions: 0x00000000 rdtsc 0x00000002 jng 00007FA8D8E164ACh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 109017C second address: 1090188 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1091465 second address: 1091483 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FA8D8E164A8h 0x00000008 push edi 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e jo 00007FA8D8E164A8h 0x00000014 push edx 0x00000015 pop edx 0x00000016 push eax 0x00000017 push edx 0x00000018 je 00007FA8D8E164A6h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 109222F second address: 109224D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E1DD03h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f pop eax 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 109224D second address: 1092251 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1092251 second address: 1092257 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1092257 second address: 109225C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 109225C second address: 1092262 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1092262 second address: 10922EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push ebp 0x0000000b call 00007FA8D8E164A8h 0x00000010 pop ebp 0x00000011 mov dword ptr [esp+04h], ebp 0x00000015 add dword ptr [esp+04h], 00000016h 0x0000001d inc ebp 0x0000001e push ebp 0x0000001f ret 0x00000020 pop ebp 0x00000021 ret 0x00000022 sbb esi, 58C6C5D6h 0x00000028 push 00000000h 0x0000002a push 00000000h 0x0000002c push ecx 0x0000002d call 00007FA8D8E164A8h 0x00000032 pop ecx 0x00000033 mov dword ptr [esp+04h], ecx 0x00000037 add dword ptr [esp+04h], 00000015h 0x0000003f inc ecx 0x00000040 push ecx 0x00000041 ret 0x00000042 pop ecx 0x00000043 ret 0x00000044 mov esi, ecx 0x00000046 sub dword ptr [ebp+1245E0E9h], edx 0x0000004c push 00000000h 0x0000004e push 00000000h 0x00000050 push ecx 0x00000051 call 00007FA8D8E164A8h 0x00000056 pop ecx 0x00000057 mov dword ptr [esp+04h], ecx 0x0000005b add dword ptr [esp+04h], 0000001Dh 0x00000063 inc ecx 0x00000064 push ecx 0x00000065 ret 0x00000066 pop ecx 0x00000067 ret 0x00000068 xchg eax, ebx 0x00000069 push eax 0x0000006a push edx 0x0000006b jmp 00007FA8D8E164B0h 0x00000070 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10922EF second address: 109230A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA8D8E1DD07h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10973F8 second address: 10973FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1098318 second address: 1098336 instructions: 0x00000000 rdtsc 0x00000002 js 00007FA8D8E1DCF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FA8D8E1DD02h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1098336 second address: 109835C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E164B4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FA8D8E164AAh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 109835C second address: 1098362 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1098362 second address: 1098366 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10975B9 second address: 10975CB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA8D8E1DCFEh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10976C8 second address: 10976CC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1099634 second address: 109963E instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FA8D8E1DCF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 109B2E1 second address: 109B312 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007FA8D8E164B5h 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c je 00007FA8D8E164BFh 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FA8D8E164ADh 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 109B57A second address: 109B57F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 109B57F second address: 109B585 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 109D60D second address: 109D628 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 jmp 00007FA8D8E1DD01h 0x0000000e pop ecx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 109E462 second address: 109E46D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jbe 00007FA8D8E164A6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 109E46D second address: 109E47E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 pushad 0x00000009 jc 00007FA8D8E1DCFCh 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 109E47E second address: 109E4C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA8D8E164B7h 0x00000009 popad 0x0000000a nop 0x0000000b mov edi, dword ptr [ebp+122D2014h] 0x00000011 add edi, dword ptr [ebp+122D37D9h] 0x00000017 push 00000000h 0x00000019 clc 0x0000001a push 00000000h 0x0000001c xchg eax, esi 0x0000001d jmp 00007FA8D8E164B0h 0x00000022 push eax 0x00000023 push eax 0x00000024 push edx 0x00000025 pushad 0x00000026 jnc 00007FA8D8E164A6h 0x0000002c push eax 0x0000002d push edx 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 109E4C9 second address: 109E4CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 109E4CE second address: 109E4E3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA8D8E164B0h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 109F3DA second address: 109F468 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FA8D8E1DCF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b push 00000000h 0x0000000d push eax 0x0000000e call 00007FA8D8E1DCF8h 0x00000013 pop eax 0x00000014 mov dword ptr [esp+04h], eax 0x00000018 add dword ptr [esp+04h], 0000001Bh 0x00000020 inc eax 0x00000021 push eax 0x00000022 ret 0x00000023 pop eax 0x00000024 ret 0x00000025 mov edi, dword ptr [ebp+1244C3D1h] 0x0000002b push 00000000h 0x0000002d or dword ptr [ebp+122D2891h], edi 0x00000033 jmp 00007FA8D8E1DD06h 0x00000038 push 00000000h 0x0000003a je 00007FA8D8E1DCF9h 0x00000040 mov bx, cx 0x00000043 xchg eax, esi 0x00000044 pushad 0x00000045 push edx 0x00000046 jmp 00007FA8D8E1DD05h 0x0000004b pop edx 0x0000004c push eax 0x0000004d push edx 0x0000004e jmp 00007FA8D8E1DD06h 0x00000053 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 109F468 second address: 109F476 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 109F476 second address: 109F47C instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 109F47C second address: 109F486 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnp 00007FA8D8E164A6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 109E66B second address: 109E68D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E1DD07h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 109E68D second address: 109E691 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 109E691 second address: 109E697 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10A0420 second address: 10A0466 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FA8D8E164A6h 0x0000000a popad 0x0000000b pop eax 0x0000000c push eax 0x0000000d jmp 00007FA8D8E164AEh 0x00000012 nop 0x00000013 mov bl, al 0x00000015 push 00000000h 0x00000017 push 00000000h 0x00000019 push 00000000h 0x0000001b push edx 0x0000001c call 00007FA8D8E164A8h 0x00000021 pop edx 0x00000022 mov dword ptr [esp+04h], edx 0x00000026 add dword ptr [esp+04h], 00000015h 0x0000002e inc edx 0x0000002f push edx 0x00000030 ret 0x00000031 pop edx 0x00000032 ret 0x00000033 xchg eax, esi 0x00000034 push eax 0x00000035 push edx 0x00000036 push eax 0x00000037 push edx 0x00000038 pushad 0x00000039 popad 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10A0466 second address: 10A0470 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FA8D8E1DCF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10A641E second address: 10A6428 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FA8D8E164ACh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 109F5B7 second address: 109F641 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 nop 0x00000007 add bh, FFFFFFEAh 0x0000000a push dword ptr fs:[00000000h] 0x00000011 mov di, bx 0x00000014 mov dword ptr fs:[00000000h], esp 0x0000001b mov dword ptr [ebp+122D2A93h], edi 0x00000021 mov eax, dword ptr [ebp+122D09E1h] 0x00000027 push 00000000h 0x00000029 push ebx 0x0000002a call 00007FA8D8E1DCF8h 0x0000002f pop ebx 0x00000030 mov dword ptr [esp+04h], ebx 0x00000034 add dword ptr [esp+04h], 0000001Dh 0x0000003c inc ebx 0x0000003d push ebx 0x0000003e ret 0x0000003f pop ebx 0x00000040 ret 0x00000041 mov edi, dword ptr [ebp+122D377Dh] 0x00000047 push FFFFFFFFh 0x00000049 push 00000000h 0x0000004b push ebp 0x0000004c call 00007FA8D8E1DCF8h 0x00000051 pop ebp 0x00000052 mov dword ptr [esp+04h], ebp 0x00000056 add dword ptr [esp+04h], 0000001Dh 0x0000005e inc ebp 0x0000005f push ebp 0x00000060 ret 0x00000061 pop ebp 0x00000062 ret 0x00000063 mov dword ptr [ebp+122D1B80h], ecx 0x00000069 push eax 0x0000006a push eax 0x0000006b push edx 0x0000006c jng 00007FA8D8E1DCFCh 0x00000072 push eax 0x00000073 push edx 0x00000074 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 109F641 second address: 109F645 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10A170B second address: 10A1710 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 109F645 second address: 109F64B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10A2758 second address: 10A27AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov dword ptr [esp], eax 0x00000008 mov di, F2E8h 0x0000000c push dword ptr fs:[00000000h] 0x00000013 mov dword ptr fs:[00000000h], esp 0x0000001a mov bx, F91Ah 0x0000001e mov eax, dword ptr [ebp+122D0159h] 0x00000024 movzx ebx, cx 0x00000027 push FFFFFFFFh 0x00000029 mov bx, CAB3h 0x0000002d and di, F9A3h 0x00000032 nop 0x00000033 pushad 0x00000034 jmp 00007FA8D8E1DCFFh 0x00000039 jns 00007FA8D8E1DCF8h 0x0000003f push esi 0x00000040 pop esi 0x00000041 popad 0x00000042 push eax 0x00000043 jnp 00007FA8D8E1DD08h 0x00000049 push eax 0x0000004a push edx 0x0000004b push eax 0x0000004c push edx 0x0000004d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 109F64B second address: 109F64F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10A27AF second address: 10A27B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10A65C5 second address: 10A65F0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E164ACh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007FA8D8E164AFh 0x0000000e popad 0x0000000f push eax 0x00000010 jl 00007FA8D8E164B0h 0x00000016 push eax 0x00000017 push edx 0x00000018 push ecx 0x00000019 pop ecx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10AAFDD second address: 10AAFE1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10AAFE1 second address: 10AB02E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnp 00007FA8D8E164B6h 0x0000000c popad 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 jmp 00007FA8D8E164B8h 0x00000016 jmp 00007FA8D8E164B3h 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10AF013 second address: 10AF01D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FA8D8E1DCF6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10AF01D second address: 10AF029 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10AF029 second address: 10AF034 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 je 00007FA8D8E1DCF6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10AF4A7 second address: 10AF4AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10B4886 second address: 10B488A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10B488A second address: 10B4890 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10B491A second address: 10B491E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10B491E second address: 10B4934 instructions: 0x00000000 rdtsc 0x00000002 je 00007FA8D8E164A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ecx 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e je 00007FA8D8E164A8h 0x00000014 pushad 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10B4934 second address: 10B4975 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E1DCFFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d pushad 0x0000000e jmp 00007FA8D8E1DD04h 0x00000013 jp 00007FA8D8E1DCF8h 0x00000019 popad 0x0000001a mov eax, dword ptr [eax] 0x0000001c push eax 0x0000001d push edx 0x0000001e ja 00007FA8D8E1DCF8h 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10B4975 second address: 10B4985 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA8D8E164ACh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10B4985 second address: 10B4999 instructions: 0x00000000 rdtsc 0x00000002 js 00007FA8D8E1DCF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp+04h], eax 0x00000010 pushad 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10B4999 second address: 10B49AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FA8D8E164A6h 0x0000000a popad 0x0000000b jbe 00007FA8D8E164ACh 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10B4B53 second address: 10B4B93 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FA8D8E1DCF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ebx 0x0000000b push eax 0x0000000c jp 00007FA8D8E1DD07h 0x00000012 mov eax, dword ptr [esp+04h] 0x00000016 push ebx 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007FA8D8E1DD06h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10B8561 second address: 10B8568 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10B8ABF second address: 10B8AC4 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10B8AC4 second address: 10B8ADC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a jmp 00007FA8D8E164ACh 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10B8C32 second address: 10B8C44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA8D8E1DCFEh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10B8C44 second address: 10B8C79 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jl 00007FA8D8E164A6h 0x0000000d jmp 00007FA8D8E164B3h 0x00000012 pop eax 0x00000013 pop ecx 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FA8D8E164B1h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10B8F26 second address: 10B8F2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10B90A3 second address: 10B90A9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10B90A9 second address: 10B90BF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E1DCFEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10B90BF second address: 10B90C3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10B90C3 second address: 10B90E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FA8D8E1DCF6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jc 00007FA8D8E1DD02h 0x00000016 jc 00007FA8D8E1DCF6h 0x0000001c jo 00007FA8D8E1DCF6h 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10B90E5 second address: 10B90ED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10B9254 second address: 10B925F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FA8D8E1DCF6h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10B9597 second address: 10B95B6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E164B2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edx 0x0000000a jc 00007FA8D8E164A6h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10B970E second address: 10B9712 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10B9712 second address: 10B9721 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FA8D8E164A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10BFE0F second address: 10BFE15 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10BFE15 second address: 10BFE57 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jmp 00007FA8D8E164B5h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jno 00007FA8D8E164A6h 0x00000012 push ebx 0x00000013 pop ebx 0x00000014 popad 0x00000015 je 00007FA8D8E164AAh 0x0000001b pushad 0x0000001c popad 0x0000001d push ebx 0x0000001e pop ebx 0x0000001f popad 0x00000020 push eax 0x00000021 push edx 0x00000022 push esi 0x00000023 push esi 0x00000024 pop esi 0x00000025 jmp 00007FA8D8E164ACh 0x0000002a pop esi 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10BF1B1 second address: 10BF1D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA8D8E1DCFBh 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007FA8D8E1DCFFh 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10C2936 second address: 10C295D instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FA8D8E164B7h 0x0000000f jg 00007FA8D8E164A6h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10C295D second address: 10C2961 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10C2961 second address: 10C296A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10C296A second address: 10C2972 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10C6CF3 second address: 10C6CF7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10C6CF7 second address: 10C6D22 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA8D8E1DCFCh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007FA8D8E1DD09h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10C6D22 second address: 10C6D57 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA8D8E164AAh 0x00000008 jmp 00007FA8D8E164B8h 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FA8D8E164ADh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10C6EAD second address: 10C6EC0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA8D8E1DCFFh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10C6EC0 second address: 10C6EE3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E164AEh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FA8D8E164ADh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10C72F4 second address: 10C7303 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jo 00007FA8D8E1DCF6h 0x0000000d push esi 0x0000000e pop esi 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10C7303 second address: 10C7307 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10C7307 second address: 10C7313 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FA8D8E1DCF6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10C7313 second address: 10C7319 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10C7319 second address: 10C731D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10C75A8 second address: 10C75CC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E164B9h 0x00000007 pushad 0x00000008 jnp 00007FA8D8E164A6h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10C75CC second address: 10C75D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10C75D2 second address: 10C75DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push edx 0x00000008 pushad 0x00000009 push esi 0x0000000a pop esi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10C78E3 second address: 10C7909 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ecx 0x00000007 pop esi 0x00000008 push eax 0x00000009 push edx 0x0000000a push ebx 0x0000000b js 00007FA8D8E1DCF6h 0x00000011 jnl 00007FA8D8E1DCF6h 0x00000017 pop ebx 0x00000018 jo 00007FA8D8E1DCFEh 0x0000001e jc 00007FA8D8E1DCF6h 0x00000024 push edi 0x00000025 pop edi 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 104B148 second address: 104B14C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10C80FE second address: 10C811C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E1DD07h 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10C6A4E second address: 10C6A5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push ecx 0x00000006 ja 00007FA8D8E164A6h 0x0000000c pop ecx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10C6A5B second address: 10C6A63 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10CCD46 second address: 10CCD9D instructions: 0x00000000 rdtsc 0x00000002 jns 00007FA8D8E164C5h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 jmp 00007FA8D8E164B8h 0x00000016 pushad 0x00000017 popad 0x00000018 popad 0x00000019 jno 00007FA8D8E164ACh 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10CCD9D second address: 10CCDA2 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10952B7 second address: 10952BB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10952BB second address: 10761CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push eax 0x00000008 jmp 00007FA8D8E1DD03h 0x0000000d nop 0x0000000e mov edx, dword ptr [ebp+122D1A55h] 0x00000014 call dword ptr [ebp+1245D33Dh] 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d pushad 0x0000001e popad 0x0000001f pop eax 0x00000020 push edx 0x00000021 jns 00007FA8D8E1DCF6h 0x00000027 push ecx 0x00000028 pop ecx 0x00000029 pop edx 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10954A4 second address: 10954B3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA8D8E164ABh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10954B3 second address: 10954B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1095882 second address: 1095886 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1095886 second address: 109588C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 109588C second address: 10958FF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a add dword ptr [esp], 7F37F23Ah 0x00000011 push 00000000h 0x00000013 push ebp 0x00000014 call 00007FA8D8E164A8h 0x00000019 pop ebp 0x0000001a mov dword ptr [esp+04h], ebp 0x0000001e add dword ptr [esp+04h], 0000001Ah 0x00000026 inc ebp 0x00000027 push ebp 0x00000028 ret 0x00000029 pop ebp 0x0000002a ret 0x0000002b mov dword ptr [ebp+122D19F3h], ebx 0x00000031 call 00007FA8D8E164A9h 0x00000036 push esi 0x00000037 jmp 00007FA8D8E164B3h 0x0000003c pop esi 0x0000003d push eax 0x0000003e push eax 0x0000003f push edx 0x00000040 jmp 00007FA8D8E164B9h 0x00000045 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10958FF second address: 1095918 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA8D8E1DD05h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1095918 second address: 109591C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 109591C second address: 1095969 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c pushad 0x0000000d push edi 0x0000000e push edx 0x0000000f pop edx 0x00000010 pop edi 0x00000011 jmp 00007FA8D8E1DD00h 0x00000016 popad 0x00000017 mov eax, dword ptr [eax] 0x00000019 jmp 00007FA8D8E1DD08h 0x0000001e mov dword ptr [esp+04h], eax 0x00000022 push eax 0x00000023 push edx 0x00000024 jmp 00007FA8D8E1DCFBh 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1095A34 second address: 1095A3A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1095AD6 second address: 1095ADC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1095D94 second address: 1095D98 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10961E2 second address: 10961EC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007FA8D8E1DCF6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10961EC second address: 1096240 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FA8D8E164A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp], eax 0x0000000f mov ecx, dword ptr [ebp+122D1BD2h] 0x00000015 push 0000001Eh 0x00000017 push 00000000h 0x00000019 push esi 0x0000001a call 00007FA8D8E164A8h 0x0000001f pop esi 0x00000020 mov dword ptr [esp+04h], esi 0x00000024 add dword ptr [esp+04h], 00000018h 0x0000002c inc esi 0x0000002d push esi 0x0000002e ret 0x0000002f pop esi 0x00000030 ret 0x00000031 jmp 00007FA8D8E164B3h 0x00000036 push eax 0x00000037 jo 00007FA8D8E164B0h 0x0000003d pushad 0x0000003e push eax 0x0000003f push edx 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1096359 second address: 109635D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 109660B second address: 109660F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 109660F second address: 109661A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jbe 00007FA8D8E1DCF6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 109661A second address: 1096670 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push edx 0x0000000b call 00007FA8D8E164A8h 0x00000010 pop edx 0x00000011 mov dword ptr [esp+04h], edx 0x00000015 add dword ptr [esp+04h], 00000014h 0x0000001d inc edx 0x0000001e push edx 0x0000001f ret 0x00000020 pop edx 0x00000021 ret 0x00000022 lea eax, dword ptr [ebp+12482FD5h] 0x00000028 call 00007FA8D8E164B9h 0x0000002d js 00007FA8D8E164ACh 0x00000033 sub edx, dword ptr [ebp+122D2906h] 0x00000039 pop edx 0x0000003a nop 0x0000003b pushad 0x0000003c push eax 0x0000003d push edx 0x0000003e push ebx 0x0000003f pop ebx 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1096670 second address: 1096694 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FA8D8E1DCF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FA8D8E1DD03h 0x0000000f popad 0x00000010 push eax 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 push edi 0x00000015 pop edi 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1096694 second address: 1076E84 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jc 00007FA8D8E164ACh 0x0000000c popad 0x0000000d nop 0x0000000e jno 00007FA8D8E164ACh 0x00000014 jo 00007FA8D8E164A6h 0x0000001a call dword ptr [ebp+1244D64Dh] 0x00000020 pushad 0x00000021 push ecx 0x00000022 pushad 0x00000023 popad 0x00000024 pop ecx 0x00000025 pushad 0x00000026 jnl 00007FA8D8E164A6h 0x0000002c push ebx 0x0000002d pop ebx 0x0000002e jmp 00007FA8D8E164B7h 0x00000033 popad 0x00000034 pushad 0x00000035 jng 00007FA8D8E164A6h 0x0000003b pushad 0x0000003c popad 0x0000003d jmp 00007FA8D8E164ACh 0x00000042 popad 0x00000043 push eax 0x00000044 push edx 0x00000045 js 00007FA8D8E164A6h 0x0000004b jmp 00007FA8D8E164AFh 0x00000050 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10CC067 second address: 10CC076 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA8D8E1DCFBh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10CC076 second address: 10CC089 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FA8D8E164A6h 0x00000008 push edi 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push edi 0x0000000e pop edi 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10CC488 second address: 10CC499 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA8D8E1DCFDh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10CC499 second address: 10CC49D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10CC925 second address: 10CC943 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007FA8D8E1DCF6h 0x0000000a popad 0x0000000b pushad 0x0000000c jo 00007FA8D8E1DCF6h 0x00000012 jp 00007FA8D8E1DCF6h 0x00000018 popad 0x00000019 pushad 0x0000001a push ecx 0x0000001b pop ecx 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10CC943 second address: 10CC949 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10D3FCE second address: 10D4004 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E1DD00h 0x00000007 jmp 00007FA8D8E1DD06h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 push edi 0x00000012 pop edi 0x00000013 push ebx 0x00000014 pop ebx 0x00000015 pushad 0x00000016 popad 0x00000017 pushad 0x00000018 popad 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10D4004 second address: 10D401B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E164AAh 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a jg 00007FA8D8E164A6h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10D39C2 second address: 10D39E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a jc 00007FA8D8E1DCF6h 0x00000010 jmp 00007FA8D8E1DD05h 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10D39E8 second address: 10D39EE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10D39EE second address: 10D39F2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10D39F2 second address: 10D39F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10D3B77 second address: 10D3B8A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA8D8E1DCFFh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10D3CE8 second address: 10D3CFD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E164AFh 0x00000007 push esi 0x00000008 pop esi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10DA9E0 second address: 10DA9EB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 je 00007FA8D8E1DCF6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10DAB2A second address: 10DAB30 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10DAC70 second address: 10DAC74 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10DAC74 second address: 10DAC84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jg 00007FA8D8E164A6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10DAC84 second address: 10DAC88 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10DAE34 second address: 10DAE4C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 jno 00007FA8D8E164A6h 0x0000000b pop edi 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 jno 00007FA8D8E164A6h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10DAE4C second address: 10DAE70 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA8D8E1DD01h 0x00000009 push eax 0x0000000a pop eax 0x0000000b popad 0x0000000c jns 00007FA8D8E1DCFCh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10E07D8 second address: 10E07F2 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FA8D8E164A6h 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push esi 0x0000000f pop esi 0x00000010 jmp 00007FA8D8E164AAh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10E07F2 second address: 10E07F6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10E09A3 second address: 10E09D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA8D8E164B6h 0x00000009 pop edi 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FA8D8E164AEh 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10E09D0 second address: 10E09D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10E09D4 second address: 10E09D8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10E0CA0 second address: 10E0CA6 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10E0CA6 second address: 10E0CB2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 push edx 0x00000009 push ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10E0CB2 second address: 10E0CD0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA8D8E1DD09h 0x00000009 pop ecx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10E0F4A second address: 10E0F5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push ecx 0x00000008 pushad 0x00000009 popad 0x0000000a jp 00007FA8D8E164A6h 0x00000010 pop ecx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10E0F5B second address: 10E0F6F instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 pop ebx 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jc 00007FA8D8E1DD28h 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10E0F6F second address: 10E0F73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10E0F73 second address: 10E0F7D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10E0F7D second address: 10E0F81 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10E196E second address: 10E1973 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10E43B0 second address: 10E43CA instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jmp 00007FA8D8E164B1h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10E453A second address: 10E453E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10E46BD second address: 10E46D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jnp 00007FA8D8E164AEh 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10E46D0 second address: 10E46D5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10E46D5 second address: 10E46E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FA8D8E164A6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10E46E1 second address: 10E4721 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FA8D8E1DD02h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d pushad 0x0000000e jmp 00007FA8D8E1DCFEh 0x00000013 push ebx 0x00000014 pop ebx 0x00000015 pushad 0x00000016 popad 0x00000017 popad 0x00000018 js 00007FA8D8E1DCFAh 0x0000001e pushad 0x0000001f popad 0x00000020 push eax 0x00000021 pop eax 0x00000022 jl 00007FA8D8E1DD02h 0x00000028 push eax 0x00000029 push edx 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10E4721 second address: 10E4727 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10EB33F second address: 10EB35A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E1DD07h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10EB35A second address: 10EB37C instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FA8D8E164C4h 0x00000008 jmp 00007FA8D8E164B8h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10EB37C second address: 10EB387 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10EB387 second address: 10EB3A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA8D8E164B9h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10EB3A5 second address: 10EB3AA instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10EB642 second address: 10EB669 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 jmp 00007FA8D8E164B8h 0x0000000a push eax 0x0000000b push edx 0x0000000c jne 00007FA8D8E164A8h 0x00000012 push ecx 0x00000013 pop ecx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10EB8F3 second address: 10EB8F7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10EC97F second address: 10EC983 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10EC983 second address: 10EC98F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 push esi 0x0000000a pop esi 0x0000000b pop esi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10ECCA4 second address: 10ECCA8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10ECCA8 second address: 10ECCAE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10F0F56 second address: 10F0F73 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jmp 00007FA8D8E164B7h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10F002F second address: 10F0033 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10F0033 second address: 10F003B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10F003B second address: 10F0045 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FA8D8E1DCFCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10F0045 second address: 10F004D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10F01AC second address: 10F01ED instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FA8D8E1DCF6h 0x00000008 jg 00007FA8D8E1DCF6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 popad 0x00000011 pushad 0x00000012 pushad 0x00000013 pushad 0x00000014 popad 0x00000015 jl 00007FA8D8E1DCF6h 0x0000001b jmp 00007FA8D8E1DD03h 0x00000020 push esi 0x00000021 pop esi 0x00000022 popad 0x00000023 jns 00007FA8D8E1DCF8h 0x00000029 push eax 0x0000002a push edx 0x0000002b jne 00007FA8D8E1DCF6h 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10F04C8 second address: 10F04CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10F04CC second address: 10F04E4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E1DD04h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10F062C second address: 10F0660 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 pushad 0x0000000a popad 0x0000000b pop ebx 0x0000000c jmp 00007FA8D8E164B4h 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FA8D8E164AEh 0x00000019 push ebx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10F0660 second address: 10F0665 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10F0966 second address: 10F096A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10F096A second address: 10F0970 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10F0970 second address: 10F097F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 je 00007FA8D8E164B0h 0x0000000c push esi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10F0C59 second address: 10F0C5F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10F0C5F second address: 10F0C63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10F0C63 second address: 10F0C6D instructions: 0x00000000 rdtsc 0x00000002 jp 00007FA8D8E1DCFCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10F5881 second address: 10F5885 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10F5885 second address: 10F588B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10FC930 second address: 10FC93C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007FA8D8E164A6h 0x0000000a push edi 0x0000000b pop edi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10FCAA6 second address: 10FCAAA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10FCAAA second address: 10FCABE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 jnc 00007FA8D8E164A6h 0x0000000d jns 00007FA8D8E164A6h 0x00000013 pop ebx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10FCC3A second address: 10FCC40 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10FCDAE second address: 10FCDCE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E164B9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10FCF32 second address: 10FCF4E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jbe 00007FA8D8E1DD07h 0x0000000b pushad 0x0000000c popad 0x0000000d jmp 00007FA8D8E1DCFFh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10FCF4E second address: 10FCF80 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E164ABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ebx 0x0000000c js 00007FA8D8E164A6h 0x00000012 pop ebx 0x00000013 push edx 0x00000014 jmp 00007FA8D8E164B5h 0x00000019 push esi 0x0000001a pop esi 0x0000001b pop edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 10FE182 second address: 10FE187 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1106063 second address: 1106068 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1105EBC second address: 1105ED9 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007FA8D8E1DD05h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1105ED9 second address: 1105EDF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1105EDF second address: 1105EE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1105EE5 second address: 1105EE9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 110AA93 second address: 110AAA8 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007FA8D8E1DD00h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 110A49B second address: 110A49F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 110A49F second address: 110A4AF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E1DCFAh 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 110A791 second address: 110A79E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 jp 00007FA8D8E164A6h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 110A79E second address: 110A7A8 instructions: 0x00000000 rdtsc 0x00000002 je 00007FA8D8E1DCF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 110A7A8 second address: 110A7C4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA8D8E164B8h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1117E05 second address: 1117E09 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1117E09 second address: 1117E11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1117E11 second address: 1117E39 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E1DCFAh 0x00000007 pushad 0x00000008 push edx 0x00000009 pop edx 0x0000000a jmp 00007FA8D8E1DD07h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1117E39 second address: 1117E74 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FA8D8E164A6h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pushad 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 push edi 0x00000012 pop edi 0x00000013 jl 00007FA8D8E164A6h 0x00000019 jnc 00007FA8D8E164A6h 0x0000001f popad 0x00000020 push eax 0x00000021 push edx 0x00000022 jmp 00007FA8D8E164B9h 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1117E74 second address: 1117E78 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1117A04 second address: 1117A16 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FA8D8E164A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ebx 0x0000000b pushad 0x0000000c popad 0x0000000d pop ebx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1117A16 second address: 1117A1C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1117A1C second address: 1117A22 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1117BB5 second address: 1117BBC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ecx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 11209E5 second address: 11209EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 11209EA second address: 11209EF instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 112B5E2 second address: 112B5E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 112B5E8 second address: 112B5EE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 112B5EE second address: 112B60F instructions: 0x00000000 rdtsc 0x00000002 jg 00007FA8D8E164A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jc 00007FA8D8E164A6h 0x00000011 pop eax 0x00000012 pop edx 0x00000013 pop eax 0x00000014 push ebx 0x00000015 push ecx 0x00000016 pushad 0x00000017 popad 0x00000018 pop ecx 0x00000019 push eax 0x0000001a push edx 0x0000001b js 00007FA8D8E164A6h 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 112FC4B second address: 112FC72 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FA8D8E1DCF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FA8D8E1DD09h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 112FC72 second address: 112FC76 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 112FC76 second address: 112FC7A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 112FC7A second address: 112FC8A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edx 0x00000009 pop edx 0x0000000a jg 00007FA8D8E164A6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 112FC8A second address: 112FCB3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E1DD05h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edi 0x0000000a pushad 0x0000000b popad 0x0000000c jbe 00007FA8D8E1DCF6h 0x00000012 pop edi 0x00000013 popad 0x00000014 push edi 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 112FCB3 second address: 112FCB9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 112FCB9 second address: 112FCC3 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 112FCC3 second address: 112FCC9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 113726A second address: 1137276 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jo 00007FA8D8E1DCF6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1137276 second address: 113727D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1137788 second address: 113779E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 jng 00007FA8D8E1DCF6h 0x0000000f js 00007FA8D8E1DCF6h 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 113779E second address: 11377A3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 11377A3 second address: 11377A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 11377A9 second address: 11377AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1137BD8 second address: 1137BDF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ecx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 113C249 second address: 113C261 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 jc 00007FA8D8E164ACh 0x0000000b jnl 00007FA8D8E164A6h 0x00000011 pop esi 0x00000012 push edi 0x00000013 push edi 0x00000014 push ebx 0x00000015 pop ebx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 113F72E second address: 113F738 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push esi 0x00000007 pop esi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 113F738 second address: 113F73D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 113F73D second address: 113F775 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007FA8D8E1DD08h 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d pushad 0x0000000e popad 0x0000000f pop eax 0x00000010 pushad 0x00000011 jbe 00007FA8D8E1DCF6h 0x00000017 jo 00007FA8D8E1DCF6h 0x0000001d jl 00007FA8D8E1DCF6h 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 114B2B3 second address: 114B2E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA8D8E164AFh 0x00000009 popad 0x0000000a jno 00007FA8D8E164B4h 0x00000010 je 00007FA8D8E164B2h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 114B2E3 second address: 114B307 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FA8D8E1DCF6h 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d pop edx 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FA8D8E1DD00h 0x00000016 pushad 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 114B307 second address: 114B30E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 11588BE second address: 11588C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 11585E7 second address: 11585ED instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 116D5C0 second address: 116D5C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 116D5C4 second address: 116D5E2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E164B4h 0x00000007 jnp 00007FA8D8E164A6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 116D5E2 second address: 116D5E7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 116D5E7 second address: 116D5ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 116D5ED second address: 116D61B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA8D8E1DD03h 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b popad 0x0000000c pushad 0x0000000d jmp 00007FA8D8E1DCFBh 0x00000012 jbe 00007FA8D8E1DCF6h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 116D920 second address: 116D924 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 116D924 second address: 116D936 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E1DCFEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 116D936 second address: 116D946 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FA8D8E164B2h 0x00000008 jc 00007FA8D8E164A6h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 116D946 second address: 116D96B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA8D8E1DD06h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e jp 00007FA8D8E1DCF6h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 116DAC1 second address: 116DAC7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 116DAC7 second address: 116DACB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 116DACB second address: 116DAF7 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jnl 00007FA8D8E164A6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jg 00007FA8D8E164B9h 0x00000012 pop edx 0x00000013 pop eax 0x00000014 push ecx 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 116DAF7 second address: 116DB01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FA8D8E1DCF6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 116FE43 second address: 116FE49 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1174062 second address: 1174068 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1174068 second address: 1174075 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b push edi 0x0000000c pop edi 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1174075 second address: 1174090 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E1DD07h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 117584C second address: 1175850 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1175850 second address: 117585A instructions: 0x00000000 rdtsc 0x00000002 jno 00007FA8D8E1DCF6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 117585A second address: 1175864 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1175864 second address: 1175870 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FA8D8E1DCF6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 1175870 second address: 117587A instructions: 0x00000000 rdtsc 0x00000002 jl 00007FA8D8E164ACh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 117784E second address: 1177858 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FA8D8E1DCF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55B08DA second address: 55B08EE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edx, 776AE624h 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xchg eax, ebp 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55B08EE second address: 55B08F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55B08F2 second address: 55B08F8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55B08F8 second address: 55B096E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E1DCFDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b jmp 00007FA8D8E1DCFEh 0x00000010 xchg eax, ecx 0x00000011 pushad 0x00000012 pushad 0x00000013 mov bx, si 0x00000016 mov bl, al 0x00000018 popad 0x00000019 mov edx, 237B7F38h 0x0000001e popad 0x0000001f push eax 0x00000020 jmp 00007FA8D8E1DCFEh 0x00000025 xchg eax, ecx 0x00000026 pushad 0x00000027 call 00007FA8D8E1DCFEh 0x0000002c pushad 0x0000002d popad 0x0000002e pop esi 0x0000002f movsx ebx, cx 0x00000032 popad 0x00000033 xchg eax, esi 0x00000034 jmp 00007FA8D8E1DD08h 0x00000039 push eax 0x0000003a push eax 0x0000003b push edx 0x0000003c push eax 0x0000003d push edx 0x0000003e push eax 0x0000003f push edx 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55B096E second address: 55B0972 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55B0972 second address: 55B0976 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55B0976 second address: 55B097C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55B097C second address: 55B0992 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA8D8E1DD02h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55B0992 second address: 55B09CC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, esi 0x00000009 jmp 00007FA8D8E164B7h 0x0000000e lea eax, dword ptr [ebp-04h] 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FA8D8E164B5h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55B09CC second address: 55B09FB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edx, ax 0x00000006 mov edi, ecx 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c jmp 00007FA8D8E1DD02h 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FA8D8E1DCFEh 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55B09FB second address: 55B0A0D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA8D8E164AEh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55B0A0D second address: 55B0A11 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55B0A11 second address: 55B0A4B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 jmp 00007FA8D8E164B7h 0x0000000e push dword ptr [ebp+08h] 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FA8D8E164B5h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55B0A7A second address: 55B0A80 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55B0A80 second address: 55B0A85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55B0AD5 second address: 55B0AD9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55B0AD9 second address: 55B0ADF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55B0ADF second address: 55B0B03 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, 1F6A9BB8h 0x00000008 call 00007FA8D8E1DD01h 0x0000000d pop esi 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 pop esi 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55B0B03 second address: 55B0B07 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55B0B07 second address: 55B0B0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55B0B0D second address: 55A0016 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E164ABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 leave 0x0000000a jmp 00007FA8D8E164B6h 0x0000000f retn 0004h 0x00000012 nop 0x00000013 cmp eax, 00000000h 0x00000016 setne al 0x00000019 xor ebx, ebx 0x0000001b test al, 01h 0x0000001d jne 00007FA8D8E164A7h 0x0000001f sub esp, 04h 0x00000022 mov dword ptr [esp], 0000000Dh 0x00000029 call 00007FA8DD4F7CB7h 0x0000002e mov edi, edi 0x00000030 push eax 0x00000031 push edx 0x00000032 pushad 0x00000033 call 00007FA8D8E164ADh 0x00000038 pop ecx 0x00000039 push edx 0x0000003a pop ecx 0x0000003b popad 0x0000003c rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0016 second address: 55A0027 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dx, si 0x00000006 mov edx, ecx 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f mov edx, ecx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0027 second address: 55A0038 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 68047FB5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e mov cl, C0h 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0038 second address: 55A003E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A003E second address: 55A0042 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0042 second address: 55A0062 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FA8D8E1DD05h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0062 second address: 55A0068 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0068 second address: 55A006C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A006C second address: 55A0070 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0070 second address: 55A0080 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0080 second address: 55A0086 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0086 second address: 55A008B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A008B second address: 55A0107 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007FA8D8E164AFh 0x0000000a sub eax, 637A845Eh 0x00000010 jmp 00007FA8D8E164B9h 0x00000015 popfd 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 sub esp, 2Ch 0x0000001c jmp 00007FA8D8E164AEh 0x00000021 xchg eax, ebx 0x00000022 pushad 0x00000023 push ecx 0x00000024 mov eax, edx 0x00000026 pop edx 0x00000027 mov cl, 33h 0x00000029 popad 0x0000002a push eax 0x0000002b jmp 00007FA8D8E164B0h 0x00000030 xchg eax, ebx 0x00000031 push eax 0x00000032 push edx 0x00000033 jmp 00007FA8D8E164B7h 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0107 second address: 55A017D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E1DD09h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, edi 0x0000000a jmp 00007FA8D8E1DCFEh 0x0000000f push eax 0x00000010 pushad 0x00000011 call 00007FA8D8E1DD01h 0x00000016 mov edx, ecx 0x00000018 pop esi 0x00000019 push edx 0x0000001a pushfd 0x0000001b jmp 00007FA8D8E1DD08h 0x00000020 add ecx, 373D8108h 0x00000026 jmp 00007FA8D8E1DCFBh 0x0000002b popfd 0x0000002c pop ecx 0x0000002d popad 0x0000002e xchg eax, edi 0x0000002f push eax 0x00000030 push edx 0x00000031 pushad 0x00000032 push eax 0x00000033 push edx 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A017D second address: 55A0190 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA8D8E164AEh 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0190 second address: 55A0195 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A01B3 second address: 55A01B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A01B7 second address: 55A01BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A01BD second address: 55A0272 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E164B4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 sub ebx, ebx 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007FA8D8E164B7h 0x00000012 add cx, 74BEh 0x00000017 jmp 00007FA8D8E164B9h 0x0000001c popfd 0x0000001d mov si, 1A07h 0x00000021 popad 0x00000022 sub edi, edi 0x00000024 pushad 0x00000025 call 00007FA8D8E164B9h 0x0000002a pushfd 0x0000002b jmp 00007FA8D8E164B0h 0x00000030 or esi, 768C0018h 0x00000036 jmp 00007FA8D8E164ABh 0x0000003b popfd 0x0000003c pop ecx 0x0000003d movsx edx, si 0x00000040 popad 0x00000041 inc ebx 0x00000042 push eax 0x00000043 push edx 0x00000044 jmp 00007FA8D8E164B7h 0x00000049 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0272 second address: 55A02B6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edi, ax 0x00000006 pushfd 0x00000007 jmp 00007FA8D8E1DD00h 0x0000000c sub si, 84D8h 0x00000011 jmp 00007FA8D8E1DCFBh 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a test al, al 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007FA8D8E1DD05h 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A035A second address: 55A035E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A035E second address: 55A0362 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0362 second address: 55A0368 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A03C4 second address: 55A045B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E1DD09h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jg 00007FA9497CBDA1h 0x0000000f pushad 0x00000010 movzx ecx, di 0x00000013 pushfd 0x00000014 jmp 00007FA8D8E1DD09h 0x00000019 sub cx, 4226h 0x0000001e jmp 00007FA8D8E1DD01h 0x00000023 popfd 0x00000024 popad 0x00000025 js 00007FA8D8E1DD80h 0x0000002b push eax 0x0000002c push edx 0x0000002d pushad 0x0000002e pushfd 0x0000002f jmp 00007FA8D8E1DD03h 0x00000034 or esi, 48DEC55Eh 0x0000003a jmp 00007FA8D8E1DD09h 0x0000003f popfd 0x00000040 popad 0x00000041 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A045B second address: 55A0472 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA8D8E164B3h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0472 second address: 55A0476 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0476 second address: 55A04C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 cmp dword ptr [ebp-14h], edi 0x0000000b pushad 0x0000000c movsx ebx, si 0x0000000f jmp 00007FA8D8E164ACh 0x00000014 popad 0x00000015 jne 00007FA9497C44AFh 0x0000001b pushad 0x0000001c push ecx 0x0000001d jmp 00007FA8D8E164ADh 0x00000022 pop eax 0x00000023 mov dx, 9594h 0x00000027 popad 0x00000028 mov ebx, dword ptr [ebp+08h] 0x0000002b push eax 0x0000002c push edx 0x0000002d jmp 00007FA8D8E164B6h 0x00000032 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A04C8 second address: 55A0523 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E1DCFBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 lea eax, dword ptr [ebp-2Ch] 0x0000000c pushad 0x0000000d mov al, CDh 0x0000000f jmp 00007FA8D8E1DD01h 0x00000014 popad 0x00000015 xchg eax, esi 0x00000016 jmp 00007FA8D8E1DCFEh 0x0000001b push eax 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f pushfd 0x00000020 jmp 00007FA8D8E1DCFCh 0x00000025 xor cx, 7A08h 0x0000002a jmp 00007FA8D8E1DCFBh 0x0000002f popfd 0x00000030 mov edi, esi 0x00000032 popad 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0523 second address: 55A0537 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA8D8E164B0h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0537 second address: 55A053B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A053B second address: 55A0550 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, esi 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FA8D8E164AAh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0550 second address: 55A0562 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA8D8E1DCFEh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0562 second address: 55A059B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E164ABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c jmp 00007FA8D8E164B6h 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FA8D8E164AEh 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A059B second address: 55A05DE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FA8D8E1DD01h 0x00000009 sub esi, 3E457946h 0x0000000f jmp 00007FA8D8E1DD01h 0x00000014 popfd 0x00000015 mov edx, esi 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a nop 0x0000001b jmp 00007FA8D8E1DCFAh 0x00000020 xchg eax, ebx 0x00000021 pushad 0x00000022 push eax 0x00000023 push edx 0x00000024 mov esi, edi 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A063E second address: 55A068C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E164ABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov esi, eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e mov bx, A576h 0x00000012 pushfd 0x00000013 jmp 00007FA8D8E164B7h 0x00000018 or ch, FFFFFFFEh 0x0000001b jmp 00007FA8D8E164B9h 0x00000020 popfd 0x00000021 popad 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A068C second address: 55A06A9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E1DD01h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test esi, esi 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A06A9 second address: 55A06AD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A06AD second address: 55A06B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A06B3 second address: 55A06C8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA8D8E164B1h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A06C8 second address: 55A06CC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A06CC second address: 5590C19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 je 00007FA9497C4427h 0x0000000e xor eax, eax 0x00000010 jmp 00007FA8D8DEFBDAh 0x00000015 pop esi 0x00000016 pop edi 0x00000017 pop ebx 0x00000018 leave 0x00000019 retn 0004h 0x0000001c nop 0x0000001d cmp eax, 00000000h 0x00000020 setne cl 0x00000023 xor ebx, ebx 0x00000025 test cl, 00000001h 0x00000028 jne 00007FA8D8E164A7h 0x0000002a jmp 00007FA8D8E16664h 0x0000002f call 00007FA8DD4E86E2h 0x00000034 mov edi, edi 0x00000036 push eax 0x00000037 push edx 0x00000038 pushad 0x00000039 jmp 00007FA8D8E164AEh 0x0000003e mov dx, cx 0x00000041 popad 0x00000042 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 5590C19 second address: 5590C1F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 5590C1F second address: 5590C23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 5590C23 second address: 5590C48 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c call 00007FA8D8E1DD07h 0x00000011 pop eax 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 5590C48 second address: 5590C6D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edx, si 0x00000006 mov ebx, esi 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], ebp 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FA8D8E164B5h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 5590C6D second address: 5590C7D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA8D8E1DCFCh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 5590C7D second address: 5590C93 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FA8D8E164AAh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 5590C93 second address: 5590C99 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 5590C99 second address: 5590CB6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FA8D8E164B0h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 5590CB6 second address: 5590CBA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 5590CBA second address: 5590CC0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 5590CC0 second address: 5590CDB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E1DCFEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 5590CDB second address: 5590CDF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 5590CDF second address: 5590CE5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0AE9 second address: 55A0B0D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E164B1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FA8D8E164ACh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0B0D second address: 55A0B28 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E1DCFBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov edx, 0A390166h 0x00000012 pushad 0x00000013 popad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0B28 second address: 55A0B81 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA8D8E164B8h 0x00000008 push esi 0x00000009 pop ebx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov ebp, esp 0x0000000f jmp 00007FA8D8E164ACh 0x00000014 cmp dword ptr [75FA459Ch], 05h 0x0000001b jmp 00007FA8D8E164B0h 0x00000020 je 00007FA9497B4338h 0x00000026 push eax 0x00000027 push edx 0x00000028 push eax 0x00000029 push edx 0x0000002a jmp 00007FA8D8E164AAh 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0B81 second address: 55A0B90 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E1DCFBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0B90 second address: 55A0B96 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0B96 second address: 55A0B9A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0BE9 second address: 55A0BF0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov esi, ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0C7E second address: 55A0CAF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E1DD01h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 sub esi, esi 0x0000000b pushad 0x0000000c mov ebx, 5BEF6550h 0x00000011 push edx 0x00000012 push ecx 0x00000013 pop edi 0x00000014 pop esi 0x00000015 popad 0x00000016 mov dword ptr [ebp-1Ch], esi 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007FA8D8E1DCFAh 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0D1C second address: 55A0D20 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0D20 second address: 55A0D26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0D26 second address: 55A0D34 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA8D8E164AAh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55A0D34 second address: 55A0D38 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55B0B52 second address: 55B0B6F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movzx esi, dx 0x00000006 mov esi, edi 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FA8D8E164AFh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55B0B6F second address: 55B0B87 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA8D8E1DD04h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55B0B87 second address: 55B0BB7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E164ABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c jmp 00007FA8D8E164B6h 0x00000011 mov ebp, esp 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 mov bl, 7Eh 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55B0BB7 second address: 55B0BBD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55B0BBD second address: 55B0BC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55B0BC1 second address: 55B0C8F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA8D8E1DCFCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, esi 0x0000000c jmp 00007FA8D8E1DD00h 0x00000011 push eax 0x00000012 pushad 0x00000013 mov dh, 2Eh 0x00000015 push eax 0x00000016 pop eax 0x00000017 popad 0x00000018 xchg eax, esi 0x00000019 pushad 0x0000001a mov di, 2034h 0x0000001e pushfd 0x0000001f jmp 00007FA8D8E1DCFDh 0x00000024 jmp 00007FA8D8E1DCFBh 0x00000029 popfd 0x0000002a popad 0x0000002b mov esi, dword ptr [ebp+0Ch] 0x0000002e pushad 0x0000002f pushfd 0x00000030 jmp 00007FA8D8E1DD04h 0x00000035 sbb al, 00000018h 0x00000038 jmp 00007FA8D8E1DCFBh 0x0000003d popfd 0x0000003e mov si, 68CFh 0x00000042 popad 0x00000043 test esi, esi 0x00000045 pushad 0x00000046 mov si, A2C7h 0x0000004a mov bx, ax 0x0000004d popad 0x0000004e je 00007FA9497AB469h 0x00000054 pushad 0x00000055 movzx ecx, bx 0x00000058 pushfd 0x00000059 jmp 00007FA8D8E1DD01h 0x0000005e sub ecx, 681F8566h 0x00000064 jmp 00007FA8D8E1DD01h 0x00000069 popfd 0x0000006a popad 0x0000006b cmp dword ptr [75FA459Ch], 05h 0x00000072 push eax 0x00000073 push edx 0x00000074 jmp 00007FA8D8E1DCFDh 0x00000079 rdtsc |
Source: C:\Users\user\Desktop\random.exe | RDTSC instruction interceptor: First address: 55B0D78 second address: 55B0D7E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |