Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00538600 | 0_2_00538600 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00606067 | 0_2_00606067 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00650075 | 0_2_00650075 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005EA04D | 0_2_005EA04D |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00642045 | 0_2_00642045 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005AE078 | 0_2_005AE078 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0060A046 | 0_2_0060A046 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005BC077 | 0_2_005BC077 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0061E054 | 0_2_0061E054 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005A6063 | 0_2_005A6063 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0061602A | 0_2_0061602A |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0065C029 | 0_2_0065C029 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005DC00B | 0_2_005DC00B |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005B200C | 0_2_005B200C |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00634003 | 0_2_00634003 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0066600D | 0_2_0066600D |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00662009 | 0_2_00662009 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00676014 | 0_2_00676014 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005A402D | 0_2_005A402D |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005B40D0 | 0_2_005B40D0 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006540F8 | 0_2_006540F8 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0055A0CA | 0_2_0055A0CA |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006300C1 | 0_2_006300C1 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0055C0E6 | 0_2_0055C0E6 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005460E9 | 0_2_005460E9 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005BA092 | 0_2_005BA092 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0055C09E | 0_2_0055C09E |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006600B3 | 0_2_006600B3 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0062608A | 0_2_0062608A |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00680085 | 0_2_00680085 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0059E0AA | 0_2_0059E0AA |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005C60A7 | 0_2_005C60A7 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005E80A5 | 0_2_005E80A5 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0055C09E | 0_2_0055C09E |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005F014E | 0_2_005F014E |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00678173 | 0_2_00678173 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00670172 | 0_2_00670172 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005F6143 | 0_2_005F6143 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005BE144 | 0_2_005BE144 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00536160 | 0_2_00536160 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00548169 | 0_2_00548169 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005FC160 | 0_2_005FC160 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0066C159 | 0_2_0066C159 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0066A125 | 0_2_0066A125 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0064E12C | 0_2_0064E12C |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0067E136 | 0_2_0067E136 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0063A108 | 0_2_0063A108 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006801E1 | 0_2_006801E1 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006001EB | 0_2_006001EB |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005D21CA | 0_2_005D21CA |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005D61CA | 0_2_005D61CA |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005581CC | 0_2_005581CC |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005FE1C3 | 0_2_005FE1C3 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006901DF | 0_2_006901DF |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005F21E4 | 0_2_005F21E4 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006761A8 | 0_2_006761A8 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006561B4 | 0_2_006561B4 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0055E180 | 0_2_0055E180 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005A818C | 0_2_005A818C |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005DC18B | 0_2_005DC18B |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006681B9 | 0_2_006681B9 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00708196 | 0_2_00708196 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0065A195 | 0_2_0065A195 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00640196 | 0_2_00640196 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0064619B | 0_2_0064619B |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0065226D | 0_2_0065226D |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0064A27D | 0_2_0064A27D |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00534270 | 0_2_00534270 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00648247 | 0_2_00648247 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0062A237 | 0_2_0062A237 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00626203 | 0_2_00626203 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0066E203 | 0_2_0066E203 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0068C20E | 0_2_0068C20E |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00604212 | 0_2_00604212 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0054E220 | 0_2_0054E220 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006662E6 | 0_2_006662E6 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005542D0 | 0_2_005542D0 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005B62D7 | 0_2_005B62D7 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006582F3 | 0_2_006582F3 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0061C2FA | 0_2_0061C2FA |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0067A2C2 | 0_2_0067A2C2 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005CA2EA | 0_2_005CA2EA |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005C02E3 | 0_2_005C02E3 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005C8285 | 0_2_005C8285 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006362BE | 0_2_006362BE |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005FA2B8 | 0_2_005FA2B8 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0062E288 | 0_2_0062E288 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00598353 | 0_2_00598353 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005C2343 | 0_2_005C2343 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0063037C | 0_2_0063037C |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005F237E | 0_2_005F237E |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00610340 | 0_2_00610340 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005A2362 | 0_2_005A2362 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005AA31B | 0_2_005AA31B |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005CC305 | 0_2_005CC305 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005EC301 | 0_2_005EC301 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005E2337 | 0_2_005E2337 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005A63DB | 0_2_005A63DB |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005D43D9 | 0_2_005D43D9 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005CE3D5 | 0_2_005CE3D5 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005583D8 | 0_2_005583D8 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006523EB | 0_2_006523EB |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005E63C0 | 0_2_005E63C0 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0062E3A0 | 0_2_0062E3A0 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0059A387 | 0_2_0059A387 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00634380 | 0_2_00634380 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005E83B9 | 0_2_005E83B9 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005C43B5 | 0_2_005C43B5 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0061E38F | 0_2_0061E38F |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005F83AF | 0_2_005F83AF |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00670399 | 0_2_00670399 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0061A474 | 0_2_0061A474 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0056A440 | 0_2_0056A440 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00646472 | 0_2_00646472 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005B2445 | 0_2_005B2445 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00594476 | 0_2_00594476 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00570460 | 0_2_00570460 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0062A42B | 0_2_0062A42B |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005D043F | 0_2_005D043F |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005BA428 | 0_2_005BA428 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005504C6 | 0_2_005504C6 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005524E0 | 0_2_005524E0 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006124A4 | 0_2_006124A4 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005F6495 | 0_2_005F6495 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0059E497 | 0_2_0059E497 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006624A8 | 0_2_006624A8 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005EA4B5 | 0_2_005EA4B5 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00624498 | 0_2_00624498 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00554560 | 0_2_00554560 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005F0569 | 0_2_005F0569 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00640558 | 0_2_00640558 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0060452F | 0_2_0060452F |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0063C52C | 0_2_0063C52C |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0062C53A | 0_2_0062C53A |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005D6538 | 0_2_005D6538 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0055C53C | 0_2_0055C53C |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00686503 | 0_2_00686503 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0064E51F | 0_2_0064E51F |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0066C5E7 | 0_2_0066C5E7 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0056A5D4 | 0_2_0056A5D4 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006925EB | 0_2_006925EB |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006165EA | 0_2_006165EA |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0065C5F1 | 0_2_0065C5F1 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005AC5C1 | 0_2_005AC5C1 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006785FA | 0_2_006785FA |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005365F0 | 0_2_005365F0 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006445CD | 0_2_006445CD |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0061C5D1 | 0_2_0061C5D1 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006285D1 | 0_2_006285D1 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0063E5B5 | 0_2_0063E5B5 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006845B3 | 0_2_006845B3 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005A85BD | 0_2_005A85BD |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0056C5A0 | 0_2_0056C5A0 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0067E59F | 0_2_0067E59F |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0060059F | 0_2_0060059F |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00612662 | 0_2_00612662 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00568650 | 0_2_00568650 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005CA646 | 0_2_005CA646 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00614626 | 0_2_00614626 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00596600 | 0_2_00596600 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005B0606 | 0_2_005B0606 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0059263A | 0_2_0059263A |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0054E630 | 0_2_0054E630 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0065E60E | 0_2_0065E60E |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0066660B | 0_2_0066660B |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005546D0 | 0_2_005546D0 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005C86D2 | 0_2_005C86D2 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005706F0 | 0_2_005706F0 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005F06F7 | 0_2_005F06F7 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006606D3 | 0_2_006606D3 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0063A6AF | 0_2_0063A6AF |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0053E687 | 0_2_0053E687 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00626680 | 0_2_00626680 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0064868E | 0_2_0064868E |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005DA6B1 | 0_2_005DA6B1 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006FC69B | 0_2_006FC69B |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00542750 | 0_2_00542750 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005F2756 | 0_2_005F2756 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0060A740 | 0_2_0060A740 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0067A756 | 0_2_0067A756 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00656753 | 0_2_00656753 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005EE764 | 0_2_005EE764 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005A0718 | 0_2_005A0718 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006FE72B | 0_2_006FE72B |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00634736 | 0_2_00634736 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005B670D | 0_2_005B670D |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0059C73F | 0_2_0059C73F |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005A272B | 0_2_005A272B |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0064A7F7 | 0_2_0064A7F7 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005FE7FF | 0_2_005FE7FF |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005EC7F6 | 0_2_005EC7F6 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0068C7C0 | 0_2_0068C7C0 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005F87F5 | 0_2_005F87F5 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005AA7F6 | 0_2_005AA7F6 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005CE7E0 | 0_2_005CE7E0 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0061A7B3 | 0_2_0061A7B3 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006407B6 | 0_2_006407B6 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0067C78E | 0_2_0067C78E |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00674792 | 0_2_00674792 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0053C840 | 0_2_0053C840 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0059484A | 0_2_0059484A |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005B284F | 0_2_005B284F |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005E8844 | 0_2_005E8844 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0060887D | 0_2_0060887D |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0064C844 | 0_2_0064C844 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0060684C | 0_2_0060684C |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00682850 | 0_2_00682850 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005E4815 | 0_2_005E4815 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0063282E | 0_2_0063282E |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005A4830 | 0_2_005A4830 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005E68D7 | 0_2_005E68D7 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006508EC | 0_2_006508EC |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005E08D1 | 0_2_005E08D1 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006348C6 | 0_2_006348C6 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006928A9 | 0_2_006928A9 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006528A7 | 0_2_006528A7 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0060C8A5 | 0_2_0060C8A5 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005AE882 | 0_2_005AE882 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00602882 | 0_2_00602882 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0062A886 | 0_2_0062A886 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005688B0 | 0_2_005688B0 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00624884 | 0_2_00624884 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0060E88C | 0_2_0060E88C |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0054C8A0 | 0_2_0054C8A0 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0067E89E | 0_2_0067E89E |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005BC95B | 0_2_005BC95B |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005D6946 | 0_2_005D6946 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0054E960 | 0_2_0054E960 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00616955 | 0_2_00616955 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0067695A | 0_2_0067695A |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00556910 | 0_2_00556910 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0068E925 | 0_2_0068E925 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00630936 | 0_2_00630936 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005A892A | 0_2_005A892A |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0061E91F | 0_2_0061E91F |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006689F3 | 0_2_006689F3 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006E69CC | 0_2_006E69CC |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006009C7 | 0_2_006009C7 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005709E0 | 0_2_005709E0 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005BE9EC | 0_2_005BE9EC |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0055C9EB | 0_2_0055C9EB |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006849A8 | 0_2_006849A8 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006669B5 | 0_2_006669B5 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006869BE | 0_2_006869BE |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006709BA | 0_2_006709BA |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005DC9B0 | 0_2_005DC9B0 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00620A66 | 0_2_00620A66 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0066CA73 | 0_2_0066CA73 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0056CA40 | 0_2_0056CA40 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0063CA79 | 0_2_0063CA79 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00644A79 | 0_2_00644A79 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0065EA27 | 0_2_0065EA27 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00660A22 | 0_2_00660A22 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005F6A17 | 0_2_005F6A17 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00618A30 | 0_2_00618A30 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0065CA15 | 0_2_0065CA15 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00690AE7 | 0_2_00690AE7 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00592ACA | 0_2_00592ACA |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00662AF1 | 0_2_00662AF1 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00688AF1 | 0_2_00688AF1 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00664AD6 | 0_2_00664AD6 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005B2A92 | 0_2_005B2A92 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00678AB6 | 0_2_00678AB6 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005B6A88 | 0_2_005B6A88 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005F4A84 | 0_2_005F4A84 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00612ABA | 0_2_00612ABA |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00558ABC | 0_2_00558ABC |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005FCAB3 | 0_2_005FCAB3 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005A0AB5 | 0_2_005A0AB5 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0068EA98 | 0_2_0068EA98 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0062EA94 | 0_2_0062EA94 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0067AB62 | 0_2_0067AB62 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0059AB48 | 0_2_0059AB48 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0053AB40 | 0_2_0053AB40 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005FEB4A | 0_2_005FEB4A |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006FAB46 | 0_2_006FAB46 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00548B1B | 0_2_00548B1B |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00694B35 | 0_2_00694B35 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0066AB3B | 0_2_0066AB3B |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0062CB00 | 0_2_0062CB00 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005FAB3A | 0_2_005FAB3A |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0063EB0E | 0_2_0063EB0E |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005BAB2D | 0_2_005BAB2D |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005B6BDE | 0_2_005B6BDE |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00622BE4 | 0_2_00622BE4 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0062EBF2 | 0_2_0062EBF2 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00626BF1 | 0_2_00626BF1 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0064CBCE | 0_2_0064CBCE |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005E4BEE | 0_2_005E4BEE |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0059EBE3 | 0_2_0059EBE3 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0054EB80 | 0_2_0054EB80 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005A4B8F | 0_2_005A4B8F |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0060CBB6 | 0_2_0060CBB6 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005F2B81 | 0_2_005F2B81 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00658B84 | 0_2_00658B84 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00672B85 | 0_2_00672B85 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005C6BBF | 0_2_005C6BBF |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00534BA0 | 0_2_00534BA0 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00638C72 | 0_2_00638C72 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005E2C46 | 0_2_005E2C46 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00682C74 | 0_2_00682C74 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00596C63 | 0_2_00596C63 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0066EC22 | 0_2_0066EC22 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00604C28 | 0_2_00604C28 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005DCC11 | 0_2_005DCC11 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005F6C09 | 0_2_005F6C09 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00674C1D | 0_2_00674C1D |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00670CE4 | 0_2_00670CE4 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00602CF4 | 0_2_00602CF4 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005CECCB | 0_2_005CECCB |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005D0C9D | 0_2_005D0C9D |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005B8C91 | 0_2_005B8C91 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0060ACAA | 0_2_0060ACAA |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00656CB5 | 0_2_00656CB5 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00632CB1 | 0_2_00632CB1 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00668CBA | 0_2_00668CBA |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005CCCB7 | 0_2_005CCCB7 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0061AC8C | 0_2_0061AC8C |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00544CA0 | 0_2_00544CA0 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00704C89 | 0_2_00704C89 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00684C93 | 0_2_00684C93 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00662C98 | 0_2_00662C98 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0055CD5E | 0_2_0055CD5E |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0055CD4C | 0_2_0055CD4C |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0063AD79 | 0_2_0063AD79 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00598D44 | 0_2_00598D44 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0064AD48 | 0_2_0064AD48 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005E0D71 | 0_2_005E0D71 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0062AD4D | 0_2_0062AD4D |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005AED68 | 0_2_005AED68 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005C8D60 | 0_2_005C8D60 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00650D58 | 0_2_00650D58 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00642D5A | 0_2_00642D5A |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00600D5F | 0_2_00600D5F |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00640D2E | 0_2_00640D2E |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005C4D3E | 0_2_005C4D3E |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00570D20 | 0_2_00570D20 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00556D2E | 0_2_00556D2E |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00664DEC | 0_2_00664DEC |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005BCDD4 | 0_2_005BCDD4 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005BEDC9 | 0_2_005BEDC9 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0064EDFE | 0_2_0064EDFE |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0056CDF0 | 0_2_0056CDF0 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005AADE9 | 0_2_005AADE9 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0066CDDF | 0_2_0066CDDF |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00630DAB | 0_2_00630DAB |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00628DB1 | 0_2_00628DB1 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006F0E69 | 0_2_006F0E69 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00690E74 | 0_2_00690E74 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005CAE77 | 0_2_005CAE77 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0055EE63 | 0_2_0055EE63 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00552E6D | 0_2_00552E6D |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00550E6C | 0_2_00550E6C |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005F0E07 | 0_2_005F0E07 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005DCE35 | 0_2_005DCE35 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00644E08 | 0_2_00644E08 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0070AE1E | 0_2_0070AE1E |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00588E21 | 0_2_00588E21 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0067EE1D | 0_2_0067EE1D |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00636EEB | 0_2_00636EEB |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005ACED4 | 0_2_005ACED4 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00648EC4 | 0_2_00648EC4 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005D8EEF | 0_2_005D8EEF |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005B8EE2 | 0_2_005B8EE2 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0065AEAC | 0_2_0065AEAC |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00660EAA | 0_2_00660EAA |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00532EB0 | 0_2_00532EB0 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0054AEB0 | 0_2_0054AEB0 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00678E83 | 0_2_00678E83 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0068EE83 | 0_2_0068EE83 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00568EA0 | 0_2_00568EA0 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00546F52 | 0_2_00546F52 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0066CF72 | 0_2_0066CF72 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005E6F48 | 0_2_005E6F48 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0061CF41 | 0_2_0061CF41 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005EAF7C | 0_2_005EAF7C |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005CCF1C | 0_2_005CCF1C |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005FEF1C | 0_2_005FEF1C |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005EEF18 | 0_2_005EEF18 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00606F2A | 0_2_00606F2A |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005B2F0E | 0_2_005B2F0E |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005FCF01 | 0_2_005FCF01 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0059AF3B | 0_2_0059AF3B |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00594FD1 | 0_2_00594FD1 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005C6FCB | 0_2_005C6FCB |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0066AFFC | 0_2_0066AFFC |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00590FF2 | 0_2_00590FF2 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005D6F99 | 0_2_005D6F99 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005A2F9F | 0_2_005A2F9F |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005C2F97 | 0_2_005C2F97 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00642FBF | 0_2_00642FBF |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005B0F87 | 0_2_005B0F87 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005A4F84 | 0_2_005A4F84 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00680F89 | 0_2_00680F89 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0060CF83 | 0_2_0060CF83 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005F2FA8 | 0_2_005F2FA8 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005D2FA5 | 0_2_005D2FA5 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0064CF9C | 0_2_0064CF9C |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00652F9C | 0_2_00652F9C |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005C1045 | 0_2_005C1045 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005AD041 | 0_2_005AD041 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00627044 | 0_2_00627044 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0065104F | 0_2_0065104F |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00695047 | 0_2_00695047 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00633051 | 0_2_00633051 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0067705C | 0_2_0067705C |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0062502C | 0_2_0062502C |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0054D003 | 0_2_0054D003 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0061B000 | 0_2_0061B000 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0053D021 | 0_2_0053D021 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0062F01A | 0_2_0062F01A |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00683013 | 0_2_00683013 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005E90DC | 0_2_005E90DC |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006690E0 | 0_2_006690E0 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006130F9 | 0_2_006130F9 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006850DB | 0_2_006850DB |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005C90E2 | 0_2_005C90E2 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006F90A7 | 0_2_006F90A7 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00593087 | 0_2_00593087 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005D10BE | 0_2_005D10BE |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005B70BE | 0_2_005B70BE |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005AF0BC | 0_2_005AF0BC |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005C50B7 | 0_2_005C50B7 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005CD0B3 | 0_2_005CD0B3 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005990AA | 0_2_005990AA |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00657096 | 0_2_00657096 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00675090 | 0_2_00675090 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0059115A | 0_2_0059115A |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0065D162 | 0_2_0065D162 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00683160 | 0_2_00683160 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0060F16F | 0_2_0060F16F |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00639170 | 0_2_00639170 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005F316E | 0_2_005F316E |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0059716E | 0_2_0059716E |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00631154 | 0_2_00631154 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0066312F | 0_2_0066312F |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0053B100 | 0_2_0053B100 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005D5138 | 0_2_005D5138 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005BD136 | 0_2_005BD136 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0059D12F | 0_2_0059D12F |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0067111C | 0_2_0067111C |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006171E5 | 0_2_006171E5 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006231FE | 0_2_006231FE |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006091FD | 0_2_006091FD |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006651F8 | 0_2_006651F8 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006351DC | 0_2_006351DC |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0056F18B | 0_2_0056F18B |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00629191 | 0_2_00629191 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0068D191 | 0_2_0068D191 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005591AE | 0_2_005591AE |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005BF248 | 0_2_005BF248 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005DD243 | 0_2_005DD243 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005CF243 | 0_2_005CF243 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00703252 | 0_2_00703252 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0060B245 | 0_2_0060B245 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00627226 | 0_2_00627226 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005F1213 | 0_2_005F1213 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00619233 | 0_2_00619233 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00657239 | 0_2_00657239 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005F522F | 0_2_005F522F |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00541227 | 0_2_00541227 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0070D2FE | 0_2_0070D2FE |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0059B2E0 | 0_2_0059B2E0 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0067B2A6 | 0_2_0067B2A6 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0062B2AA | 0_2_0062B2AA |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0062D2A8 | 0_2_0062D2A8 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00595296 | 0_2_00595296 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00569280 | 0_2_00569280 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0068F2B4 | 0_2_0068F2B4 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005D32BF | 0_2_005D32BF |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00637362 | 0_2_00637362 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0062F36D | 0_2_0062F36D |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00551340 | 0_2_00551340 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0055D34A | 0_2_0055D34A |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0055F377 | 0_2_0055F377 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0066B34F | 0_2_0066B34F |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0066135E | 0_2_0066135E |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0065535C | 0_2_0065535C |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00653358 | 0_2_00653358 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00539310 | 0_2_00539310 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005FF323 | 0_2_005FF323 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0062B3E3 | 0_2_0062B3E3 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005373D0 | 0_2_005373D0 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006073F2 | 0_2_006073F2 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0053F3C0 | 0_2_0053F3C0 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005BB3F8 | 0_2_005BB3F8 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_006773CC | 0_2_006773CC |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005EF3F1 | 0_2_005EF3F1 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005F5384 | 0_2_005F5384 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005C73B5 | 0_2_005C73B5 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00667394 | 0_2_00667394 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005FD3A5 | 0_2_005FD3A5 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005A5458 | 0_2_005A5458 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0061D463 | 0_2_0061D463 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00557440 | 0_2_00557440 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0054747D | 0_2_0054747D |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_005ED46D | 0_2_005ED46D |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0068945F | 0_2_0068945F |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_0060D435 | 0_2_0060D435 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | Code function: 0_2_00671406 | 0_2_00671406 |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 711537 second address: 71153B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 71153B second address: 71153F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 71153F second address: 711570 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FDA3CC0D500h 0x0000000b jmp 00007FDA3CC0D4FBh 0x00000010 pushad 0x00000011 push eax 0x00000012 pop eax 0x00000013 jmp 00007FDA3CC0D4FBh 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 71180B second address: 711813 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 711813 second address: 711821 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FDA3CC0D4F8h 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 711821 second address: 711836 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FDA3C859A61h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7153BE second address: 7153C8 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FDA3CC0D4F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7153C8 second address: 7153CD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7153CD second address: 715425 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FDA3CC0D4FBh 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp], eax 0x0000000f jmp 00007FDA3CC0D4FDh 0x00000014 push 00000000h 0x00000016 mov dword ptr [ebp+122D591Ch], eax 0x0000001c call 00007FDA3CC0D4F9h 0x00000021 jmp 00007FDA3CC0D505h 0x00000026 push eax 0x00000027 push eax 0x00000028 push edx 0x00000029 pushad 0x0000002a jmp 00007FDA3CC0D4FAh 0x0000002f push eax 0x00000030 push edx 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 715425 second address: 71542A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 71542A second address: 71544E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e pushad 0x0000000f push eax 0x00000010 jc 00007FDA3CC0D4F6h 0x00000016 pop eax 0x00000017 push eax 0x00000018 push eax 0x00000019 pop eax 0x0000001a pop eax 0x0000001b popad 0x0000001c mov eax, dword ptr [eax] 0x0000001e push eax 0x0000001f push edx 0x00000020 push edx 0x00000021 push ecx 0x00000022 pop ecx 0x00000023 pop edx 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 71544E second address: 7154BB instructions: 0x00000000 rdtsc 0x00000002 jp 00007FDA3C859A61h 0x00000008 jmp 00007FDA3C859A5Bh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f mov dword ptr [esp+04h], eax 0x00000013 pushad 0x00000014 pushad 0x00000015 push ecx 0x00000016 pop ecx 0x00000017 jmp 00007FDA3C859A5Bh 0x0000001c popad 0x0000001d pushad 0x0000001e push esi 0x0000001f pop esi 0x00000020 ja 00007FDA3C859A56h 0x00000026 popad 0x00000027 popad 0x00000028 pop eax 0x00000029 mov ecx, dword ptr [ebp+122D2C54h] 0x0000002f push 00000003h 0x00000031 jmp 00007FDA3C859A61h 0x00000036 push 00000000h 0x00000038 mov dword ptr [ebp+122D1E2Ch], ecx 0x0000003e push 00000003h 0x00000040 mov esi, dword ptr [ebp+122D3A56h] 0x00000046 push DBC03850h 0x0000004b push edi 0x0000004c pushad 0x0000004d je 00007FDA3C859A56h 0x00000053 push eax 0x00000054 push edx 0x00000055 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7154BB second address: 7154FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edi 0x00000006 xor dword ptr [esp], 1BC03850h 0x0000000d xor dword ptr [ebp+122D2C54h], edx 0x00000013 lea ebx, dword ptr [ebp+124602E2h] 0x00000019 push edi 0x0000001a jmp 00007FDA3CC0D504h 0x0000001f pop edx 0x00000020 push eax 0x00000021 pushad 0x00000022 push esi 0x00000023 ja 00007FDA3CC0D4F6h 0x00000029 pop esi 0x0000002a pushad 0x0000002b jl 00007FDA3CC0D4F6h 0x00000031 push eax 0x00000032 push edx 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 715526 second address: 71552A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 71552A second address: 71553F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3CC0D501h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 71553F second address: 715551 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push esi 0x00000004 pop esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jno 00007FDA3C859A56h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 715551 second address: 715578 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 nop 0x00000008 jp 00007FDA3CC0D4F6h 0x0000000e push 00000000h 0x00000010 mov dword ptr [ebp+122D2C82h], esi 0x00000016 call 00007FDA3CC0D4F9h 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e pushad 0x0000001f popad 0x00000020 push eax 0x00000021 pop eax 0x00000022 popad 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 715578 second address: 715596 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FDA3C859A5Bh 0x0000000e mov eax, dword ptr [esp+04h] 0x00000012 push eax 0x00000013 push edx 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 pop edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 715596 second address: 7155AD instructions: 0x00000000 rdtsc 0x00000002 jp 00007FDA3CC0D4F8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [eax] 0x0000000c pushad 0x0000000d jc 00007FDA3CC0D4FCh 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 715663 second address: 715679 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FDA3C859A58h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 push eax 0x00000011 push edx 0x00000012 push esi 0x00000013 push eax 0x00000014 pop eax 0x00000015 pop esi 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 715679 second address: 715687 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [eax] 0x0000000a pushad 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 715687 second address: 71568D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 71568D second address: 7156AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 pop eax 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b popad 0x0000000c mov dword ptr [esp+04h], eax 0x00000010 push edi 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FDA3CC0D4FFh 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 715745 second address: 715749 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 726BAA second address: 726BB0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 726BB0 second address: 726BB4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 726BB4 second address: 726BC3 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 726BC3 second address: 726BD1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3C859A5Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 73552A second address: 735532 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 735532 second address: 73554B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FDA3C859A65h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 701336 second address: 701399 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FDA3CC0D4F6h 0x0000000a pop esi 0x0000000b pushad 0x0000000c jno 00007FDA3CC0D4F6h 0x00000012 pushad 0x00000013 popad 0x00000014 popad 0x00000015 jno 00007FDA3CC0D512h 0x0000001b popad 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007FDA3CC0D504h 0x00000023 jmp 00007FDA3CC0D505h 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 701399 second address: 7013A5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jg 00007FDA3C859A56h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7013A5 second address: 7013A9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7334A3 second address: 7334A9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7334A9 second address: 7334B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FDA3CC0D4F6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7334B3 second address: 7334FB instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push ebx 0x0000000a jmp 00007FDA3C859A61h 0x0000000f ja 00007FDA3C859A56h 0x00000015 pop ebx 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007FDA3C859A68h 0x0000001d jmp 00007FDA3C859A5Ch 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 733936 second address: 733962 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FDA3CC0D4F6h 0x0000000a jo 00007FDA3CC0D4F6h 0x00000010 jne 00007FDA3CC0D4F6h 0x00000016 popad 0x00000017 jmp 00007FDA3CC0D505h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 733962 second address: 73396A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 73396A second address: 733988 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jng 00007FDA3CC0D4F6h 0x0000000e jmp 00007FDA3CC0D500h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 733AC9 second address: 733ADB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FDA3C859A5Ah 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 733F9E second address: 733FD4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 jmp 00007FDA3CC0D503h 0x0000000a jmp 00007FDA3CC0D509h 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 734278 second address: 73427C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 73427C second address: 734285 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 73442D second address: 73444A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3C859A65h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 72BB91 second address: 72BBA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FDA3CC0D501h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 6F8BF7 second address: 6F8BFB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 6F8BFB second address: 6F8C01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 734FAC second address: 734FB6 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FDA3C859A56h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 73510C second address: 735126 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FDA3CC0D4F6h 0x0000000a jmp 00007FDA3CC0D4FFh 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 739203 second address: 739209 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 73931E second address: 739354 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 popad 0x00000006 push eax 0x00000007 jmp 00007FDA3CC0D506h 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FDA3CC0D503h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 739354 second address: 739376 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jnp 00007FDA3C859A56h 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [eax] 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FDA3C859A61h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 739376 second address: 7393A6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3CC0D4FDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jbe 00007FDA3CC0D505h 0x0000000f jmp 00007FDA3CC0D4FFh 0x00000014 popad 0x00000015 mov dword ptr [esp+04h], eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d popad 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 73A67C second address: 73A68E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FDA3C859A5Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 740B2F second address: 740B56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FDA3CC0D4F6h 0x0000000a jmp 00007FDA3CC0D507h 0x0000000f popad 0x00000010 pop edi 0x00000011 pushad 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 740B56 second address: 740B5C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 740B5C second address: 740B62 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 740B62 second address: 740B6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 push edi 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 707C92 second address: 707CB3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FDA3CC0D500h 0x00000009 jmp 00007FDA3CC0D4FCh 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 707CB3 second address: 707CCD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FDA3C859A5Dh 0x00000008 jbe 00007FDA3C859A56h 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 707CCD second address: 707CEF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007FDA3CC0D509h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 73FEFC second address: 73FF1C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3C859A68h 0x00000007 push eax 0x00000008 push edx 0x00000009 push edx 0x0000000a pop edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 74008C second address: 7400B3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jo 00007FDA3CC0D502h 0x0000000c jmp 00007FDA3CC0D4FCh 0x00000011 pushad 0x00000012 jp 00007FDA3CC0D4F6h 0x00000018 jnl 00007FDA3CC0D4F6h 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 740394 second address: 74039A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 74039A second address: 74039F instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 742542 second address: 742546 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 742620 second address: 742624 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 742624 second address: 742641 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 pop eax 0x00000008 sub dword ptr [ebp+122D1EB9h], eax 0x0000000e push 0D3551E9h 0x00000013 ja 00007FDA3C859A6Eh 0x00000019 push eax 0x0000001a push edx 0x0000001b push edi 0x0000001c pop edi 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 74296C second address: 74297E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 je 00007FDA3CC0D500h 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 742A64 second address: 742A68 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 742C35 second address: 742C4C instructions: 0x00000000 rdtsc 0x00000002 ja 00007FDA3CC0D4FCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 742C4C second address: 742C52 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 742C52 second address: 742C6B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FDA3CC0D505h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 742D26 second address: 742D2B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 742D2B second address: 742D31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 742D31 second address: 742D3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push edi 0x0000000b push esi 0x0000000c pop esi 0x0000000d pop edi 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 6F3B3A second address: 6F3B42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 746C78 second address: 746D07 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnp 00007FDA3C859A58h 0x0000000c pushad 0x0000000d popad 0x0000000e popad 0x0000000f nop 0x00000010 push 00000000h 0x00000012 push ecx 0x00000013 call 00007FDA3C859A58h 0x00000018 pop ecx 0x00000019 mov dword ptr [esp+04h], ecx 0x0000001d add dword ptr [esp+04h], 00000017h 0x00000025 inc ecx 0x00000026 push ecx 0x00000027 ret 0x00000028 pop ecx 0x00000029 ret 0x0000002a mov esi, eax 0x0000002c call 00007FDA3C859A5Fh 0x00000031 mov dword ptr [ebp+122D1E66h], esi 0x00000037 pop esi 0x00000038 push 00000000h 0x0000003a jl 00007FDA3C859A5Bh 0x00000040 or si, B7CBh 0x00000045 push 00000000h 0x00000047 push 00000000h 0x00000049 push eax 0x0000004a call 00007FDA3C859A58h 0x0000004f pop eax 0x00000050 mov dword ptr [esp+04h], eax 0x00000054 add dword ptr [esp+04h], 00000018h 0x0000005c inc eax 0x0000005d push eax 0x0000005e ret 0x0000005f pop eax 0x00000060 ret 0x00000061 push eax 0x00000062 push eax 0x00000063 push edx 0x00000064 jmp 00007FDA3C859A66h 0x00000069 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 746379 second address: 746383 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FDA3CC0D4F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 746383 second address: 74638D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007FDA3C859A56h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 74638D second address: 746391 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 747530 second address: 74753B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FDA3C859A56h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 74A277 second address: 74A281 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 74E2CB second address: 74E2D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jl 00007FDA3C859A5Ch 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 74F382 second address: 74F386 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 74F386 second address: 74F38C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7503BF second address: 7503D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 popad 0x00000008 push eax 0x00000009 pushad 0x0000000a pushad 0x0000000b jmp 00007FDA3CC0D4FCh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 74E601 second address: 74E607 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7503D8 second address: 750466 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 push edi 0x00000007 pop edi 0x00000008 pop esi 0x00000009 popad 0x0000000a nop 0x0000000b adc bx, 6F23h 0x00000010 push 00000000h 0x00000012 push 00000000h 0x00000014 push ebx 0x00000015 call 00007FDA3CC0D4F8h 0x0000001a pop ebx 0x0000001b mov dword ptr [esp+04h], ebx 0x0000001f add dword ptr [esp+04h], 00000016h 0x00000027 inc ebx 0x00000028 push ebx 0x00000029 ret 0x0000002a pop ebx 0x0000002b ret 0x0000002c mov di, B761h 0x00000030 push 00000000h 0x00000032 push 00000000h 0x00000034 push ecx 0x00000035 call 00007FDA3CC0D4F8h 0x0000003a pop ecx 0x0000003b mov dword ptr [esp+04h], ecx 0x0000003f add dword ptr [esp+04h], 00000019h 0x00000047 inc ecx 0x00000048 push ecx 0x00000049 ret 0x0000004a pop ecx 0x0000004b ret 0x0000004c mov edi, dword ptr [ebp+122D2223h] 0x00000052 xchg eax, esi 0x00000053 ja 00007FDA3CC0D500h 0x00000059 push eax 0x0000005a push eax 0x0000005b push edx 0x0000005c pushad 0x0000005d push ecx 0x0000005e pop ecx 0x0000005f jmp 00007FDA3CC0D509h 0x00000064 popad 0x00000065 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7506DB second address: 7506E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 751659 second address: 75165D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7527D8 second address: 7527F3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push esi 0x00000006 pop esi 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c jnc 00007FDA3C859A5Ch 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 75165D second address: 75166C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3CC0D4FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 75358B second address: 753595 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FDA3C859A56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 753595 second address: 75359F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007FDA3CC0D4F6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 75359F second address: 7535B4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3C859A5Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push ecx 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 755703 second address: 75570D instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 75570D second address: 75577F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3C859A64h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b jc 00007FDA3C859A5Eh 0x00000011 jnp 00007FDA3C859A58h 0x00000017 push edi 0x00000018 pop edi 0x00000019 nop 0x0000001a mov edi, 51F02A73h 0x0000001f push 00000000h 0x00000021 push 00000000h 0x00000023 push edi 0x00000024 call 00007FDA3C859A58h 0x00000029 pop edi 0x0000002a mov dword ptr [esp+04h], edi 0x0000002e add dword ptr [esp+04h], 00000015h 0x00000036 inc edi 0x00000037 push edi 0x00000038 ret 0x00000039 pop edi 0x0000003a ret 0x0000003b push 00000000h 0x0000003d mov ebx, dword ptr [ebp+122D22CDh] 0x00000043 xchg eax, esi 0x00000044 push eax 0x00000045 push edx 0x00000046 push ebx 0x00000047 jmp 00007FDA3C859A68h 0x0000004c pop ebx 0x0000004d rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7575D9 second address: 7575E3 instructions: 0x00000000 rdtsc 0x00000002 je 00007FDA3CC0D4FCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7595CD second address: 75965B instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jmp 00007FDA3C859A68h 0x0000000c nop 0x0000000d push 00000000h 0x0000000f push edx 0x00000010 call 00007FDA3C859A58h 0x00000015 pop edx 0x00000016 mov dword ptr [esp+04h], edx 0x0000001a add dword ptr [esp+04h], 00000014h 0x00000022 inc edx 0x00000023 push edx 0x00000024 ret 0x00000025 pop edx 0x00000026 ret 0x00000027 sub dword ptr [ebp+1245D973h], esi 0x0000002d push 00000000h 0x0000002f push 00000000h 0x00000031 push edx 0x00000032 call 00007FDA3C859A58h 0x00000037 pop edx 0x00000038 mov dword ptr [esp+04h], edx 0x0000003c add dword ptr [esp+04h], 00000019h 0x00000044 inc edx 0x00000045 push edx 0x00000046 ret 0x00000047 pop edx 0x00000048 ret 0x00000049 push 00000000h 0x0000004b jnl 00007FDA3C859A60h 0x00000051 mov di, 92BFh 0x00000055 xchg eax, esi 0x00000056 push eax 0x00000057 push edx 0x00000058 pushad 0x00000059 jmp 00007FDA3C859A5Dh 0x0000005e push eax 0x0000005f push edx 0x00000060 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 75965B second address: 759660 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 759660 second address: 759685 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FDA3C859A5Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c pushad 0x0000000d jmp 00007FDA3C859A60h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 759685 second address: 75969D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FDA3CC0D501h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 75A837 second address: 75A83B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 75A83B second address: 75A85A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3CC0D503h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b ja 00007FDA3CC0D4F6h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7587C6 second address: 758836 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b push 00000000h 0x0000000d push ecx 0x0000000e call 00007FDA3C859A58h 0x00000013 pop ecx 0x00000014 mov dword ptr [esp+04h], ecx 0x00000018 add dword ptr [esp+04h], 00000015h 0x00000020 inc ecx 0x00000021 push ecx 0x00000022 ret 0x00000023 pop ecx 0x00000024 ret 0x00000025 push dword ptr fs:[00000000h] 0x0000002c call 00007FDA3C859A61h 0x00000031 mov bl, dl 0x00000033 pop ebx 0x00000034 mov dword ptr fs:[00000000h], esp 0x0000003b xor bl, 00000030h 0x0000003e mov eax, dword ptr [ebp+122D046Dh] 0x00000044 sub bl, 00000001h 0x00000047 push FFFFFFFFh 0x00000049 mov ebx, dword ptr [ebp+12465259h] 0x0000004f nop 0x00000050 jmp 00007FDA3C859A5Bh 0x00000055 push eax 0x00000056 push ecx 0x00000057 push eax 0x00000058 push edx 0x00000059 push eax 0x0000005a pop eax 0x0000005b rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7568AE second address: 7568B4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 75B884 second address: 75B8F9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3C859A68h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ecx 0x0000000a nop 0x0000000b push edx 0x0000000c mov dword ptr [ebp+124815AFh], esi 0x00000012 pop edi 0x00000013 push 00000000h 0x00000015 call 00007FDA3C859A67h 0x0000001a or ebx, dword ptr [ebp+122D1CCEh] 0x00000020 pop ebx 0x00000021 push 00000000h 0x00000023 push 00000000h 0x00000025 push esi 0x00000026 call 00007FDA3C859A58h 0x0000002b pop esi 0x0000002c mov dword ptr [esp+04h], esi 0x00000030 add dword ptr [esp+04h], 00000019h 0x00000038 inc esi 0x00000039 push esi 0x0000003a ret 0x0000003b pop esi 0x0000003c ret 0x0000003d mov ebx, 7874A334h 0x00000042 push eax 0x00000043 push eax 0x00000044 push edx 0x00000045 push eax 0x00000046 push edx 0x00000047 push eax 0x00000048 push edx 0x00000049 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 75B8F9 second address: 75B8FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 75B8FD second address: 75B917 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3C859A66h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 75983D second address: 759842 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 75B917 second address: 75B91D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 75AA64 second address: 75AA69 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 75AA69 second address: 75AA6F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 75C9B4 second address: 75C9B9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 6F5688 second address: 6F56C1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3C859A5Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jno 00007FDA3C859A62h 0x0000000f jmp 00007FDA3C859A63h 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 762D7D second address: 762D9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push edx 0x00000006 jo 00007FDA3CC0D4F6h 0x0000000c jmp 00007FDA3CC0D503h 0x00000011 pop edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 762D9D second address: 762DD5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3C859A5Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FDA3C859A5Dh 0x00000012 jmp 00007FDA3C859A67h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 762DD5 second address: 762DF4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3CC0D503h 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push esi 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e pushad 0x0000000f popad 0x00000010 pop esi 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 762DF4 second address: 762DFE instructions: 0x00000000 rdtsc 0x00000002 jp 00007FDA3C859A5Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 768486 second address: 76848C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 768730 second address: 76875D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3C859A64h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edi 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007FDA3C859A60h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 76E872 second address: 76E876 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 76E876 second address: 76E8A0 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FDA3C859A56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jnp 00007FDA3C859A68h 0x00000010 jmp 00007FDA3C859A62h 0x00000015 popad 0x00000016 push eax 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 76E8A0 second address: 76E8A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 76E8A4 second address: 76E8AE instructions: 0x00000000 rdtsc 0x00000002 jns 00007FDA3C859A56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 76E8AE second address: 76E8D0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FDA3CC0D4FDh 0x00000008 js 00007FDA3CC0D4F6h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 mov eax, dword ptr [esp+04h] 0x00000015 push eax 0x00000016 push edx 0x00000017 push ecx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 76E8D0 second address: 76E8D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 76E8D5 second address: 76E910 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3CC0D4FEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b push ecx 0x0000000c jmp 00007FDA3CC0D507h 0x00000011 pop ecx 0x00000012 mov dword ptr [esp+04h], eax 0x00000016 je 00007FDA3CC0D508h 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 76E910 second address: 76E914 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 76E9B0 second address: 76E9B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 76EA5A second address: 76EA5E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7723DD second address: 7723E3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7723E3 second address: 7723E8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7723E8 second address: 772412 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FDA3CC0D506h 0x00000009 js 00007FDA3CC0D4F6h 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 popad 0x00000012 pop edx 0x00000013 pop eax 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 772412 second address: 77245C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3C859A67h 0x00000007 jng 00007FDA3C859A56h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FDA3C859A65h 0x00000016 jmp 00007FDA3C859A62h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 77245C second address: 772460 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7733FC second address: 77340B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 jo 00007FDA3C859A6Ch 0x0000000c push ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 774BDE second address: 774BF8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FDA3CC0D504h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 774BF8 second address: 774C00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 6F71FF second address: 6F721D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FDA3CC0D50Ah 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 77C0AC second address: 77C0B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 77C0B4 second address: 77C0C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FDA3CC0D4F6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 77C0C5 second address: 77C0C9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 77C0C9 second address: 77C0D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 77C0D1 second address: 77C0DC instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jbe 00007FDA3C859A56h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 77C0DC second address: 77C0E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 77C0E5 second address: 77C0E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 77C3BA second address: 77C3C4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jbe 00007FDA3CC0D4F6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 77C3C4 second address: 77C3C8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 77C3C8 second address: 77C3FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 jp 00007FDA3CC0D4F6h 0x0000000d jmp 00007FDA3CC0D509h 0x00000012 pop ecx 0x00000013 pop edx 0x00000014 pop eax 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 jno 00007FDA3CC0D4F6h 0x0000001f push edi 0x00000020 pop edi 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 77C3FD second address: 77C424 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3C859A5Ah 0x00000007 jmp 00007FDA3C859A63h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 77C424 second address: 77C428 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 77C428 second address: 77C42C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 77C42C second address: 77C438 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FDA3CC0D4F6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 77C438 second address: 77C461 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FDA3C859A5Fh 0x00000009 jmp 00007FDA3C859A66h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 77C608 second address: 77C60C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 77C60C second address: 77C62D instructions: 0x00000000 rdtsc 0x00000002 js 00007FDA3C859A56h 0x00000008 jmp 00007FDA3C859A61h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f popad 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 77C62D second address: 77C642 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FDA3CC0D501h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 77C642 second address: 77C646 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 77CA5B second address: 77CA5F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 77CA5F second address: 77CA76 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jng 00007FDA3C859A56h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f jnp 00007FDA3C859A56h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 77CC0C second address: 77CC3E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3CC0D4FEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a pushad 0x0000000b jmp 00007FDA3CC0D504h 0x00000010 push eax 0x00000011 push edx 0x00000012 jnc 00007FDA3CC0D4F6h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 77CC3E second address: 77CC42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 72C6CA second address: 72C6DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jmp 00007FDA3CC0D4FBh 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 77D4AE second address: 77D4CB instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jmp 00007FDA3C859A68h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 781EC7 second address: 781ED7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a jno 00007FDA3CC0D4F6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 781ED7 second address: 781EDB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 781EDB second address: 781EF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FDA3CC0D4F6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e ja 00007FDA3CC0D4F6h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 781EF1 second address: 781EF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 74B49C second address: 74B4A5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 74B4A5 second address: 72BBA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 popad 0x00000006 mov dword ptr [esp], eax 0x00000009 push 00000000h 0x0000000b push esi 0x0000000c call 00007FDA3C859A58h 0x00000011 pop esi 0x00000012 mov dword ptr [esp+04h], esi 0x00000016 add dword ptr [esp+04h], 00000017h 0x0000001e inc esi 0x0000001f push esi 0x00000020 ret 0x00000021 pop esi 0x00000022 ret 0x00000023 mov ecx, dword ptr [ebp+122D3B6Eh] 0x00000029 call dword ptr [ebp+122D1FCAh] 0x0000002f jns 00007FDA3C859A70h 0x00000035 push eax 0x00000036 push edx 0x00000037 pushad 0x00000038 push edx 0x00000039 pop edx 0x0000003a jmp 00007FDA3C859A69h 0x0000003f popad 0x00000040 jp 00007FDA3C859A6Dh 0x00000046 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 74B8CB second address: 74B8EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 pushad 0x00000009 jmp 00007FDA3CC0D4FDh 0x0000000e jne 00007FDA3CC0D4F6h 0x00000014 popad 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 74BA8D second address: 74BAA8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov eax, dword ptr [esp+04h] 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FDA3C859A5Fh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 74BF12 second address: 74BF16 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 74BF16 second address: 74BF32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jng 00007FDA3C859A58h 0x0000000c pushad 0x0000000d popad 0x0000000e popad 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 pushad 0x00000014 popad 0x00000015 jp 00007FDA3C859A56h 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 74BF32 second address: 74BF7E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007FDA3CC0D4FEh 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c push 00000000h 0x0000000e push edi 0x0000000f call 00007FDA3CC0D4F8h 0x00000014 pop edi 0x00000015 mov dword ptr [esp+04h], edi 0x00000019 add dword ptr [esp+04h], 0000001Ah 0x00000021 inc edi 0x00000022 push edi 0x00000023 ret 0x00000024 pop edi 0x00000025 ret 0x00000026 mov edx, dword ptr [ebp+122D2052h] 0x0000002c mov edx, dword ptr [ebp+122D1CB1h] 0x00000032 push 00000004h 0x00000034 nop 0x00000035 push eax 0x00000036 push edx 0x00000037 push esi 0x00000038 push edi 0x00000039 pop edi 0x0000003a pop esi 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 74BF7E second address: 74BF84 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 74BF84 second address: 74BF88 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 74C33C second address: 74C340 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 74C340 second address: 74C352 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FDA3CC0D4F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jo 00007FDA3CC0D4FCh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 74C352 second address: 74C373 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 jmp 00007FDA3C859A65h 0x0000000e pushad 0x0000000f popad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 74C373 second address: 74C3A6 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FDA3CC0D4F8h 0x00000008 push edi 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d jng 00007FDA3CC0D507h 0x00000013 push 0000001Eh 0x00000015 nop 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 jl 00007FDA3CC0D4F6h 0x0000001f push ebx 0x00000020 pop ebx 0x00000021 popad 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 74C6A9 second address: 74C6AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 74C789 second address: 74C798 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edi 0x00000007 push eax 0x00000008 push edx 0x00000009 js 00007FDA3CC0D4F6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 74C798 second address: 74C7C7 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 nop 0x00000008 jbe 00007FDA3C859A5Bh 0x0000000e mov ecx, 7B18BCF1h 0x00000013 lea eax, dword ptr [ebp+124961E8h] 0x00000019 pushad 0x0000001a mov cx, di 0x0000001d mov cx, 341Ch 0x00000021 popad 0x00000022 push eax 0x00000023 push eax 0x00000024 push edx 0x00000025 jmp 00007FDA3C859A5Ah 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 781012 second address: 781018 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 781018 second address: 781045 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 pushad 0x00000008 jnl 00007FDA3C859A63h 0x0000000e jmp 00007FDA3C859A5Dh 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 jmp 00007FDA3C859A5Eh 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 781045 second address: 781049 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 781301 second address: 781305 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7817E1 second address: 7817FD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3CC0D506h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7817FD second address: 781803 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 784BDF second address: 784BF7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FDA3CC0D4FEh 0x00000009 jns 00007FDA3CC0D4F6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 78B0B2 second address: 78B0B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop eax 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 78B0B9 second address: 78B0C8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3CC0D4FAh 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 78B0C8 second address: 78B0E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FDA3C859A56h 0x0000000a js 00007FDA3C859A56h 0x00000010 popad 0x00000011 pop edx 0x00000012 pop eax 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 78B0E0 second address: 78B0E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 78B0E6 second address: 78B0EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 78B0EA second address: 78B10A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3CC0D508h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 78B10A second address: 78B10E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 789C4B second address: 789C55 instructions: 0x00000000 rdtsc 0x00000002 js 00007FDA3CC0D4F6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 789C55 second address: 789C5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 789C5B second address: 789CA4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 jmp 00007FDA3CC0D503h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d pushad 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 je 00007FDA3CC0D4F6h 0x00000016 jmp 00007FDA3CC0D503h 0x0000001b popad 0x0000001c pop edx 0x0000001d pop eax 0x0000001e push ebx 0x0000001f push ecx 0x00000020 push edx 0x00000021 pop edx 0x00000022 pushad 0x00000023 popad 0x00000024 pop ecx 0x00000025 jnc 00007FDA3CC0D4FCh 0x0000002b push eax 0x0000002c push edx 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 789E10 second address: 789E16 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 789E16 second address: 789E1C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 789973 second address: 78997B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pushad 0x00000006 popad 0x00000007 pop edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 78A70E second address: 78A712 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 78A8AD second address: 78A8B9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jo 00007FDA3C859A56h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 78A8B9 second address: 78A8BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 78A8BD second address: 78A8FC instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007FDA3C859A60h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jne 00007FDA3C859A73h 0x00000017 js 00007FDA3C859A56h 0x0000001d jmp 00007FDA3C859A67h 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 78AA71 second address: 78AA75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 78AD57 second address: 78ADB4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FDA3C859A65h 0x00000009 push eax 0x0000000a pop eax 0x0000000b popad 0x0000000c jng 00007FDA3C859A71h 0x00000012 pushad 0x00000013 jmp 00007FDA3C859A5Dh 0x00000018 jne 00007FDA3C859A56h 0x0000001e push edi 0x0000001f pop edi 0x00000020 popad 0x00000021 pushad 0x00000022 jo 00007FDA3C859A56h 0x00000028 push eax 0x00000029 push edx 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 78ADB4 second address: 78ADFB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FDA3CC0D4FFh 0x00000009 jmp 00007FDA3CC0D508h 0x0000000e popad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FDA3CC0D504h 0x00000019 pushad 0x0000001a popad 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 78ADFB second address: 78AE05 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 pushad 0x00000008 popad 0x00000009 pop edi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 78AE05 second address: 78AE21 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FDA3CC0D4F8h 0x00000008 pushad 0x00000009 push esi 0x0000000a pop esi 0x0000000b jmp 00007FDA3CC0D4FDh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 702E1E second address: 702E22 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 790AE3 second address: 790B03 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3CC0D502h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c pop eax 0x0000000d jp 00007FDA3CC0D4F6h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 790B03 second address: 790B1A instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 jmp 00007FDA3C859A5Eh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 790DA5 second address: 790DAC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 790DAC second address: 790DD1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3C859A68h 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a jbe 00007FDA3C859A56h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 79534E second address: 795352 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 799989 second address: 7999A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop eax 0x00000006 pushad 0x00000007 jp 00007FDA3C859A5Ch 0x0000000d push eax 0x0000000e push edx 0x0000000f push edx 0x00000010 pop edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7999A0 second address: 7999B9 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jmp 00007FDA3CC0D500h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 799B5B second address: 799B5F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 799B5F second address: 799B71 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FDA3CC0D4F6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 799B71 second address: 799B75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 799B75 second address: 799BAB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3CC0D505h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push esi 0x0000000e pushad 0x0000000f popad 0x00000010 jmp 00007FDA3CC0D505h 0x00000015 pop esi 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 799CF6 second address: 799D0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FDA3C859A62h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 799D0C second address: 799D10 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 799D10 second address: 799D3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FDA3C859A62h 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007FDA3C859A5Dh 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 pop eax 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 799E5D second address: 799E75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FDA3CC0D4FEh 0x0000000a pop ecx 0x0000000b pushad 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 799E75 second address: 799EAC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FDA3C859A5Ch 0x00000009 jmp 00007FDA3C859A5Eh 0x0000000e popad 0x0000000f pushad 0x00000010 jmp 00007FDA3C859A5Ch 0x00000015 push edi 0x00000016 pop edi 0x00000017 popad 0x00000018 js 00007FDA3C859A5Eh 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 799FF9 second address: 799FFD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 799FFD second address: 79A001 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 79A001 second address: 79A00D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push edx 0x0000000b pop edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 79A00D second address: 79A017 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FDA3C859A56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 79A017 second address: 79A02C instructions: 0x00000000 rdtsc 0x00000002 jne 00007FDA3CC0D4FCh 0x00000008 jns 00007FDA3CC0D4F6h 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 79A02C second address: 79A032 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 79A1AD second address: 79A1B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 79A1B1 second address: 79A1DA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3C859A5Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d jc 00007FDA3C859A56h 0x00000013 push ebx 0x00000014 pop ebx 0x00000015 push ebx 0x00000016 pop ebx 0x00000017 popad 0x00000018 pushad 0x00000019 jp 00007FDA3C859A56h 0x0000001f pushad 0x00000020 popad 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 79A1DA second address: 79A1DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 79A1DF second address: 79A1EF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007FDA3C859A56h 0x0000000a jo 00007FDA3C859A56h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 79A377 second address: 79A37D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 79A37D second address: 79A389 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FDA3C859A56h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 79A50A second address: 79A527 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3CC0D4FEh 0x00000007 ja 00007FDA3CC0D4F6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pop ebx 0x00000010 push eax 0x00000011 push edi 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 79D937 second address: 79D942 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 ja 00007FDA3C859A56h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 79DA8E second address: 79DA99 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 79DA99 second address: 79DA9F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 79DC0A second address: 79DC2D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jbe 00007FDA3CC0D4F6h 0x00000009 jng 00007FDA3CC0D4F6h 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 jmp 00007FDA3CC0D4FDh 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 79DC2D second address: 79DC33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 79DC33 second address: 79DC37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 79DC37 second address: 79DC49 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jg 00007FDA3C859A58h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 79DC49 second address: 79DC53 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 pop eax 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 79DC53 second address: 79DC59 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7A6A80 second address: 7A6A8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jng 00007FDA3CC0D4FAh 0x0000000b push edi 0x0000000c pop edi 0x0000000d push eax 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7A6A8F second address: 7A6ABF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FDA3C859A62h 0x00000008 jmp 00007FDA3C859A5Dh 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 pop edx 0x00000013 pop eax 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 popad 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7A6ABF second address: 7A6AC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7A4B5C second address: 7A4B6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jmp 00007FDA3C859A5Ah 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7A4CD8 second address: 7A4CF0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FDA3CC0D501h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7A4CF0 second address: 7A4D12 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007FDA3C859A56h 0x0000000a jmp 00007FDA3C859A68h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7A567A second address: 7A567F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7A567F second address: 7A56AE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jl 00007FDA3C859A56h 0x00000009 jmp 00007FDA3C859A5Ch 0x0000000e pop eax 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 jmp 00007FDA3C859A60h 0x00000017 push eax 0x00000018 push edx 0x00000019 push edx 0x0000001a pop edx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7A56AE second address: 7A56B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7A5ECF second address: 7A5ED3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7A6790 second address: 7A6796 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7A9F6A second address: 7A9F6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7AA1DC second address: 7AA200 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jne 00007FDA3CC0D4F8h 0x0000000e pop edi 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 jmp 00007FDA3CC0D4FFh 0x00000017 pop eax 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7AA200 second address: 7AA206 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7AA206 second address: 7AA20C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7AA535 second address: 7AA580 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3C859A5Bh 0x00000007 jmp 00007FDA3C859A62h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pop edx 0x0000000f pushad 0x00000010 jmp 00007FDA3C859A67h 0x00000015 pushad 0x00000016 jmp 00007FDA3C859A5Eh 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7B4937 second address: 7B4941 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FDA3CC0D4F6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7B4941 second address: 7B4965 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jmp 00007FDA3C859A62h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop ecx 0x0000000c push esi 0x0000000d push eax 0x0000000e push edx 0x0000000f jne 00007FDA3C859A56h 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7B4965 second address: 7B496F instructions: 0x00000000 rdtsc 0x00000002 jl 00007FDA3CC0D4F6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7B5022 second address: 7B5026 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7B5026 second address: 7B5045 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FDA3CC0D501h 0x0000000b push eax 0x0000000c push edx 0x0000000d je 00007FDA3CC0D4F6h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7B5045 second address: 7B5049 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7B517F second address: 7B5183 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7B5417 second address: 7B541F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7B556A second address: 7B5570 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7B5570 second address: 7B55A1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 jmp 00007FDA3C859A5Dh 0x0000000e pop ebx 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 jnl 00007FDA3C859A66h 0x00000019 jmp 00007FDA3C859A60h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7B55A1 second address: 7B55AD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 js 00007FDA3CC0D4F6h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7B5E86 second address: 7B5E8A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7B5E8A second address: 7B5EA4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FDA3CC0D500h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push edx 0x0000000c push edi 0x0000000d pop edi 0x0000000e pop edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7B5EA4 second address: 7B5EA9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7C074C second address: 7C075A instructions: 0x00000000 rdtsc 0x00000002 jne 00007FDA3CC0D4F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7C075A second address: 7C0760 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7C0760 second address: 7C0764 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7C2BB7 second address: 7C2BC4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7D0E0F second address: 7D0E13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 6FA66D second address: 6FA671 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 6FA671 second address: 6FA69D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3CC0D4FEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FDA3CC0D506h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 6FA69D second address: 6FA6A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 6FA6A1 second address: 6FA6B4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3CC0D4FFh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7D2DD0 second address: 7D2DDA instructions: 0x00000000 rdtsc 0x00000002 jns 00007FDA3C859A56h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7D2DDA second address: 7D2E01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FDA3CC0D503h 0x0000000d pushad 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 je 00007FDA3CC0D4F6h 0x00000016 push ebx 0x00000017 pop ebx 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7D2E01 second address: 7D2E19 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FDA3C859A64h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7D2E19 second address: 7D2E1D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7DACED second address: 7DAD2A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 push eax 0x00000007 jne 00007FDA3C859A56h 0x0000000d jmp 00007FDA3C859A69h 0x00000012 pop eax 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FDA3C859A62h 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7E24E6 second address: 7E250D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FDA3CC0D4FEh 0x0000000a jmp 00007FDA3CC0D502h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7EA2A0 second address: 7EA2A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7E8B23 second address: 7E8B3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FDA3CC0D502h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7E8B3E second address: 7E8B65 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3C859A66h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jns 00007FDA3C859A5Ah 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7E8D0A second address: 7E8D10 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7E8D10 second address: 7E8D14 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7E8D14 second address: 7E8D1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7E8D1D second address: 7E8D25 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7E8E7E second address: 7E8EA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 jg 00007FDA3CC0D4F6h 0x0000000d jmp 00007FDA3CC0D505h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7E8FDA second address: 7E8FDE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7E8FDE second address: 7E8FF9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3CC0D507h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7E8FF9 second address: 7E9000 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7E9140 second address: 7E9144 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7E9144 second address: 7E9158 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 ja 00007FDA3C859A56h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e ja 00007FDA3C859A56h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7E9158 second address: 7E9164 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jnl 00007FDA3CC0D4F6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7E93EF second address: 7E93F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7E93F5 second address: 7E93F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7E93F9 second address: 7E941B instructions: 0x00000000 rdtsc 0x00000002 jng 00007FDA3C859A56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FDA3C859A61h 0x0000000f pop edx 0x00000010 pop eax 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 push ecx 0x00000015 pop ecx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7E9598 second address: 7E95BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FDA3CC0D513h 0x0000000a jmp 00007FDA3CC0D507h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7E95BB second address: 7E95BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7E95BF second address: 7E95C4 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7EB9BB second address: 7EB9BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7EB9BF second address: 7EB9C3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7EF053 second address: 7EF057 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7EF057 second address: 7EF06B instructions: 0x00000000 rdtsc 0x00000002 jl 00007FDA3CC0D4F6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jg 00007FDA3CC0D4FEh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7EF06B second address: 7EF071 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7FB9BD second address: 7FB9C1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7FB9C1 second address: 7FB9F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FDA3C859A66h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FDA3C859A61h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7FB83A second address: 7FB83E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7FB83E second address: 7FB84A instructions: 0x00000000 rdtsc 0x00000002 jc 00007FDA3C859A56h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7FEB2A second address: 7FEB36 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FDA3CC0D4FEh 0x00000008 push edi 0x00000009 pop edi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 7FEB36 second address: 7FEB5A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FDA3C859A68h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push ebx 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 800491 second address: 8004AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FDA3CC0D4FBh 0x00000009 popad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 jg 00007FDA3CC0D4F6h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 8004AE second address: 8004B6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 80E0FE second address: 80E12B instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jnl 00007FDA3CC0D4F6h 0x00000009 push esi 0x0000000a pop esi 0x0000000b pop edx 0x0000000c push edi 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 pop edi 0x00000012 pop edx 0x00000013 pop eax 0x00000014 pushad 0x00000015 pushad 0x00000016 jnl 00007FDA3CC0D4F6h 0x0000001c push edi 0x0000001d pop edi 0x0000001e jns 00007FDA3CC0D4F6h 0x00000024 popad 0x00000025 push eax 0x00000026 push edx 0x00000027 js 00007FDA3CC0D4F6h 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 80E12B second address: 80E12F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 80E287 second address: 80E28B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 80E28B second address: 80E28F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 822522 second address: 82253B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FDA3CC0D505h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 822C79 second address: 822C8E instructions: 0x00000000 rdtsc 0x00000002 jno 00007FDA3C859A56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jnl 00007FDA3C859A56h 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 822E17 second address: 822E21 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 push esi 0x00000008 pop esi 0x00000009 pop ebx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 822E21 second address: 822E3E instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FDA3C859A5Ah 0x00000008 push edi 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b push edi 0x0000000c pop edi 0x0000000d pop edi 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 jo 00007FDA3C859A62h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 822E3E second address: 822E44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 822FD2 second address: 822FED instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FDA3C859A61h 0x0000000d push eax 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 8249A7 second address: 8249D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jnc 00007FDA3CC0D518h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 8275F0 second address: 827603 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDA3C859A5Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 827603 second address: 827613 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push edx 0x00000004 pop edx 0x00000005 pushad 0x00000006 popad 0x00000007 pop ecx 0x00000008 jo 00007FDA3CC0D4FCh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 829F8E second address: 829F92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 82A19F second address: 82A1A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 82A1A3 second address: 82A1D1 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jp 00007FDA3C859A67h 0x0000000c popad 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FDA3C859A5Dh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 82A1D1 second address: 82A290 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007FDA3CC0D507h 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c mov dword ptr [ebp+122D3575h], ecx 0x00000012 push 00000004h 0x00000014 push 00000000h 0x00000016 push edx 0x00000017 call 00007FDA3CC0D4F8h 0x0000001c pop edx 0x0000001d mov dword ptr [esp+04h], edx 0x00000021 add dword ptr [esp+04h], 00000016h 0x00000029 inc edx 0x0000002a push edx 0x0000002b ret 0x0000002c pop edx 0x0000002d ret 0x0000002e movsx edx, si 0x00000031 call 00007FDA3CC0D4F9h 0x00000036 pushad 0x00000037 pushad 0x00000038 push esi 0x00000039 pop esi 0x0000003a push eax 0x0000003b pop eax 0x0000003c popad 0x0000003d jmp 00007FDA3CC0D507h 0x00000042 popad 0x00000043 push eax 0x00000044 jp 00007FDA3CC0D502h 0x0000004a mov eax, dword ptr [esp+04h] 0x0000004e jmp 00007FDA3CC0D4FBh 0x00000053 mov eax, dword ptr [eax] 0x00000055 pushad 0x00000056 push esi 0x00000057 pushad 0x00000058 popad 0x00000059 pop esi 0x0000005a jno 00007FDA3CC0D509h 0x00000060 popad 0x00000061 mov dword ptr [esp+04h], eax 0x00000065 jo 00007FDA3CC0D511h 0x0000006b pushad 0x0000006c push eax 0x0000006d push edx 0x0000006e rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 82D889 second address: 82D892 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\wJtkC63Spw.exe | RDTSC instruction interceptor: First address: 746865 second address: 74686C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 rdtsc |