Unprotect Project
  • Search
  • Map
  • Resources
    Technique List Snippet List Detection Rule List
  • About
  • API

Search Evasion Techniques

Names, Techniques, Definitions, Keywords

Random is cool

Search Result

1 item(s) found so far for this keyword.

RDTSC Anti-Debugging

The Read-Time-Stamp-Counter (RDTSC) instruction can be used by malware to determine how quicky the processor executes the program’s instructions. It returns the count of the number of ticks since the last system reboot as a 64-bit value placed into EDX:EAX.

It will execute RDTSC twice and then calculate the difference between low order values and check it with CMP …

Made with in 🇫🇷 © 2022. The #UnprotectProject

Disclaimer - EULA - Terms And Conditions

Contribute