Source: 4.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.40804c.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Gh0st_ee6de6bc reference_sample = ea1dc816dfc87c2340a8b8a77a4f97618bccf19ad3b006dce4994be02e13245d, os = windows, severity = x86, description = Identifies a variant of Gh0st Rat, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gh0st, fingerprint = 3c529043f34ad8a8692b051ad7c03206ce1aafc3a0eb8fcf7f5bcfdcb8c1b455, id = ee6de6bc-1648-4a77-9607-e2a211c7bda4, last_modified = 2021-08-23 |
Source: 4.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.40804c.1.raw.unpack, type: UNPACKEDPE | Matched rule: Backdoor_Nitol_Jun17 date = 2017-06-04, hash1 = cba19d228abf31ec8afab7330df3c9da60cd4dae376552b503aea6d7feff9946, author = Florian Roth, description = Detects malware backdoor Nitol - file wyawou.exe - Attention: this rule also matches on Upatre Downloader, reference = https://goo.gl/OOB3mH, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 4.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.40804c.1.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721 |
Source: 4.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.40804c.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_Nitol author = ditekSHen, description = Detects Nitol backdoor |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.10000000.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Gh0st_ee6de6bc reference_sample = ea1dc816dfc87c2340a8b8a77a4f97618bccf19ad3b006dce4994be02e13245d, os = windows, severity = x86, description = Identifies a variant of Gh0st Rat, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gh0st, fingerprint = 3c529043f34ad8a8692b051ad7c03206ce1aafc3a0eb8fcf7f5bcfdcb8c1b455, id = ee6de6bc-1648-4a77-9607-e2a211c7bda4, last_modified = 2021-08-23 |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.10000000.2.unpack, type: UNPACKEDPE | Matched rule: Backdoor_Nitol_Jun17 date = 2017-06-04, hash1 = cba19d228abf31ec8afab7330df3c9da60cd4dae376552b503aea6d7feff9946, author = Florian Roth, description = Detects malware backdoor Nitol - file wyawou.exe - Attention: this rule also matches on Upatre Downloader, reference = https://goo.gl/OOB3mH, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.10000000.2.unpack, type: UNPACKEDPE | Matched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721 |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.10000000.2.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_Nitol author = ditekSHen, description = Detects Nitol backdoor |
Source: 5.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.40804c.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Gh0st_ee6de6bc reference_sample = ea1dc816dfc87c2340a8b8a77a4f97618bccf19ad3b006dce4994be02e13245d, os = windows, severity = x86, description = Identifies a variant of Gh0st Rat, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gh0st, fingerprint = 3c529043f34ad8a8692b051ad7c03206ce1aafc3a0eb8fcf7f5bcfdcb8c1b455, id = ee6de6bc-1648-4a77-9607-e2a211c7bda4, last_modified = 2021-08-23 |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.40804c.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Gh0st_ee6de6bc reference_sample = ea1dc816dfc87c2340a8b8a77a4f97618bccf19ad3b006dce4994be02e13245d, os = windows, severity = x86, description = Identifies a variant of Gh0st Rat, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gh0st, fingerprint = 3c529043f34ad8a8692b051ad7c03206ce1aafc3a0eb8fcf7f5bcfdcb8c1b455, id = ee6de6bc-1648-4a77-9607-e2a211c7bda4, last_modified = 2021-08-23 |
Source: 5.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.40804c.1.raw.unpack, type: UNPACKEDPE | Matched rule: Backdoor_Nitol_Jun17 date = 2017-06-04, hash1 = cba19d228abf31ec8afab7330df3c9da60cd4dae376552b503aea6d7feff9946, author = Florian Roth, description = Detects malware backdoor Nitol - file wyawou.exe - Attention: this rule also matches on Upatre Downloader, reference = https://goo.gl/OOB3mH, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 5.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.40804c.1.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721 |
Source: 5.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.40804c.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_Nitol author = ditekSHen, description = Detects Nitol backdoor |
Source: 4.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.10000000.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Gh0st_ee6de6bc reference_sample = ea1dc816dfc87c2340a8b8a77a4f97618bccf19ad3b006dce4994be02e13245d, os = windows, severity = x86, description = Identifies a variant of Gh0st Rat, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gh0st, fingerprint = 3c529043f34ad8a8692b051ad7c03206ce1aafc3a0eb8fcf7f5bcfdcb8c1b455, id = ee6de6bc-1648-4a77-9607-e2a211c7bda4, last_modified = 2021-08-23 |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.40804c.1.raw.unpack, type: UNPACKEDPE | Matched rule: Backdoor_Nitol_Jun17 date = 2017-06-04, hash1 = cba19d228abf31ec8afab7330df3c9da60cd4dae376552b503aea6d7feff9946, author = Florian Roth, description = Detects malware backdoor Nitol - file wyawou.exe - Attention: this rule also matches on Upatre Downloader, reference = https://goo.gl/OOB3mH, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 4.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.10000000.2.unpack, type: UNPACKEDPE | Matched rule: Backdoor_Nitol_Jun17 date = 2017-06-04, hash1 = cba19d228abf31ec8afab7330df3c9da60cd4dae376552b503aea6d7feff9946, author = Florian Roth, description = Detects malware backdoor Nitol - file wyawou.exe - Attention: this rule also matches on Upatre Downloader, reference = https://goo.gl/OOB3mH, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.40804c.1.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721 |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.40804c.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_Nitol author = ditekSHen, description = Detects Nitol backdoor |
Source: 4.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.10000000.2.unpack, type: UNPACKEDPE | Matched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721 |
Source: 4.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.10000000.2.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_Nitol author = ditekSHen, description = Detects Nitol backdoor |
Source: 4.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.40804c.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Gh0st_ee6de6bc reference_sample = ea1dc816dfc87c2340a8b8a77a4f97618bccf19ad3b006dce4994be02e13245d, os = windows, severity = x86, description = Identifies a variant of Gh0st Rat, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gh0st, fingerprint = 3c529043f34ad8a8692b051ad7c03206ce1aafc3a0eb8fcf7f5bcfdcb8c1b455, id = ee6de6bc-1648-4a77-9607-e2a211c7bda4, last_modified = 2021-08-23 |
Source: 4.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.40804c.1.unpack, type: UNPACKEDPE | Matched rule: Backdoor_Nitol_Jun17 date = 2017-06-04, hash1 = cba19d228abf31ec8afab7330df3c9da60cd4dae376552b503aea6d7feff9946, author = Florian Roth, description = Detects malware backdoor Nitol - file wyawou.exe - Attention: this rule also matches on Upatre Downloader, reference = https://goo.gl/OOB3mH, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 4.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.40804c.1.unpack, type: UNPACKEDPE | Matched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721 |
Source: 4.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.40804c.1.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_Nitol author = ditekSHen, description = Detects Nitol backdoor |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.40804c.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Gh0st_ee6de6bc reference_sample = ea1dc816dfc87c2340a8b8a77a4f97618bccf19ad3b006dce4994be02e13245d, os = windows, severity = x86, description = Identifies a variant of Gh0st Rat, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gh0st, fingerprint = 3c529043f34ad8a8692b051ad7c03206ce1aafc3a0eb8fcf7f5bcfdcb8c1b455, id = ee6de6bc-1648-4a77-9607-e2a211c7bda4, last_modified = 2021-08-23 |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.40804c.1.unpack, type: UNPACKEDPE | Matched rule: Backdoor_Nitol_Jun17 date = 2017-06-04, hash1 = cba19d228abf31ec8afab7330df3c9da60cd4dae376552b503aea6d7feff9946, author = Florian Roth, description = Detects malware backdoor Nitol - file wyawou.exe - Attention: this rule also matches on Upatre Downloader, reference = https://goo.gl/OOB3mH, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.40804c.1.unpack, type: UNPACKEDPE | Matched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721 |
Source: 0.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.40804c.1.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_Nitol author = ditekSHen, description = Detects Nitol backdoor |
Source: 5.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.40804c.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Gh0st_ee6de6bc reference_sample = ea1dc816dfc87c2340a8b8a77a4f97618bccf19ad3b006dce4994be02e13245d, os = windows, severity = x86, description = Identifies a variant of Gh0st Rat, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gh0st, fingerprint = 3c529043f34ad8a8692b051ad7c03206ce1aafc3a0eb8fcf7f5bcfdcb8c1b455, id = ee6de6bc-1648-4a77-9607-e2a211c7bda4, last_modified = 2021-08-23 |
Source: 5.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.40804c.1.unpack, type: UNPACKEDPE | Matched rule: Backdoor_Nitol_Jun17 date = 2017-06-04, hash1 = cba19d228abf31ec8afab7330df3c9da60cd4dae376552b503aea6d7feff9946, author = Florian Roth, description = Detects malware backdoor Nitol - file wyawou.exe - Attention: this rule also matches on Upatre Downloader, reference = https://goo.gl/OOB3mH, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 5.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.40804c.1.unpack, type: UNPACKEDPE | Matched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721 |
Source: 5.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.40804c.1.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_Nitol author = ditekSHen, description = Detects Nitol backdoor |
Source: 5.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.10000000.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Gh0st_ee6de6bc reference_sample = ea1dc816dfc87c2340a8b8a77a4f97618bccf19ad3b006dce4994be02e13245d, os = windows, severity = x86, description = Identifies a variant of Gh0st Rat, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gh0st, fingerprint = 3c529043f34ad8a8692b051ad7c03206ce1aafc3a0eb8fcf7f5bcfdcb8c1b455, id = ee6de6bc-1648-4a77-9607-e2a211c7bda4, last_modified = 2021-08-23 |
Source: 5.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.10000000.2.unpack, type: UNPACKEDPE | Matched rule: Backdoor_Nitol_Jun17 date = 2017-06-04, hash1 = cba19d228abf31ec8afab7330df3c9da60cd4dae376552b503aea6d7feff9946, author = Florian Roth, description = Detects malware backdoor Nitol - file wyawou.exe - Attention: this rule also matches on Upatre Downloader, reference = https://goo.gl/OOB3mH, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 5.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.10000000.2.unpack, type: UNPACKEDPE | Matched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721 |
Source: 5.2.SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe.10000000.2.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_Nitol author = ditekSHen, description = Detects Nitol backdoor |
Source: 00000005.00000002.2947721338.0000000010012000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Gh0st_ee6de6bc reference_sample = ea1dc816dfc87c2340a8b8a77a4f97618bccf19ad3b006dce4994be02e13245d, os = windows, severity = x86, description = Identifies a variant of Gh0st Rat, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gh0st, fingerprint = 3c529043f34ad8a8692b051ad7c03206ce1aafc3a0eb8fcf7f5bcfdcb8c1b455, id = ee6de6bc-1648-4a77-9607-e2a211c7bda4, last_modified = 2021-08-23 |
Source: 00000000.00000002.4520202775.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Gh0st_ee6de6bc reference_sample = ea1dc816dfc87c2340a8b8a77a4f97618bccf19ad3b006dce4994be02e13245d, os = windows, severity = x86, description = Identifies a variant of Gh0st Rat, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gh0st, fingerprint = 3c529043f34ad8a8692b051ad7c03206ce1aafc3a0eb8fcf7f5bcfdcb8c1b455, id = ee6de6bc-1648-4a77-9607-e2a211c7bda4, last_modified = 2021-08-23 |
Source: 00000000.00000002.4522100835.0000000010012000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Gh0st_ee6de6bc reference_sample = ea1dc816dfc87c2340a8b8a77a4f97618bccf19ad3b006dce4994be02e13245d, os = windows, severity = x86, description = Identifies a variant of Gh0st Rat, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gh0st, fingerprint = 3c529043f34ad8a8692b051ad7c03206ce1aafc3a0eb8fcf7f5bcfdcb8c1b455, id = ee6de6bc-1648-4a77-9607-e2a211c7bda4, last_modified = 2021-08-23 |
Source: 00000004.00000002.2913482598.0000000010012000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Gh0st_ee6de6bc reference_sample = ea1dc816dfc87c2340a8b8a77a4f97618bccf19ad3b006dce4994be02e13245d, os = windows, severity = x86, description = Identifies a variant of Gh0st Rat, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gh0st, fingerprint = 3c529043f34ad8a8692b051ad7c03206ce1aafc3a0eb8fcf7f5bcfdcb8c1b455, id = ee6de6bc-1648-4a77-9607-e2a211c7bda4, last_modified = 2021-08-23 |
Source: 00000005.00000002.2945751366.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Gh0st_ee6de6bc reference_sample = ea1dc816dfc87c2340a8b8a77a4f97618bccf19ad3b006dce4994be02e13245d, os = windows, severity = x86, description = Identifies a variant of Gh0st Rat, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gh0st, fingerprint = 3c529043f34ad8a8692b051ad7c03206ce1aafc3a0eb8fcf7f5bcfdcb8c1b455, id = ee6de6bc-1648-4a77-9607-e2a211c7bda4, last_modified = 2021-08-23 |
Source: 00000004.00000002.2903752097.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Gh0st_ee6de6bc reference_sample = ea1dc816dfc87c2340a8b8a77a4f97618bccf19ad3b006dce4994be02e13245d, os = windows, severity = x86, description = Identifies a variant of Gh0st Rat, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gh0st, fingerprint = 3c529043f34ad8a8692b051ad7c03206ce1aafc3a0eb8fcf7f5bcfdcb8c1b455, id = ee6de6bc-1648-4a77-9607-e2a211c7bda4, last_modified = 2021-08-23 |
Source: Process Memory Space: SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe PID: 1476, type: MEMORYSTR | Matched rule: Windows_Trojan_Gh0st_ee6de6bc reference_sample = ea1dc816dfc87c2340a8b8a77a4f97618bccf19ad3b006dce4994be02e13245d, os = windows, severity = x86, description = Identifies a variant of Gh0st Rat, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gh0st, fingerprint = 3c529043f34ad8a8692b051ad7c03206ce1aafc3a0eb8fcf7f5bcfdcb8c1b455, id = ee6de6bc-1648-4a77-9607-e2a211c7bda4, last_modified = 2021-08-23 |
Source: Process Memory Space: SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe PID: 4068, type: MEMORYSTR | Matched rule: Windows_Trojan_Gh0st_ee6de6bc reference_sample = ea1dc816dfc87c2340a8b8a77a4f97618bccf19ad3b006dce4994be02e13245d, os = windows, severity = x86, description = Identifies a variant of Gh0st Rat, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gh0st, fingerprint = 3c529043f34ad8a8692b051ad7c03206ce1aafc3a0eb8fcf7f5bcfdcb8c1b455, id = ee6de6bc-1648-4a77-9607-e2a211c7bda4, last_modified = 2021-08-23 |
Source: Process Memory Space: SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe PID: 6208, type: MEMORYSTR | Matched rule: Windows_Trojan_Gh0st_ee6de6bc reference_sample = ea1dc816dfc87c2340a8b8a77a4f97618bccf19ad3b006dce4994be02e13245d, os = windows, severity = x86, description = Identifies a variant of Gh0st Rat, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gh0st, fingerprint = 3c529043f34ad8a8692b051ad7c03206ce1aafc3a0eb8fcf7f5bcfdcb8c1b455, id = ee6de6bc-1648-4a77-9607-e2a211c7bda4, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 52D0C3 second address: 52D156 instructions: 0x00000000 rdtsc 0x00000002 lea eax, dword ptr [ebp+1Eh] 0x00000005 bsf bp, sp 0x00000009 pop dx 0x0000000b jmp 00007F8AB1593E77h 0x0000000d mov edi, 6144D9A9h 0x00000012 mov word ptr [esp+01h], bx 0x00000017 add esp, 01h 0x0000001a jmp 00007F8AB1593EBEh 0x0000001c lea ecx, dword ptr [ecx+3F6DD35Ch] 0x00000022 lea esi, dword ptr [esp+0000F508h] 0x00000029 mov byte ptr [esp], dl 0x0000002c mov eax, dword ptr [esp] 0x0000002f not cl 0x00000031 mov ebp, dword ptr [esp] 0x00000034 jmp 00007F8AB1593F3Bh 0x00000039 xchg ebp, esi 0x0000003b mov byte ptr [esp+01h], cl 0x0000003f mov dx, word ptr [esp] 0x00000043 mov dh, 38h 0x00000045 mov di, word ptr [esp] 0x00000049 sub esp, 14h 0x0000004c jmp 00007F8AB1593E40h 0x0000004e xchg bp, dx 0x00000051 pop word ptr [esp+12h] 0x00000056 push word ptr [esp+03h] 0x0000005b pop edi 0x0000005c cmc 0x0000005d mov si, dx 0x00000060 jmp 00007F8AB1593E6Eh 0x00000062 cmc 0x00000063 push dword ptr [esp+03h] 0x00000067 cld 0x00000068 add esp, 06h 0x0000006b neg dh 0x0000006d pop eax 0x0000006e jmp 00007F8AB1593EDEh 0x00000070 sub esp, 11h 0x00000073 mov word ptr [esp+18h], bp 0x00000078 pop dword ptr [esp+13h] 0x0000007c cpuid 0x0000007e push dword ptr [esp+19h] 0x00000082 cpuid 0x00000084 jmp 00007F8AB1593E76h 0x00000086 dec cx 0x00000088 xchg bp, di 0x0000008b or dh, FFFFFFF5h 0x0000008e pop cx 0x00000090 pop cx 0x00000092 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 52D156 second address: 52D1B0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB0DEEAE8h 0x00000007 clc 0x00000008 rcl di, cl 0x0000000b bts ax, di 0x0000000f shl al, 00000000h 0x00000012 lea edx, dword ptr [00000000h+eax*4] 0x00000019 bswap esi 0x0000001b jmp 00007F8AB0DEE834h 0x00000020 mov ebx, BC6819FEh 0x00000025 mov ebp, dword ptr [esp+15h] 0x00000029 mov cl, ah 0x0000002b btr ax, di 0x0000002f xchg dword ptr [esp+12h], edi 0x00000033 add ah, cl 0x00000035 jmp 00007F8AB0DEE901h 0x00000037 not ah 0x00000039 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 52D486 second address: 52D48E instructions: 0x00000000 rdtsc 0x00000002 bswap ebx 0x00000004 lea esp, dword ptr [esp+0Ah] 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 52D48E second address: 52D476 instructions: 0x00000000 rdtsc 0x00000002 mov ah, byte ptr [esp] 0x00000005 mov dh, byte ptr [esp] 0x00000008 jmp 00007F8AB0DEE92Ah 0x0000000a mov al, byte ptr [esp] 0x0000000d lea esp, dword ptr [esp] 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 52D476 second address: 52D543 instructions: 0x00000000 rdtsc 0x00000002 dec cl 0x00000004 not edx 0x00000006 std 0x00000007 jmp 00007F8AB15945E0h 0x0000000c mov byte ptr [esp], bl 0x0000000f neg al 0x00000011 pushad 0x00000012 mov ebx, esi 0x00000014 xchg bp, bx 0x00000017 mov al, 3Bh 0x00000019 jmp 00007F8AB1593813h 0x0000001e stc 0x0000001f pop edi 0x00000020 xchg dword ptr [esp+07h], ebp 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 52D543 second address: 52D798 instructions: 0x00000000 rdtsc 0x00000002 bt edx, ecx 0x00000005 sub esp, 10h 0x00000008 jmp 00007F8AB0DEE8E3h 0x0000000a xchg word ptr [esp+26h], si 0x0000000f lea ebx, dword ptr [00000000h+esi*4] 0x00000016 setnl dh 0x00000019 mov word ptr [esp+29h], cx 0x0000001e lea ecx, dword ptr [00000000h+eax*4] 0x00000025 lea eax, dword ptr [esp-000000ECh] 0x0000002c jmp 00007F8AB0DEE902h 0x0000002e lea edi, dword ptr [esi+ebp] 0x00000031 std 0x00000032 xchg word ptr [esp+01h], bx 0x00000037 cld 0x00000038 mov ecx, ebp 0x0000003a mov dx, bp 0x0000003d jmp 00007F8AB0DEE956h 0x0000003f xchg dword ptr [esp+03h], esi 0x00000043 mov byte ptr [esp+19h], dl 0x00000047 call 00007F8AB0DEE999h 0x0000004c xchg cx, bx 0x0000004f popad 0x00000050 push word ptr [esp+08h] 0x00000055 pop ebx 0x00000056 jmp 00007F8AB0DEE930h 0x00000058 cpuid 0x0000005a pop dx 0x0000005c sub esp, 00000000h 0x0000005f xchg dword ptr [esp+06h], eax 0x00000063 sbb bx, 6906h 0x00000068 jmp 00007F8AB0DEE962h 0x0000006a mov di, word ptr [esp+07h] 0x0000006f call 00007F8AB0DEEC7Eh 0x00000074 mov di, word ptr [esp+01h] 0x00000079 lea edx, dword ptr [ebp+00002BDCh] 0x0000007f pushfd 0x00000080 mov di, ax 0x00000083 pop word ptr [esp+0Fh] 0x00000088 jmp 00007F8AB0DEE86Eh 0x0000008d bsf bp, sp 0x00000091 xchg word ptr [esp+0Eh], bp 0x00000096 pop bp 0x00000098 mov ch, 02h 0x0000009a mov ch, dl 0x0000009c rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 52D798 second address: 52D551 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB1593CAEh 0x00000007 xchg dh, al 0x00000009 mov bx, cx 0x0000000c lea esi, dword ptr [ebx-7Fh] 0x0000000f pop si 0x00000011 mov ax, 8CB8h 0x00000015 lea edi, dword ptr [esp+0000A102h] 0x0000001c jmp 00007F8AB1593E4Eh 0x0000001e rcr dl, 00000007h 0x00000021 xchg bp, cx 0x00000024 btc bp, di 0x00000028 lea ebx, dword ptr [edi+000012C5h] 0x0000002e pop bp 0x00000030 bsr bp, cx 0x00000034 jmp 00007F8AB1593E6Ch 0x00000036 mov dx, D781h 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 52D551 second address: 52D6C5 instructions: 0x00000000 rdtsc 0x00000002 std 0x00000003 mov ch, byte ptr [esp+0Ah] 0x00000007 mov al, byte ptr [esp+05h] 0x0000000b mov byte ptr [esp+06h], dl 0x0000000f jmp 00007F8AB0DEE973h 0x00000011 pop edx 0x00000012 pop word ptr [esp+01h] 0x00000017 call 00007F8AB0DEE956h 0x0000001c mov eax, ebp 0x0000001e mov bh, AAh 0x00000020 mov bl, ah 0x00000022 add esp, 03h 0x00000025 jmp 00007F8AB0DEE98Dh 0x00000027 mov edi, dword ptr [esp+01h] 0x0000002b not ax 0x0000002e pop edi 0x0000002f mov edi, ebp 0x00000031 ror al, cl 0x00000033 bt edx, ebp 0x00000036 jmp 00007F8AB0DEE92Bh 0x00000038 push word ptr [esp+03h] 0x0000003d cld 0x0000003e dec dl 0x00000040 mov ah, bl 0x00000042 pop word ptr [esp+01h] 0x00000047 jmp 00007F8AB0DEEA47h 0x0000004c rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 52D6C5 second address: 52D667 instructions: 0x00000000 rdtsc 0x00000002 xchg bp, ax 0x00000005 lea esi, dword ptr [eax-000000E4h] 0x0000000b pop word ptr [esp] 0x0000000f clc 0x00000010 mov bp, sp 0x00000013 jmp 00007F8AB1593DF8h 0x00000018 push word ptr [esp] 0x0000001c mov eax, dword ptr [esp+02h] 0x00000020 mov byte ptr [esp+02h], cl 0x00000024 setp bh 0x00000027 xchg ebp, eax 0x00000029 xchg eax, ebx 0x0000002a jmp 00007F8AB1593E5Ah 0x0000002c xchg dh, ah 0x0000002e sub esp, 1Eh 0x00000031 mov byte ptr [esp+12h], cl 0x00000035 xchg byte ptr [esp+1Eh], cl 0x00000039 not bh 0x0000003b mov byte ptr [esp+0Ah], bl 0x0000003f jmp 00007F8AB1593E77h 0x00000041 lea eax, dword ptr [66EDA811h] 0x00000047 lea edi, dword ptr [00000000h+ebx*4] 0x0000004e popad 0x0000004f stc 0x00000050 jmp 00007F8AB1593EBCh 0x00000052 mov ecx, dword ptr [esp] 0x00000055 push cx 0x00000057 xchg bx, cx 0x0000005a add esp, 02h 0x0000005d mov word ptr [esp], di 0x00000061 std 0x00000062 jmp 00007F8AB1593ED9h 0x00000064 bsr bp, ax 0x00000068 clc 0x00000069 setbe bh 0x0000006c sub esp, 1Fh 0x0000006f mov ah, dl 0x00000071 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 52D667 second address: 52D64F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB0DEE92Bh 0x00000004 lea edi, dword ptr [esi-0000E5A0h] 0x0000000a cmc 0x0000000b not bh 0x0000000d cpuid 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 52DA6F second address: 52DAB0 instructions: 0x00000000 rdtsc 0x00000002 not bl 0x00000004 lea edx, dword ptr [00000000h+edi*4] 0x0000000b cpuid 0x0000000d cpuid 0x0000000f mov eax, edx 0x00000011 jmp 00007F8AB1593E63h 0x00000013 cpuid 0x00000015 bt edi, esi 0x00000018 mov di, 4DFBh 0x0000001c bsr edi, edi 0x0000001f btr edx, esi 0x00000022 inc eax 0x00000023 call 00007F8AB1593EA6h 0x00000028 jmp 00007F8AB1593EDFh 0x0000002a not ah 0x0000002c mov byte ptr [esp+01h], ch 0x00000030 sub esp, 04h 0x00000033 mov bl, byte ptr [esp+02h] 0x00000037 neg ecx 0x00000039 mov cx, 9377h 0x0000003d jmp 00007F8AB1593E77h 0x0000003f cpuid 0x00000041 bsf eax, eax 0x00000044 neg bx 0x00000047 xchg eax, ebp 0x00000048 mov si, E8D3h 0x0000004c mov bp, dx 0x0000004f jmp 00007F8AB1593ED1h 0x00000051 clc 0x00000052 xchg dword ptr [esp+01h], edx 0x00000056 push di 0x00000058 sub esp, 00000000h 0x0000005b sub esp, 12h 0x0000005e clc 0x0000005f jmp 00007F8AB1593E7Ch 0x00000061 bsr ebx, ebp 0x00000064 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 52E047 second address: 52DC15 instructions: 0x00000000 rdtsc 0x00000002 pop di 0x00000004 cld 0x00000005 rol eax, 07h 0x00000008 mov bx, word ptr [esp] 0x0000000c jmp 00007F8AB0DEE7D6h 0x00000011 xchg ebp, esi 0x00000013 mov dl, cl 0x00000015 push word ptr [esp+01h] 0x0000001a not bh 0x0000001c xchg word ptr [esp], si 0x00000020 bswap ecx 0x00000022 jmp 00007F8AB0DEE743h 0x00000027 inc edx 0x00000028 xchg dh, ch 0x0000002a lea esp, dword ptr [esp+04h] 0x0000002e xchg ebx, esi 0x00000030 mov bl, D7h 0x00000032 xchg ebx, edi 0x00000034 jmp 00007F8AB0DEE8E4h 0x00000036 setb ch 0x00000039 dec bx 0x0000003b call 00007F8AB0DEE8C5h 0x00000040 xchg bp, cx 0x00000043 lea esp, dword ptr [esp+01h] 0x00000047 mov word ptr [esp+01h], si 0x0000004c lea esp, dword ptr [esp+03h] 0x00000050 jmp 00007F8AB0DEE917h 0x00000052 lea esi, dword ptr [esp+000000B2h] 0x00000059 sete al 0x0000005c stc 0x0000005d std 0x0000005e xchg al, cl 0x00000060 call 00007F8AB0DEE9A4h 0x00000065 pushfd 0x00000066 jmp 00007F8AB0DEE900h 0x00000068 pop word ptr [esp+04h] 0x0000006d mov al, dh 0x0000006f setl dh 0x00000072 sub esp, 0Dh 0x00000075 bsr esi, esp 0x00000078 jmp 00007F8AB0DEE968h 0x0000007a mov ecx, edx 0x0000007c lea ebp, dword ptr [B1C33945h] 0x00000082 xchg di, bp 0x00000085 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 52DF76 second address: 52E073 instructions: 0x00000000 rdtsc 0x00000002 xchg di, si 0x00000005 bswap edi 0x00000007 jmp 00007F8AB1593E77h 0x00000009 xchg ch, ah 0x0000000b mov si, word ptr [esp] 0x0000000f mov bx, 90E2h 0x00000013 mov edx, ebp 0x00000015 mov ecx, esp 0x00000017 call 00007F8AB1593ED3h 0x0000001c push dword ptr [esp+02h] 0x00000020 jmp 00007F8AB1593E86h 0x00000022 not ch 0x00000024 lea ebx, dword ptr [ecx+000000A1h] 0x0000002a mov al, DDh 0x0000002c pop word ptr [esp+02h] 0x00000031 jmp 00007F8AB1593EADh 0x00000033 mov bh, ch 0x00000035 lea esi, dword ptr [00000000h+ebx*4] 0x0000003c mov word ptr [esp+03h], si 0x00000041 mov esi, 2CA17698h 0x00000046 bswap ecx 0x00000048 push word ptr [esp+02h] 0x0000004d jmp 00007F8AB1593EE2h 0x0000004f mov dh, byte ptr [esp+02h] 0x00000053 push dword ptr [esp+06h] 0x00000057 lea esp, dword ptr [esp+0Ah] 0x0000005b xchg word ptr [esp], bp 0x0000005f xchg ax, di 0x00000061 push word ptr [esp] 0x00000065 call 00007F8AB1593E6Fh 0x0000006a jmp 00007F8AB1593EECh 0x0000006c pop word ptr [esp+01h] 0x00000071 mov byte ptr [esp+02h], bl 0x00000075 call 00007F8AB1593E4Dh 0x0000007a bswap edi 0x0000007c xchg edi, ecx 0x0000007e mov dl, byte ptr [esp+01h] 0x00000082 xchg ebx, eax 0x00000084 jmp 00007F8AB1593ECAh 0x00000086 mov cx, 439Eh 0x0000008a xchg word ptr [esp+05h], bx 0x0000008f push word ptr [esp+05h] 0x00000094 call 00007F8AB1593EF2h 0x00000099 pop ecx 0x0000009a rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 52E68E second address: 52E69B instructions: 0x00000000 rdtsc 0x00000002 xchg word ptr [esp+03h], dx 0x00000007 xchg bl, ah 0x00000009 jmp 00007F8AB0DEE914h 0x0000000b mov dl, bl 0x0000000d pop dx 0x0000000f call 00007F8AB0DEE936h 0x00000014 push dword ptr [esp+03h] 0x00000018 cpuid 0x0000001a lea edx, dword ptr [00000000h+ebx*4] 0x00000021 not bx 0x00000024 jmp 00007F8AB0DEE95Fh 0x00000026 lea esi, dword ptr [esp+0000F8EDh] 0x0000002d xchg byte ptr [esp+0Dh], dh 0x00000031 mov edx, dword ptr [esp+0Eh] 0x00000035 cpuid 0x00000037 lea esp, dword ptr [esp+01h] 0x0000003b pushad 0x0000003c jmp 00007F8AB0DEE96Fh 0x0000003e pop si 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4870FE second address: 487106 instructions: 0x00000000 rdtsc 0x00000002 mov dx, 6FF8h 0x00000006 mov dl, al 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 487106 second address: 487356 instructions: 0x00000000 rdtsc 0x00000002 bsr cx, ax 0x00000006 jno 00007F8AB0DEE96Bh 0x00000008 jmp 00007F8AB0DEE970h 0x0000000a xchg cl, ah 0x0000000c mov ah, byte ptr [esp] 0x0000000f jmp 00007F8AB0DEE97Fh 0x00000011 neg esi 0x00000013 sub esp, 0Bh 0x00000016 jp 00007F8AB0DEE935h 0x00000018 lea eax, dword ptr [ebx+edi] 0x0000001b jmp 00007F8AB0DEE9DBh 0x00000020 not dx 0x00000023 bswap eax 0x00000025 mov cx, E141h 0x00000029 jmp 00007F8AB0DEE980h 0x0000002b add esp, 03h 0x0000002e jmp 00007F8AB0DEE937h 0x00000030 lea esp, dword ptr [esp+08h] 0x00000034 neg esi 0x00000036 sub esp, 0Bh 0x00000039 jc 00007F8AB0DEE962h 0x0000003b jnc 00007F8AB0DEE9A4h 0x0000003d pop word ptr [esp] 0x00000041 setns cl 0x00000044 xchg dword ptr [esp+03h], eax 0x00000048 jmp 00007F8AB0DEE92Fh 0x0000004a lea eax, dword ptr [ecx+esi] 0x0000004d mov cl, 09h 0x0000004f jmp 00007F8AB0DEE96Eh 0x00000051 mov cl, byte ptr [esp] 0x00000054 lea esp, dword ptr [esp+01h] 0x00000058 lea esp, dword ptr [esp+08h] 0x0000005c add esi, 395AD57Fh 0x00000062 cmp ax, 0000A1BFh 0x00000066 jmp 00007F8AB0DEE981h 0x00000068 jbe 00007F8AB0DEE9C1h 0x0000006a rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 487356 second address: 4872F6 instructions: 0x00000000 rdtsc 0x00000002 mov ecx, 765D225Fh 0x00000007 mov ecx, FC5B28A4h 0x0000000c bsr ax, si 0x00000010 sub esi, 68829BC1h 0x00000016 mov dx, word ptr [esp] 0x0000001a jmp 00007F8AB1593E36h 0x0000001c mov dh, byte ptr [esp] 0x0000001f mov al, 1Ah 0x00000021 lea ecx, dword ptr [eax+edx] 0x00000024 setb dh 0x00000027 mov eax, dword ptr [esp] 0x0000002a lea edx, dword ptr [esp+ebx] 0x0000002d jmp 00007F8AB1593E79h 0x0000002f dec esi 0x00000030 rcr dl, 00000006h 0x00000033 jc 00007F8AB1593EDBh 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 49799B second address: 497A16 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB0DEE956h 0x00000004 lea ecx, dword ptr [ecx+edi] 0x00000007 lea edx, dword ptr [00000000h+ebx*4] 0x0000000e jmp 00007F8AB0DEEA35h 0x00000013 mov esi, dword ptr [ebp+00h] 0x00000016 mov ecx, edx 0x00000018 mov edx, 8EB07D69h 0x0000001d stc 0x0000001e jns 00007F8AB0DEE8EFh 0x00000020 jmp 00007F8AB0DEE8F9h 0x00000022 rcl ch, 00000000h 0x00000025 add ebp, 04h 0x00000028 bsf ax, ax 0x0000002c je 00007F8AB0DEE930h 0x0000002e lea edx, dword ptr [eax+eax] 0x00000031 mov ch, bh 0x00000033 jmp 00007F8AB0DEE970h 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 48ADEA second address: 48AE34 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB1593EE2h 0x00000004 mov ax, C344h 0x00000008 bswap eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 48AFA8 second address: 48B06E instructions: 0x00000000 rdtsc 0x00000002 lea esp, dword ptr [esp+03h] 0x00000006 xor cl, FFFFFFC2h 0x00000009 bsr eax, ebx 0x0000000c jmp 00007F8AB0DEE9A1h 0x0000000e jp 00007F8AB0DEE966h 0x00000010 mov ax, si 0x00000013 mov dx, word ptr [esp] 0x00000017 jmp 00007F8AB0DEE9B0h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 48B06E second address: 48B186 instructions: 0x00000000 rdtsc 0x00000002 and eax, ebx 0x00000004 bsr edx, esp 0x00000007 jmp 00007F8AB1593E54h 0x00000009 bswap edx 0x0000000b jmp 00007F8AB1593EB8h 0x0000000d dec cl 0x0000000f bsr dx, bp 0x00000013 jmp 00007F8AB1593EF2h 0x00000015 je 00007F8AB1593E54h 0x00000017 setp al 0x0000001a mov edx, eax 0x0000001c jmp 00007F8AB1593E52h 0x0000001e call 00007F8AB1593EF0h 0x00000023 mov eax, 4B8EAC0Fh 0x00000028 mov dx, di 0x0000002b adc dx, 1AB4h 0x00000030 rcr al, 00000002h 0x00000033 xchg dword ptr [esp], ebx 0x00000036 jmp 00007F8AB1593ED4h 0x00000038 lea edx, dword ptr [00000000h+ebx*4] 0x0000003f btc dx, bx 0x00000043 mov dh, 6Ch 0x00000045 mov dx, B473h 0x00000049 bts dx, sp 0x0000004d lea ebx, dword ptr [ebx+1Eh] 0x00000050 jmp 00007F8AB1594231h 0x00000055 mov dl, B7h 0x00000057 lea edx, dword ptr [edx+ebx] 0x0000005a bswap edx 0x0000005c mov dx, word ptr [esp] 0x00000060 bts edx, edi 0x00000063 xchg dword ptr [esp], ebx 0x00000066 jmp 00007F8AB1593D0Fh 0x0000006b bsr dx, sp 0x0000006f mov ax, word ptr [esp] 0x00000073 xchg ah, dh 0x00000075 mov ax, 08E7h 0x00000079 mov dx, cx 0x0000007c push dword ptr [esp] 0x0000007f retn 0004h 0x00000082 and ecx, 3Ch 0x00000085 jmp 00007F8AB1593FA7h 0x0000008a mov al, byte ptr [esp] 0x0000008d mov eax, esi 0x0000008f rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 48B47B second address: 48B569 instructions: 0x00000000 rdtsc 0x00000002 rcr dl, cl 0x00000004 jmp 00007F8AB0DEEA08h 0x00000009 inc ebp 0x0000000a sub esp, 04h 0x0000000d jl 00007F8AB0DEE934h 0x0000000f mov edx, edi 0x00000011 pushfd 0x00000012 lea eax, dword ptr [00000000h+eax*4] 0x00000019 mov eax, dword ptr [esp] 0x0000001c jmp 00007F8AB0DEE9D5h 0x00000021 neg eax 0x00000023 jmp 00007F8AB0DEE8D1h 0x00000028 mov al, ah 0x0000002a setbe al 0x0000002d shl dx, 1 0x00000030 jl 00007F8AB0DEE993h 0x00000032 setle dh 0x00000035 bt ax, sp 0x00000039 xor cl, 0000003Eh 0x0000003c bswap eax 0x0000003e jmp 00007F8AB0DEE905h 0x00000040 mov dx, 1CAEh 0x00000044 lea edx, dword ptr [00000000h+ebp*4] 0x0000004b rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 48A5A2 second address: 48A562 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB1593F83h 0x00000007 jmp 00007F8AB1593D6Bh 0x0000000c ror cl, 00000000h 0x0000000f mov eax, FED2A885h 0x00000014 lea edx, dword ptr [eax+00004342h] 0x0000001a mov al, 8Bh 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 497AC6 second address: 497BD9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB0DEE9B1h 0x00000004 sub esi, 04h 0x00000007 mov dx, 73F9h 0x0000000b mov ax, E32Dh 0x0000000f rcl ax, cl 0x00000012 jnl 00007F8AB0DEE922h 0x00000014 jmp 00007F8AB0DEE98Ah 0x00000016 bsr edx, esi 0x00000019 mov ecx, dword ptr [ebp+00h] 0x0000001c mov dx, bx 0x0000001f bsr ax, dx 0x00000023 jmp 00007F8AB0DEEA19h 0x00000028 ja 00007F8AB0DEE842h 0x0000002e lea eax, dword ptr [esi+54h] 0x00000031 lea edx, dword ptr [esp+eax] 0x00000034 mov al, dh 0x00000036 bsr ax, bx 0x0000003a lea eax, dword ptr [esp+edi] 0x0000003d bswap eax 0x0000003f call 00007F8AB0DEE99Dh 0x00000044 sub esp, 01h 0x00000047 mov dx, ax 0x0000004a xchg byte ptr [esp], al 0x0000004d mov byte ptr [esp], bl 0x00000050 mov byte ptr [esp], al 0x00000053 jmp 00007F8AB0DEE983h 0x00000055 lea esp, dword ptr [esp+01h] 0x00000059 xchg dword ptr [esp], edi 0x0000005c neg dx 0x0000005f mov eax, esi 0x00000061 lea edx, dword ptr [FA2511AAh] 0x00000067 jmp 00007F8AB0DEE928h 0x00000069 mov eax, 5C79E6DCh 0x0000006e call 00007F8AB0DEE9A0h 0x00000073 lea edi, dword ptr [edi+5Eh] 0x00000076 mov edx, esi 0x00000078 dec dx 0x0000007a lea edx, dword ptr [ecx-3Bh] 0x0000007d or eax, 50115FD1h 0x00000082 jmp 00007F8AB0DEE929h 0x00000084 sete dh 0x00000087 xchg dword ptr [esp+04h], edi 0x0000008b rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 49928B second address: 4992AB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB1593EBBh 0x00000004 push esi 0x00000005 mov ch, B9h 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4992AB second address: 499323 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov byte ptr [esp+1Ah], bh 0x00000007 jmp 00007F8AB0DEE99Dh 0x00000009 btr esi, esi 0x0000000c jbe 00007F8AB0DEE937h 0x0000000e neg ebx 0x00000010 mov eax, dword ptr [esp] 0x00000013 jmp 00007F8AB0DEE971h 0x00000015 add esp, 20h 0x00000018 jmp 00007F8AB0DEF32Fh 0x0000001d jns 00007F8AB0DEDF77h 0x00000023 pop edi 0x00000024 mov dx, di 0x00000027 lea ebx, dword ptr [00000000h+eax*4] 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4A94F0 second address: 4A999D instructions: 0x00000000 rdtsc 0x00000002 not dx 0x00000005 btr eax, esi 0x00000008 jnc 00007F8AB1594340h 0x0000000e jc 00007F8AB1594036h 0x00000014 shr dh, 1 0x00000016 jmp 00007F8AB15941A4h 0x0000001b sub ebp, 04h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 48B022 second address: 48B186 instructions: 0x00000000 rdtsc 0x00000002 and eax, ebx 0x00000004 bsr edx, esp 0x00000007 bswap edx 0x00000009 jmp 00007F8AB0DEE968h 0x0000000b dec cl 0x0000000d bsr dx, bp 0x00000011 jmp 00007F8AB0DEE9A2h 0x00000013 je 00007F8AB0DEE904h 0x00000015 setp al 0x00000018 mov edx, eax 0x0000001a jmp 00007F8AB0DEE902h 0x0000001c call 00007F8AB0DEE9A0h 0x00000021 mov eax, 4B8EAC0Fh 0x00000026 mov dx, di 0x00000029 adc dx, 1AB4h 0x0000002e rcr al, 00000002h 0x00000031 xchg dword ptr [esp], ebx 0x00000034 jmp 00007F8AB0DEE984h 0x00000036 lea edx, dword ptr [00000000h+ebx*4] 0x0000003d btc dx, bx 0x00000041 mov dh, 6Ch 0x00000043 mov dx, B473h 0x00000047 bts dx, sp 0x0000004b lea ebx, dword ptr [ebx+1Eh] 0x0000004e jmp 00007F8AB0DEECE1h 0x00000053 mov dl, B7h 0x00000055 lea edx, dword ptr [edx+ebx] 0x00000058 bswap edx 0x0000005a mov dx, word ptr [esp] 0x0000005e bts edx, edi 0x00000061 xchg dword ptr [esp], ebx 0x00000064 jmp 00007F8AB0DEE7BFh 0x00000069 bsr dx, sp 0x0000006d mov ax, word ptr [esp] 0x00000071 xchg ah, dh 0x00000073 mov ax, 08E7h 0x00000077 mov dx, cx 0x0000007a push dword ptr [esp] 0x0000007d retn 0004h 0x00000080 and ecx, 3Ch 0x00000083 jmp 00007F8AB0DEEA57h 0x00000088 mov al, byte ptr [esp] 0x0000008b mov eax, esi 0x0000008d rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 49901A second address: 499086 instructions: 0x00000000 rdtsc 0x00000002 dec dh 0x00000004 jmp 00007F8AB1593ECCh 0x00000006 add cl, FFFFFFA1h 0x00000009 xchg ah, al 0x0000000b bsr edx, edi 0x0000000e jnbe 00007F8AB1593ED3h 0x00000010 xchg eax, edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 49B208 second address: 4870FE instructions: 0x00000000 rdtsc 0x00000002 add ecx, E346A1A5h 0x00000008 push dword ptr [esp+1Ch] 0x0000000c retn 0020h 0x0000000f push esi 0x00000010 jmp 00007F8AB0DEE9C8h 0x00000012 and edx, D81356B1h 0x00000018 jnp 00007F8AB0DEE9B2h 0x0000001a mov dx, word ptr [esp] 0x0000001e mov ah, 72h 0x00000020 jmp 00007F8AB0DEE926h 0x00000022 mov ecx, ebx 0x00000024 mov edx, 568228A5h 0x00000029 jmp 00007F8AB0DEE999h 0x0000002b mov cx, word ptr [esp] 0x0000002f pop ebp 0x00000030 lea eax, dword ptr [ebx+esi] 0x00000033 not ax 0x00000036 jmp 00007F8AB0DEE921h 0x00000038 bts si, dx 0x0000003c jle 00007F8AB0DEE97Dh 0x0000003e mov al, cl 0x00000040 jmp 00007F8AB0DEE97Bh 0x00000042 pop esi 0x00000043 jmp 00007F8AB0DDA802h 0x00000048 mov ebx, esi 0x0000004a mov dh, cl 0x0000004c jmp 00007F8AB0DEE909h 0x0000004e rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 49A712 second address: 49A6AB instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 not edx 0x00000005 jmp 00007F8AB1593E61h 0x00000007 push edi 0x00000008 mov cl, byte ptr [esp] 0x0000000b lea edi, dword ptr [edi-7Bh] 0x0000000e setnle dl 0x00000011 mov edx, 58BD0688h 0x00000016 mov bl, dl 0x00000018 jmp 00007F8AB1593E57h 0x0000001a cmc 0x0000001b jns 00007F8AB1593E89h 0x0000001d bswap edi 0x0000001f jmp 00007F8AB1593ED5h 0x00000021 lea ecx, dword ptr [edi+3498DDEDh] 0x00000027 push esp 0x00000028 mov esi, dword ptr [esp+04h] 0x0000002c btc edx, ebx 0x0000002f jmp 00007F8AB1593EBCh 0x00000031 jns 00007F8AB1593E5Ch 0x00000033 lea esp, dword ptr [esp+08h] 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 499046 second address: 499086 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB0DEE9CAh 0x00000004 dec dh 0x00000006 jmp 00007F8AB0DEE8D6h 0x00000008 add cl, FFFFFFA1h 0x0000000b xchg ah, al 0x0000000d bsr edx, edi 0x00000010 jnbe 00007F8AB0DEE983h 0x00000012 xchg eax, edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4A88E9 second address: 4A88F6 instructions: 0x00000000 rdtsc 0x00000002 mov bl, cl 0x00000004 jmp 00007F8AB1593EC9h 0x00000006 jmp 00007F8AB1593E79h 0x00000008 mov ebp, dword ptr [esp] 0x0000000b lea esp, dword ptr [esp+04h] 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4A88F6 second address: 4A8956 instructions: 0x00000000 rdtsc 0x00000002 mov bx, word ptr [esp] 0x00000006 lea edi, dword ptr [ecx+esi] 0x00000009 call 00007F8AB0DEE97Fh 0x0000000e jmp 00007F8AB0DEE93Ah 0x00000010 add esp, 08h 0x00000013 jle 00007F8AB0DEE97Bh 0x00000015 jnle 00007F8AB0DEE979h 0x00000017 pop esi 0x00000018 call 00007F8AB0DEE939h 0x0000001d mov eax, ebp 0x0000001f neg bx 0x00000022 jmp 00007F8AB0DEE9A8h 0x00000024 jle 00007F8AB0DEE90Fh 0x00000026 jnle 00007F8AB0DEE90Dh 0x00000028 add esp, 04h 0x0000002b jmp 00007F8AB0DEE978h 0x0000002d jnbe 00007F8AB0DEE92Eh 0x0000002f pop ebx 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4A8956 second address: 4870FE instructions: 0x00000000 rdtsc 0x00000002 call 00007F8AB1593EEFh 0x00000007 mov edx, dword ptr [esp+02h] 0x0000000b jmp 00007F8AB1593E86h 0x0000000d add esp, 04h 0x00000010 jns 00007F8AB1593EB9h 0x00000012 pop edi 0x00000013 jmp 00007F8AB1572633h 0x00000018 mov ebx, esi 0x0000001a mov dh, cl 0x0000001c jmp 00007F8AB1593E59h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4992C7 second address: 4992AB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB0DEE92Fh 0x00000004 push esi 0x00000005 mov ch, B9h 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4AAC43 second address: 4AAC64 instructions: 0x00000000 rdtsc 0x00000002 xchg cx, dx 0x00000005 jmp 00007F8AB1593ED2h 0x00000007 mov al, dh 0x00000009 xchg dword ptr [esp], esi 0x0000000c setbe ch 0x0000000f mov ch, bl 0x00000011 lea ecx, dword ptr [ebx+54h] 0x00000014 lea esi, dword ptr [esi+27h] 0x00000017 jmp 00007F8AB1593E7Ah 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4AAC64 second address: 49833F instructions: 0x00000000 rdtsc 0x00000002 xchg al, dl 0x00000004 mov dx, word ptr [esp] 0x00000008 xchg dword ptr [esp], esi 0x0000000b jmp 00007F8AB0DEE96Dh 0x0000000d lea eax, dword ptr [00000000h+eax*4] 0x00000014 mov dx, word ptr [esp] 0x00000018 mov ah, 97h 0x0000001a not ah 0x0000001c push dword ptr [esp] 0x0000001f retn 0004h 0x00000022 ja 00007F8AB0DDBFA4h 0x00000028 jmp 00007F8AB0DEE97Dh 0x0000002a movzx ecx, byte ptr [ebp+00h] 0x0000002e sub esp, 00000000h 0x00000031 js 00007F8AB0DEE91Eh 0x00000033 rcl dh, cl 0x00000035 jmp 00007F8AB0DEEA42h 0x0000003a sub esp, 18h 0x0000003d lea eax, dword ptr [eax+ebp] 0x00000040 bswap eax 0x00000042 jmp 00007F8AB0DEE8F8h 0x00000044 bts eax, edx 0x00000047 jmp 00007F8AB0DEE882h 0x0000004c rcl dh, cl 0x0000004e call 00007F8AB0DEE9B0h 0x00000053 mov eax, DD22D1A1h 0x00000058 sub esp, 0Eh 0x0000005b lea esp, dword ptr [esp+06h] 0x0000005f mov ah, dl 0x00000061 xchg eax, edx 0x00000062 jmp 00007F8AB0DEE983h 0x00000064 xchg dword ptr [esp+08h], ebp 0x00000068 bswap edx 0x0000006a mov ah, byte ptr [esp] 0x0000006d lea ebp, dword ptr [ebp+71h] 0x00000070 pushad 0x00000071 lea edx, dword ptr [475C02B4h] 0x00000077 jmp 00007F8AB0DEE927h 0x00000079 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4B9816 second address: 4B97DC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB1593E61h 0x00000004 add ebp, 02h 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4872E7 second address: 4872F6 instructions: 0x00000000 rdtsc 0x00000002 mov ecx, 765D225Fh 0x00000007 jmp 00007F8AB0DEE931h 0x00000009 mov ecx, FC5B28A4h 0x0000000e bsr ax, si 0x00000012 jmp 00007F8AB0DEE9DEh 0x00000017 sub esi, 68829BC1h 0x0000001d mov dx, word ptr [esp] 0x00000021 jmp 00007F8AB0DEE8E6h 0x00000023 mov dh, byte ptr [esp] 0x00000026 mov al, 1Ah 0x00000028 lea ecx, dword ptr [eax+edx] 0x0000002b setb dh 0x0000002e mov eax, dword ptr [esp] 0x00000031 lea edx, dword ptr [esp+ebx] 0x00000034 jmp 00007F8AB0DEE929h 0x00000036 dec esi 0x00000037 rcr dl, 00000006h 0x0000003a jc 00007F8AB0DEE98Bh 0x0000003c rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4B1379 second address: 4B1387 instructions: 0x00000000 rdtsc 0x00000002 neg edx 0x00000004 js 00007F8AB1593E86h 0x00000006 call 00007F8AB1593EDCh 0x0000000b mov ecx, EEB6F27Eh 0x00000010 mov ecx, dword ptr [ebp+00h] 0x00000013 jmp 00007F8AB1593E7Ah 0x00000015 mov ax, word ptr [esp] 0x00000019 mov eax, edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4B8CBF second address: 4AAC43 instructions: 0x00000000 rdtsc 0x00000002 call 00007F8AB0DEE956h 0x00000007 mov byte ptr [esp+01h], dl 0x0000000b clc 0x0000000c jmp 00007F8AB0DEE987h 0x0000000e jnl 00007F8AB0DEE91Fh 0x00000010 sub esi, 08h 0x00000013 jmp 00007F8AB0DEE968h 0x00000015 xchg edx, ecx 0x00000017 call 00007F8AB0DEE985h 0x0000001c lea esp, dword ptr [esp+01h] 0x00000020 push word ptr [esp] 0x00000024 js 00007F8AB0DEE92Bh 0x00000026 jns 00007F8AB0DEE970h 0x00000028 sub esp, 1Ah 0x0000002b lea esp, dword ptr [esp+03h] 0x0000002f jmp 00007F8AB0DEE909h 0x00000031 mov dword ptr [esi], ecx 0x00000033 mov cl, ch 0x00000035 jmp 00007F8AB0DEE96Eh 0x00000037 lea ecx, dword ptr [00000000h+edi*4] 0x0000003e call 00007F8AB0DEE986h 0x00000043 mov byte ptr [esp+01h], dh 0x00000047 mov dword ptr [esi+04h], eax 0x0000004a mov ah, 76h 0x0000004c sub esp, 13h 0x0000004f jmp 00007F8AB0DEE956h 0x00000051 jnbe 00007F8AB0DEE928h 0x00000053 xchg byte ptr [esp+0Dh], ch 0x00000057 call 00007F8AB0DEEA59h 0x0000005c lea esp, dword ptr [esp+03h] 0x00000060 jmp 00007F8AB0DE06FAh 0x00000065 pushad 0x00000066 push word ptr [esp+06h] 0x0000006b jbe 00007F8AB0DEE928h 0x0000006d lea esp, dword ptr [esp+02h] 0x00000071 jmp 00007F8AB0DEE92Ch 0x00000073 lea edx, dword ptr [edi+50h] 0x00000076 xchg eax, ecx 0x00000077 mov eax, dword ptr [esp] 0x0000007a stc 0x0000007b jle 00007F8AB0DEE984h 0x0000007d jnle 00007F8AB0DEE96Ch 0x0000007f cmp esi, edx 0x00000081 call 00007F8AB0DEE966h 0x00000086 lea ecx, dword ptr [00000000h+edx*4] 0x0000008d mov cx, 4E80h 0x00000091 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4B1091 second address: 4AAC43 instructions: 0x00000000 rdtsc 0x00000002 rcl edx, cl 0x00000004 jmp 00007F8AB1593EFFh 0x00000006 jne 00007F8AB1593E47h 0x00000008 mov ax, ss 0x0000000a lea edx, dword ptr [00000000h+eax*4] 0x00000011 push eax 0x00000012 jmp 00007F8AB1593A13h 0x00000017 pop ss 0x00000018 pushfd 0x00000019 jmp 00007F8AB1594356h 0x0000001e pop dword ptr [esi] 0x00000020 mov ecx, dword ptr [esp] 0x00000023 bt edx, ecx 0x00000026 jmp 00007F8AB1593ED6h 0x00000028 jp 00007F8AB1593E70h 0x0000002a call 00007F8AB1593EBAh 0x0000002f jmp 00007F8AB158D9BAh 0x00000034 pushad 0x00000035 push word ptr [esp+06h] 0x0000003a jbe 00007F8AB1593E78h 0x0000003c lea esp, dword ptr [esp+02h] 0x00000040 jmp 00007F8AB1593E7Ch 0x00000042 lea edx, dword ptr [edi+50h] 0x00000045 xchg eax, ecx 0x00000046 mov eax, dword ptr [esp] 0x00000049 stc 0x0000004a jle 00007F8AB1593ED4h 0x0000004c jnle 00007F8AB1593EBCh 0x0000004e cmp esi, edx 0x00000050 call 00007F8AB1593EB6h 0x00000055 lea ecx, dword ptr [00000000h+edx*4] 0x0000005c mov cx, 4E80h 0x00000060 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 499A83 second address: 499A87 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB0DEE938h 0x00000004 xchg cx, ax 0x00000007 adc cx, dx 0x0000000a call 00007F8AB0DEE964h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4C6876 second address: 4C6A49 instructions: 0x00000000 rdtsc 0x00000002 neg dl 0x00000004 mov eax, ecx 0x00000006 jmp 00007F8AB159405Ch 0x0000000b lea edi, dword ptr [edi+0005040Bh] 0x00000011 lea eax, dword ptr [CD6A2DD3h] 0x00000017 mov edx, 9C0D1359h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4D99A3 second address: 48810D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB0DEE8DBh 0x00000004 sub ebp, 08h 0x00000007 pushfd 0x00000008 lea esp, dword ptr [esp] 0x0000000b jmp 00007F8AB0DEE9A0h 0x0000000d mov dword ptr [ebp+00h], edx 0x00000010 mov dh, al 0x00000012 sub esp, 18h 0x00000015 jnl 00007F8AB0DEE97Eh 0x00000017 jmp 00007F8AB0DEE93Ah 0x00000019 xchg eax, ecx 0x0000001a bsr dx, si 0x0000001e jnc 00007F8AB0DEE979h 0x00000020 clc 0x00000021 cmc 0x00000022 mov dword ptr [ebp+04h], ecx 0x00000025 mov dx, word ptr [esp] 0x00000029 lea edx, dword ptr [00000000h+edx*4] 0x00000030 jmp 00007F8AB0D9D10Eh 0x00000035 neg eax 0x00000037 jl 00007F8AB0DEE8B2h 0x0000003d jmp 00007F8AB0DEE92Dh 0x0000003f mov ecx, dword ptr [esp] 0x00000042 bsf cx, cx 0x00000046 neg ah 0x00000048 jmp 00007F8AB0DEE931h 0x0000004a lea ecx, dword ptr [edi+50h] 0x0000004d clc 0x0000004e jp 00007F8AB0DEE96Dh 0x00000050 mov dl, C2h 0x00000052 mov dh, byte ptr [esp] 0x00000055 rcl dx, cl 0x00000058 jmp 00007F8AB0DEE99Eh 0x0000005a mov ah, ch 0x0000005c jmp 00007F8AB0DEE92Dh 0x0000005e cmp ebp, ecx 0x00000060 jl 00007F8AB0DEE991h 0x00000062 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4D6526 second address: 4D65FD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB1593ED0h 0x00000004 neg cl 0x00000006 lea eax, dword ptr [C399C3E4h] 0x0000000c lea eax, dword ptr [ecx+0000D6D8h] 0x00000012 lea eax, dword ptr [eax+esi] 0x00000015 jmp 00007F8AB1593EBDh 0x00000017 not cl 0x00000019 bswap eax 0x0000001b mov dx, ax 0x0000001e mov dx, word ptr [esp] 0x00000022 bsr ax, dx 0x00000026 jmp 00007F8AB1593EEEh 0x00000028 jle 00007F8AB1593E58h 0x0000002a lea eax, dword ptr [edi-7CF34C86h] 0x00000030 shr dh, cl 0x00000032 jmp 00007F8AB1593E7Ah 0x00000034 add cl, FFFFFF99h 0x00000037 push edx 0x00000038 mov ax, word ptr [esp+02h] 0x0000003d mov dh, 51h 0x0000003f push ax 0x00000041 jmp 00007F8AB1593EBBh 0x00000043 xchg dword ptr [esp], eax 0x00000046 lea esp, dword ptr [esp+02h] 0x0000004a lea esp, dword ptr [esp+04h] 0x0000004e sub cl, FFFFFF88h 0x00000051 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4D6540 second address: 4D65FD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB0DEE966h 0x00000004 neg cl 0x00000006 lea eax, dword ptr [C399C3E4h] 0x0000000c lea eax, dword ptr [ecx+0000D6D8h] 0x00000012 lea eax, dword ptr [eax+esi] 0x00000015 jmp 00007F8AB0DEE96Dh 0x00000017 not cl 0x00000019 bswap eax 0x0000001b mov dx, ax 0x0000001e mov dx, word ptr [esp] 0x00000022 bsr ax, dx 0x00000026 jmp 00007F8AB0DEE99Eh 0x00000028 jle 00007F8AB0DEE908h 0x0000002a lea eax, dword ptr [edi-7CF34C86h] 0x00000030 shr dh, cl 0x00000032 jmp 00007F8AB0DEE92Ah 0x00000034 add cl, FFFFFF99h 0x00000037 push edx 0x00000038 mov ax, word ptr [esp+02h] 0x0000003d mov dh, 51h 0x0000003f push ax 0x00000041 jmp 00007F8AB0DEE96Bh 0x00000043 xchg dword ptr [esp], eax 0x00000046 lea esp, dword ptr [esp+02h] 0x0000004a lea esp, dword ptr [esp+04h] 0x0000004e sub cl, FFFFFF88h 0x00000051 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 479B98 second address: 479C13 instructions: 0x00000000 rdtsc 0x00000002 mov ecx, dword ptr [esp] 0x00000005 call 00007F8AB1593ED8h 0x0000000a lea eax, dword ptr [edi+0000880Fh] 0x00000010 mov cx, dx 0x00000013 mov cx, word ptr [esp] 0x00000017 rcl ecx, 0Ch 0x0000001a jmp 00007F8AB1593EC5h 0x0000001c add al, ch 0x0000001e xchg dword ptr [esp], ebx 0x00000021 not edx 0x00000023 mov cl, dh 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 479C13 second address: 4CFDF2 instructions: 0x00000000 rdtsc 0x00000002 lea eax, dword ptr [ecx-00004680h] 0x00000008 jmp 00007F8AB0E44AE6h 0x0000000d lea ebx, dword ptr [ebx+49h] 0x00000010 lea eax, dword ptr [ebx+esi] 0x00000013 dec edx 0x00000014 lea edx, dword ptr [eax+ebp] 0x00000017 xchg dx, ax 0x0000001a pushad 0x0000001b jmp 00007F8AB0DEE92Ch 0x0000001d xchg dword ptr [esp+20h], ebx 0x00000021 mov ax, si 0x00000024 lea edx, dword ptr [ecx+000000CEh] 0x0000002a shr dx, cl 0x0000002d jmp 00007F8AB0DEE986h 0x0000002f cmc 0x00000030 mov eax, dword ptr [esp] 0x00000033 push dword ptr [esp+20h] 0x00000037 retn 0024h 0x0000003a not ch 0x0000003c sub esp, 1Ah 0x0000003f jl 00007F8AB0E44B2Bh 0x00000045 jnl 00007F8AB0E44B85h 0x0000004b lea esp, dword ptr [esp+02h] 0x0000004f call 00007F8AB0DEE90Dh 0x00000054 xchg dx, cx 0x00000057 not ax 0x0000005a rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4D42B5 second address: 4D42D0 instructions: 0x00000000 rdtsc 0x00000002 mov edx, dword ptr [esp] 0x00000005 and ah, 0000007Ah 0x00000008 xchg dword ptr [esp], ebp 0x0000000b jmp 00007F8AB1593F12h 0x0000000d bsf ax, dx 0x00000011 bswap edx 0x00000013 mov edx, 76495E28h 0x00000018 pushfd 0x00000019 lea ebp, dword ptr [ebp-0000001Bh] 0x0000001f bswap edx 0x00000021 jmp 00007F8AB1593E1Ch 0x00000026 mov ah, byte ptr [esp] 0x00000029 sub esp, 08h 0x0000002c dec dh 0x0000002e mov al, cl 0x00000030 xchg dword ptr [esp+0Ch], ebp 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4D42D0 second address: 4D431F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB0DEE979h 0x00000004 bsr dx, dx 0x00000008 bsf edx, esp 0x0000000b mov edx, 770EE750h 0x00000010 mov ah, dh 0x00000012 push dword ptr [esp+0Ch] 0x00000016 retn 0010h 0x00000019 mov cx, word ptr [ebp+00h] 0x0000001d mov eax, E6083829h 0x00000022 jmp 00007F8AB0DEE962h 0x00000024 pushfd 0x00000025 rcl dl, cl 0x00000027 jnl 00007F8AB0DEE9ABh 0x00000029 xchg dx, ax 0x0000002c jmp 00007F8AB0DEE9D1h 0x0000002e sub ebp, 02h 0x00000031 xchg dh, dl 0x00000033 lea edx, dword ptr [ebx-0000352Ah] 0x00000039 mov dx, D04Ah 0x0000003d rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4D431F second address: 4D4367 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB1593EE0h 0x00000004 add word ptr [ebp+04h], cx 0x00000008 not eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4E9BCB second address: 4E9CC4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB0DEE92Dh 0x00000004 not dword ptr [ebp+00h] 0x00000007 mov ax, CF5Ah 0x0000000b push ecx 0x0000000c shr dh, 00000005h 0x0000000f jmp 00007F8AB0DEE9C0h 0x00000011 jle 00007F8AB0DEE966h 0x00000013 mov cx, word ptr [ebp+00h] 0x00000017 add eax, 9FCEE7F0h 0x0000001c jnc 00007F8AB0DEE96Dh 0x0000001e jc 00007F8AB0DEE96Bh 0x00000020 call 00007F8AB0DEE966h 0x00000025 pop dx 0x00000027 jmp 00007F8AB0DEE91Fh 0x00000029 mov dh, al 0x0000002b lea esp, dword ptr [esp+02h] 0x0000002f jmp 00007F8AB0DEE97Dh 0x00000031 sub ebp, 02h 0x00000034 mov dx, 8960h 0x00000038 xchg eax, edx 0x00000039 mov edx, dword ptr [esp] 0x0000003c jmp 00007F8AB0DEE9A0h 0x0000003e or word ptr [ebp+04h], cx 0x00000042 xchg ax, dx 0x00000044 lea edx, dword ptr [edx-00000AEDh] 0x0000004a mov ax, word ptr [esp] 0x0000004e jmp 00007F8AB0DEE91Eh 0x00000050 pushfd 0x00000051 pop dword ptr [ebp+00h] 0x00000054 lea edx, dword ptr [00000000h+edx*4] 0x0000005b mov edx, 457163FEh 0x00000060 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 48AF3C second address: 48B06E instructions: 0x00000000 rdtsc 0x00000002 lea esp, dword ptr [esp+03h] 0x00000006 call 00007F8AB1593E81h 0x0000000b jmp 00007F8AB1593EC5h 0x0000000d sub esp, 02h 0x00000010 neg ax 0x00000013 xchg dx, ax 0x00000016 rol edx, 1Ah 0x00000019 lea esp, dword ptr [esp+02h] 0x0000001d xchg dword ptr [esp], esi 0x00000020 jmp 00007F8AB1593EB7h 0x00000022 xchg ax, dx 0x00000024 sub esp, 04h 0x00000027 btr dx, bx 0x0000002b xchg word ptr [esp+01h], dx 0x00000030 mov dx, word ptr [esp+02h] 0x00000035 lea esi, dword ptr [esi+67h] 0x00000038 jmp 00007F8AB1593EF2h 0x0000003a lea eax, dword ptr [00000000h+ebp*4] 0x00000041 mov dh, ah 0x00000043 mov eax, esp 0x00000045 sub esp, 15h 0x00000048 lea esp, dword ptr [esp+01h] 0x0000004c xchg dword ptr [esp+18h], esi 0x00000050 jmp 00007F8AB1593E74h 0x00000052 mov ah, byte ptr [esp] 0x00000055 pushad 0x00000056 push ecx 0x00000057 push dword ptr [esp+3Ch] 0x0000005b retn 0040h 0x0000005e xor cl, FFFFFFC2h 0x00000061 bsr eax, ebx 0x00000064 jmp 00007F8AB1593EF1h 0x00000066 jp 00007F8AB1593EB6h 0x00000068 mov ax, si 0x0000006b mov dx, word ptr [esp] 0x0000006f jmp 00007F8AB1593F00h 0x00000071 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4E9C00 second address: 4E9D14 instructions: 0x00000000 rdtsc 0x00000002 call 00007F8AB0DEE934h 0x00000007 mov ecx, ebx 0x00000009 shr dh, 00000004h 0x0000000c mov ecx, EECE932Dh 0x00000011 mov dx, word ptr [esp] 0x00000015 jmp 00007F8AB0DEEA94h 0x0000001a xchg dword ptr [esp], esi 0x0000001d xchg edx, ecx 0x0000001f mov ax, di 0x00000022 lea edx, dword ptr [edx+edi] 0x00000025 mov dx, si 0x00000028 lea esi, dword ptr [esi-0000005Dh] 0x0000002e jmp 00007F8AB0DEE908h 0x00000030 dec ax 0x00000032 lea ecx, dword ptr [F092C92Eh] 0x00000038 xchg dword ptr [esp], esi 0x0000003b mov ecx, dword ptr [esp] 0x0000003e not eax 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4E9D14 second address: 4E9CC4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB1593E22h 0x00000004 push dword ptr [esp] 0x00000007 retn 0004h 0x0000000a not dword ptr [ebp+00h] 0x0000000d mov ax, CF5Ah 0x00000011 push ecx 0x00000012 shr dh, 00000005h 0x00000015 jmp 00007F8AB1593F10h 0x00000017 jle 00007F8AB1593EB6h 0x00000019 mov cx, word ptr [ebp+00h] 0x0000001d add eax, 9FCEE7F0h 0x00000022 jnc 00007F8AB1593EBDh 0x00000024 call 00007F8AB1593EB6h 0x00000029 pop dx 0x0000002b jmp 00007F8AB1593E6Fh 0x0000002d mov dh, al 0x0000002f lea esp, dword ptr [esp+02h] 0x00000033 jmp 00007F8AB1593ECDh 0x00000035 sub ebp, 02h 0x00000038 mov dx, 8960h 0x0000003c xchg eax, edx 0x0000003d mov edx, dword ptr [esp] 0x00000040 jmp 00007F8AB1593EF0h 0x00000042 or word ptr [ebp+04h], cx 0x00000046 xchg ax, dx 0x00000048 lea edx, dword ptr [edx-00000AEDh] 0x0000004e mov ax, word ptr [esp] 0x00000052 jmp 00007F8AB1593E6Eh 0x00000054 pushfd 0x00000055 pop dword ptr [ebp+00h] 0x00000058 lea edx, dword ptr [00000000h+edx*4] 0x0000005f mov edx, 457163FEh 0x00000064 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 52A404 second address: 52A493 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 mov ax, word ptr [esp+01h] 0x00000008 lea edx, dword ptr [esi+45980130h] 0x0000000e mov dword ptr [esp], edi 0x00000011 jmp 00007F8AB0DEE922h 0x00000013 mov dx, word ptr [esp] 0x00000017 mov ax, 82A6h 0x0000001b mov dl, ah 0x0000001d jmp 00007F8AB0DEEB13h 0x00000022 lea edi, dword ptr [00000000h+ecx*4] 0x00000029 mov dx, word ptr [esp] 0x0000002d lea eax, dword ptr [esp+69177B39h] 0x00000034 pop edi 0x00000035 mov ax, bp 0x00000038 setle dl 0x0000003b jmp 00007F8AB0DEE810h 0x00000040 not dx 0x00000043 push edx 0x00000044 xchg dh, al 0x00000046 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 52A493 second address: 52A499 instructions: 0x00000000 rdtsc 0x00000002 push word ptr [esp] 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 52D0C3 second address: 52D156 instructions: 0x00000000 rdtsc 0x00000002 lea eax, dword ptr [ebp+1Eh] 0x00000005 bsf bp, sp 0x00000009 pop dx 0x0000000b jmp 00007F8AB0DEE927h 0x0000000d mov edi, 6144D9A9h 0x00000012 mov word ptr [esp+01h], bx 0x00000017 add esp, 01h 0x0000001a jmp 00007F8AB0DEE96Eh 0x0000001c lea ecx, dword ptr [ecx+3F6DD35Ch] 0x00000022 lea esi, dword ptr [esp+0000F508h] 0x00000029 mov byte ptr [esp], dl 0x0000002c mov eax, dword ptr [esp] 0x0000002f not cl 0x00000031 mov ebp, dword ptr [esp] 0x00000034 jmp 00007F8AB0DEE9EBh 0x00000039 xchg ebp, esi 0x0000003b mov byte ptr [esp+01h], cl 0x0000003f mov dx, word ptr [esp] 0x00000043 mov dh, 38h 0x00000045 mov di, word ptr [esp] 0x00000049 sub esp, 14h 0x0000004c jmp 00007F8AB0DEE8F0h 0x0000004e xchg bp, dx 0x00000051 pop word ptr [esp+12h] 0x00000056 push word ptr [esp+03h] 0x0000005b pop edi 0x0000005c cmc 0x0000005d mov si, dx 0x00000060 jmp 00007F8AB0DEE91Eh 0x00000062 cmc 0x00000063 push dword ptr [esp+03h] 0x00000067 cld 0x00000068 add esp, 06h 0x0000006b neg dh 0x0000006d pop eax 0x0000006e jmp 00007F8AB0DEE98Eh 0x00000070 sub esp, 11h 0x00000073 mov word ptr [esp+18h], bp 0x00000078 pop dword ptr [esp+13h] 0x0000007c cpuid 0x0000007e push dword ptr [esp+19h] 0x00000082 cpuid 0x00000084 jmp 00007F8AB0DEE926h 0x00000086 dec cx 0x00000088 xchg bp, di 0x0000008b or dh, FFFFFFF5h 0x0000008e pop cx 0x00000090 pop cx 0x00000092 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 52D156 second address: 52D1B0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB1594038h 0x00000007 clc 0x00000008 rcl di, cl 0x0000000b bts ax, di 0x0000000f shl al, 00000000h 0x00000012 lea edx, dword ptr [00000000h+eax*4] 0x00000019 bswap esi 0x0000001b jmp 00007F8AB1593D84h 0x00000020 mov ebx, BC6819FEh 0x00000025 mov ebp, dword ptr [esp+15h] 0x00000029 mov cl, ah 0x0000002b btr ax, di 0x0000002f xchg dword ptr [esp+12h], edi 0x00000033 add ah, cl 0x00000035 jmp 00007F8AB1593E51h 0x00000037 not ah 0x00000039 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 52D48E second address: 52D476 instructions: 0x00000000 rdtsc 0x00000002 mov ah, byte ptr [esp] 0x00000005 mov dh, byte ptr [esp] 0x00000008 jmp 00007F8AB1593E7Ah 0x0000000a mov al, byte ptr [esp] 0x0000000d lea esp, dword ptr [esp] 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 52D476 second address: 52D543 instructions: 0x00000000 rdtsc 0x00000002 dec cl 0x00000004 not edx 0x00000006 std 0x00000007 jmp 00007F8AB0DEF090h 0x0000000c mov byte ptr [esp], bl 0x0000000f neg al 0x00000011 pushad 0x00000012 mov ebx, esi 0x00000014 xchg bp, bx 0x00000017 mov al, 3Bh 0x00000019 jmp 00007F8AB0DEE2C3h 0x0000001e stc 0x0000001f pop edi 0x00000020 xchg dword ptr [esp+07h], ebp 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 52D543 second address: 52D798 instructions: 0x00000000 rdtsc 0x00000002 bt edx, ecx 0x00000005 sub esp, 10h 0x00000008 jmp 00007F8AB1593E33h 0x0000000a xchg word ptr [esp+26h], si 0x0000000f lea ebx, dword ptr [00000000h+esi*4] 0x00000016 setnl dh 0x00000019 mov word ptr [esp+29h], cx 0x0000001e lea ecx, dword ptr [00000000h+eax*4] 0x00000025 lea eax, dword ptr [esp-000000ECh] 0x0000002c jmp 00007F8AB1593E52h 0x0000002e lea edi, dword ptr [esi+ebp] 0x00000031 std 0x00000032 xchg word ptr [esp+01h], bx 0x00000037 cld 0x00000038 mov ecx, ebp 0x0000003a mov dx, bp 0x0000003d jmp 00007F8AB1593EA6h 0x0000003f xchg dword ptr [esp+03h], esi 0x00000043 mov byte ptr [esp+19h], dl 0x00000047 call 00007F8AB1593EE9h 0x0000004c xchg cx, bx 0x0000004f popad 0x00000050 push word ptr [esp+08h] 0x00000055 pop ebx 0x00000056 jmp 00007F8AB1593E80h 0x00000058 cpuid 0x0000005a pop dx 0x0000005c sub esp, 00000000h 0x0000005f xchg dword ptr [esp+06h], eax 0x00000063 sbb bx, 6906h 0x00000068 jmp 00007F8AB1593EB2h 0x0000006a mov di, word ptr [esp+07h] 0x0000006f call 00007F8AB15941CEh 0x00000074 mov di, word ptr [esp+01h] 0x00000079 lea edx, dword ptr [ebp+00002BDCh] 0x0000007f pushfd 0x00000080 mov di, ax 0x00000083 pop word ptr [esp+0Fh] 0x00000088 jmp 00007F8AB1593DBEh 0x0000008d bsf bp, sp 0x00000091 xchg word ptr [esp+0Eh], bp 0x00000096 pop bp 0x00000098 mov ch, 02h 0x0000009a mov ch, dl 0x0000009c rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 52D798 second address: 52D551 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB0DEE75Eh 0x00000007 xchg dh, al 0x00000009 mov bx, cx 0x0000000c lea esi, dword ptr [ebx-7Fh] 0x0000000f pop si 0x00000011 mov ax, 8CB8h 0x00000015 lea edi, dword ptr [esp+0000A102h] 0x0000001c jmp 00007F8AB0DEE8FEh 0x0000001e rcr dl, 00000007h 0x00000021 xchg bp, cx 0x00000024 btc bp, di 0x00000028 lea ebx, dword ptr [edi+000012C5h] 0x0000002e pop bp 0x00000030 bsr bp, cx 0x00000034 jmp 00007F8AB0DEE91Ch 0x00000036 mov dx, D781h 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 52D551 second address: 52D6C5 instructions: 0x00000000 rdtsc 0x00000002 std 0x00000003 mov ch, byte ptr [esp+0Ah] 0x00000007 mov al, byte ptr [esp+05h] 0x0000000b mov byte ptr [esp+06h], dl 0x0000000f jmp 00007F8AB1593EC3h 0x00000011 pop edx 0x00000012 pop word ptr [esp+01h] 0x00000017 call 00007F8AB1593EA6h 0x0000001c mov eax, ebp 0x0000001e mov bh, AAh 0x00000020 mov bl, ah 0x00000022 add esp, 03h 0x00000025 jmp 00007F8AB1593EDDh 0x00000027 mov edi, dword ptr [esp+01h] 0x0000002b not ax 0x0000002e pop edi 0x0000002f mov edi, ebp 0x00000031 ror al, cl 0x00000033 bt edx, ebp 0x00000036 jmp 00007F8AB1593E7Bh 0x00000038 push word ptr [esp+03h] 0x0000003d cld 0x0000003e dec dl 0x00000040 mov ah, bl 0x00000042 pop word ptr [esp+01h] 0x00000047 jmp 00007F8AB1593F97h 0x0000004c rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 52D6C5 second address: 52D667 instructions: 0x00000000 rdtsc 0x00000002 xchg bp, ax 0x00000005 lea esi, dword ptr [eax-000000E4h] 0x0000000b pop word ptr [esp] 0x0000000f clc 0x00000010 mov bp, sp 0x00000013 jmp 00007F8AB0DEE8A8h 0x00000018 push word ptr [esp] 0x0000001c mov eax, dword ptr [esp+02h] 0x00000020 mov byte ptr [esp+02h], cl 0x00000024 setp bh 0x00000027 xchg ebp, eax 0x00000029 xchg eax, ebx 0x0000002a jmp 00007F8AB0DEE90Ah 0x0000002c xchg dh, ah 0x0000002e sub esp, 1Eh 0x00000031 mov byte ptr [esp+12h], cl 0x00000035 xchg byte ptr [esp+1Eh], cl 0x00000039 not bh 0x0000003b mov byte ptr [esp+0Ah], bl 0x0000003f jmp 00007F8AB0DEE927h 0x00000041 lea eax, dword ptr [66EDA811h] 0x00000047 lea edi, dword ptr [00000000h+ebx*4] 0x0000004e popad 0x0000004f stc 0x00000050 jmp 00007F8AB0DEE96Ch 0x00000052 mov ecx, dword ptr [esp] 0x00000055 push cx 0x00000057 xchg bx, cx 0x0000005a add esp, 02h 0x0000005d mov word ptr [esp], di 0x00000061 std 0x00000062 jmp 00007F8AB0DEE989h 0x00000064 bsr bp, ax 0x00000068 clc 0x00000069 setbe bh 0x0000006c sub esp, 1Fh 0x0000006f mov ah, dl 0x00000071 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 52D667 second address: 52D64F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB1593E7Bh 0x00000004 lea edi, dword ptr [esi-0000E5A0h] 0x0000000a cmc 0x0000000b not bh 0x0000000d cpuid 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 52DA6F second address: 52DAB0 instructions: 0x00000000 rdtsc 0x00000002 not bl 0x00000004 lea edx, dword ptr [00000000h+edi*4] 0x0000000b cpuid 0x0000000d cpuid 0x0000000f mov eax, edx 0x00000011 jmp 00007F8AB0DEE913h 0x00000013 cpuid 0x00000015 bt edi, esi 0x00000018 mov di, 4DFBh 0x0000001c bsr edi, edi 0x0000001f btr edx, esi 0x00000022 inc eax 0x00000023 call 00007F8AB0DEE956h 0x00000028 jmp 00007F8AB0DEE98Fh 0x0000002a not ah 0x0000002c mov byte ptr [esp+01h], ch 0x00000030 sub esp, 04h 0x00000033 mov bl, byte ptr [esp+02h] 0x00000037 neg ecx 0x00000039 mov cx, 9377h 0x0000003d jmp 00007F8AB0DEE927h 0x0000003f cpuid 0x00000041 bsf eax, eax 0x00000044 neg bx 0x00000047 xchg eax, ebp 0x00000048 mov si, E8D3h 0x0000004c mov bp, dx 0x0000004f jmp 00007F8AB0DEE981h 0x00000051 clc 0x00000052 xchg dword ptr [esp+01h], edx 0x00000056 push di 0x00000058 sub esp, 00000000h 0x0000005b sub esp, 12h 0x0000005e clc 0x0000005f jmp 00007F8AB0DEE92Ch 0x00000061 bsr ebx, ebp 0x00000064 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 52E047 second address: 52DC15 instructions: 0x00000000 rdtsc 0x00000002 pop di 0x00000004 cld 0x00000005 rol eax, 07h 0x00000008 mov bx, word ptr [esp] 0x0000000c jmp 00007F8AB1593D26h 0x00000011 xchg ebp, esi 0x00000013 mov dl, cl 0x00000015 push word ptr [esp+01h] 0x0000001a not bh 0x0000001c xchg word ptr [esp], si 0x00000020 bswap ecx 0x00000022 jmp 00007F8AB1593C93h 0x00000027 inc edx 0x00000028 xchg dh, ch 0x0000002a lea esp, dword ptr [esp+04h] 0x0000002e xchg ebx, esi 0x00000030 mov bl, D7h 0x00000032 xchg ebx, edi 0x00000034 jmp 00007F8AB1593E34h 0x00000036 setb ch 0x00000039 dec bx 0x0000003b call 00007F8AB1593E15h 0x00000040 xchg bp, cx 0x00000043 lea esp, dword ptr [esp+01h] 0x00000047 mov word ptr [esp+01h], si 0x0000004c lea esp, dword ptr [esp+03h] 0x00000050 jmp 00007F8AB1593E67h 0x00000052 lea esi, dword ptr [esp+000000B2h] 0x00000059 sete al 0x0000005c stc 0x0000005d std 0x0000005e xchg al, cl 0x00000060 call 00007F8AB1593EF4h 0x00000065 pushfd 0x00000066 jmp 00007F8AB1593E50h 0x00000068 pop word ptr [esp+04h] 0x0000006d mov al, dh 0x0000006f setl dh 0x00000072 sub esp, 0Dh 0x00000075 bsr esi, esp 0x00000078 jmp 00007F8AB1593EB8h 0x0000007a mov ecx, edx 0x0000007c lea ebp, dword ptr [B1C33945h] 0x00000082 xchg di, bp 0x00000085 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 52DF76 second address: 52E073 instructions: 0x00000000 rdtsc 0x00000002 xchg di, si 0x00000005 bswap edi 0x00000007 jmp 00007F8AB0DEE927h 0x00000009 xchg ch, ah 0x0000000b mov si, word ptr [esp] 0x0000000f mov bx, 90E2h 0x00000013 mov edx, ebp 0x00000015 mov ecx, esp 0x00000017 call 00007F8AB0DEE983h 0x0000001c push dword ptr [esp+02h] 0x00000020 jmp 00007F8AB0DEE936h 0x00000022 not ch 0x00000024 lea ebx, dword ptr [ecx+000000A1h] 0x0000002a mov al, DDh 0x0000002c pop word ptr [esp+02h] 0x00000031 jmp 00007F8AB0DEE95Dh 0x00000033 mov bh, ch 0x00000035 lea esi, dword ptr [00000000h+ebx*4] 0x0000003c mov word ptr [esp+03h], si 0x00000041 mov esi, 2CA17698h 0x00000046 bswap ecx 0x00000048 push word ptr [esp+02h] 0x0000004d jmp 00007F8AB0DEE992h 0x0000004f mov dh, byte ptr [esp+02h] 0x00000053 push dword ptr [esp+06h] 0x00000057 lea esp, dword ptr [esp+0Ah] 0x0000005b xchg word ptr [esp], bp 0x0000005f xchg ax, di 0x00000061 push word ptr [esp] 0x00000065 call 00007F8AB0DEE91Fh 0x0000006a jmp 00007F8AB0DEE99Ch 0x0000006c pop word ptr [esp+01h] 0x00000071 mov byte ptr [esp+02h], bl 0x00000075 call 00007F8AB0DEE8FDh 0x0000007a bswap edi 0x0000007c xchg edi, ecx 0x0000007e mov dl, byte ptr [esp+01h] 0x00000082 xchg ebx, eax 0x00000084 jmp 00007F8AB0DEE97Ah 0x00000086 mov cx, 439Eh 0x0000008a xchg word ptr [esp+05h], bx 0x0000008f push word ptr [esp+05h] 0x00000094 call 00007F8AB0DEE9A2h 0x00000099 pop ecx 0x0000009a rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 52E68E second address: 52E69B instructions: 0x00000000 rdtsc 0x00000002 xchg word ptr [esp+03h], dx 0x00000007 xchg bl, ah 0x00000009 jmp 00007F8AB1593E64h 0x0000000b mov dl, bl 0x0000000d pop dx 0x0000000f call 00007F8AB1593E86h 0x00000014 push dword ptr [esp+03h] 0x00000018 cpuid 0x0000001a lea edx, dword ptr [00000000h+ebx*4] 0x00000021 not bx 0x00000024 jmp 00007F8AB1593EAFh 0x00000026 lea esi, dword ptr [esp+0000F8EDh] 0x0000002d xchg byte ptr [esp+0Dh], dh 0x00000031 mov edx, dword ptr [esp+0Eh] 0x00000035 cpuid 0x00000037 lea esp, dword ptr [esp+01h] 0x0000003b pushad 0x0000003c jmp 00007F8AB1593EBFh 0x0000003e pop si 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 487106 second address: 487356 instructions: 0x00000000 rdtsc 0x00000002 bsr cx, ax 0x00000006 jno 00007F8AB1593EBBh 0x00000008 jmp 00007F8AB1593EC0h 0x0000000a xchg cl, ah 0x0000000c mov ah, byte ptr [esp] 0x0000000f jmp 00007F8AB1593ECFh 0x00000011 neg esi 0x00000013 sub esp, 0Bh 0x00000016 jp 00007F8AB1593E85h 0x00000018 lea eax, dword ptr [ebx+edi] 0x0000001b jmp 00007F8AB1593F2Bh 0x00000020 not dx 0x00000023 bswap eax 0x00000025 mov cx, E141h 0x00000029 jmp 00007F8AB1593ED0h 0x0000002b add esp, 03h 0x0000002e jmp 00007F8AB1593E87h 0x00000030 lea esp, dword ptr [esp+08h] 0x00000034 neg esi 0x00000036 sub esp, 0Bh 0x00000039 jc 00007F8AB1593EB2h 0x0000003b jnc 00007F8AB1593EF4h 0x0000003d pop word ptr [esp] 0x00000041 setns cl 0x00000044 xchg dword ptr [esp+03h], eax 0x00000048 jmp 00007F8AB1593E7Fh 0x0000004a lea eax, dword ptr [ecx+esi] 0x0000004d mov cl, 09h 0x0000004f jmp 00007F8AB1593EBEh 0x00000051 mov cl, byte ptr [esp] 0x00000054 lea esp, dword ptr [esp+01h] 0x00000058 lea esp, dword ptr [esp+08h] 0x0000005c add esi, 395AD57Fh 0x00000062 cmp ax, 0000A1BFh 0x00000066 jmp 00007F8AB1593ED1h 0x00000068 jbe 00007F8AB1593F11h 0x0000006a rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 487356 second address: 4872F6 instructions: 0x00000000 rdtsc 0x00000002 mov ecx, 765D225Fh 0x00000007 mov ecx, FC5B28A4h 0x0000000c bsr ax, si 0x00000010 sub esi, 68829BC1h 0x00000016 mov dx, word ptr [esp] 0x0000001a jmp 00007F8AB0DEE8E6h 0x0000001c mov dh, byte ptr [esp] 0x0000001f mov al, 1Ah 0x00000021 lea ecx, dword ptr [eax+edx] 0x00000024 setb dh 0x00000027 mov eax, dword ptr [esp] 0x0000002a lea edx, dword ptr [esp+ebx] 0x0000002d jmp 00007F8AB0DEE929h 0x0000002f dec esi 0x00000030 rcr dl, 00000006h 0x00000033 jc 00007F8AB0DEE98Bh 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 49799B second address: 497A16 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB1593EA6h 0x00000004 lea ecx, dword ptr [ecx+edi] 0x00000007 lea edx, dword ptr [00000000h+ebx*4] 0x0000000e jmp 00007F8AB1593F85h 0x00000013 mov esi, dword ptr [ebp+00h] 0x00000016 mov ecx, edx 0x00000018 mov edx, 8EB07D69h 0x0000001d stc 0x0000001e jns 00007F8AB1593E3Fh 0x00000020 jmp 00007F8AB1593E49h 0x00000022 rcl ch, 00000000h 0x00000025 add ebp, 04h 0x00000028 bsf ax, ax 0x0000002c je 00007F8AB1593E80h 0x0000002e lea edx, dword ptr [eax+eax] 0x00000031 mov ch, bh 0x00000033 jmp 00007F8AB1593EC0h 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 48ADEA second address: 48AE34 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB0DEE992h 0x00000004 mov ax, C344h 0x00000008 bswap eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 48AFA8 second address: 48B06E instructions: 0x00000000 rdtsc 0x00000002 lea esp, dword ptr [esp+03h] 0x00000006 xor cl, FFFFFFC2h 0x00000009 bsr eax, ebx 0x0000000c jmp 00007F8AB1593EF1h 0x0000000e jp 00007F8AB1593EB6h 0x00000010 mov ax, si 0x00000013 mov dx, word ptr [esp] 0x00000017 jmp 00007F8AB1593F00h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 48B06E second address: 48B186 instructions: 0x00000000 rdtsc 0x00000002 and eax, ebx 0x00000004 bsr edx, esp 0x00000007 jmp 00007F8AB0DEE904h 0x00000009 bswap edx 0x0000000b jmp 00007F8AB0DEE968h 0x0000000d dec cl 0x0000000f bsr dx, bp 0x00000013 jmp 00007F8AB0DEE9A2h 0x00000015 je 00007F8AB0DEE904h 0x00000017 setp al 0x0000001a mov edx, eax 0x0000001c jmp 00007F8AB0DEE902h 0x0000001e call 00007F8AB0DEE9A0h 0x00000023 mov eax, 4B8EAC0Fh 0x00000028 mov dx, di 0x0000002b adc dx, 1AB4h 0x00000030 rcr al, 00000002h 0x00000033 xchg dword ptr [esp], ebx 0x00000036 jmp 00007F8AB0DEE984h 0x00000038 lea edx, dword ptr [00000000h+ebx*4] 0x0000003f btc dx, bx 0x00000043 mov dh, 6Ch 0x00000045 mov dx, B473h 0x00000049 bts dx, sp 0x0000004d lea ebx, dword ptr [ebx+1Eh] 0x00000050 jmp 00007F8AB0DEECE1h 0x00000055 mov dl, B7h 0x00000057 lea edx, dword ptr [edx+ebx] 0x0000005a bswap edx 0x0000005c mov dx, word ptr [esp] 0x00000060 bts edx, edi 0x00000063 xchg dword ptr [esp], ebx 0x00000066 jmp 00007F8AB0DEE7BFh 0x0000006b bsr dx, sp 0x0000006f mov ax, word ptr [esp] 0x00000073 xchg ah, dh 0x00000075 mov ax, 08E7h 0x00000079 mov dx, cx 0x0000007c push dword ptr [esp] 0x0000007f retn 0004h 0x00000082 and ecx, 3Ch 0x00000085 jmp 00007F8AB0DEEA57h 0x0000008a mov al, byte ptr [esp] 0x0000008d mov eax, esi 0x0000008f rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 48B47B second address: 48B569 instructions: 0x00000000 rdtsc 0x00000002 rcr dl, cl 0x00000004 jmp 00007F8AB1593F58h 0x00000009 inc ebp 0x0000000a sub esp, 04h 0x0000000d jl 00007F8AB1593E84h 0x0000000f mov edx, edi 0x00000011 pushfd 0x00000012 lea eax, dword ptr [00000000h+eax*4] 0x00000019 mov eax, dword ptr [esp] 0x0000001c jmp 00007F8AB1593F25h 0x00000021 neg eax 0x00000023 jmp 00007F8AB1593E21h 0x00000028 mov al, ah 0x0000002a setbe al 0x0000002d shl dx, 1 0x00000030 jl 00007F8AB1593EE3h 0x00000032 setle dh 0x00000035 bt ax, sp 0x00000039 xor cl, 0000003Eh 0x0000003c bswap eax 0x0000003e jmp 00007F8AB1593E55h 0x00000040 mov dx, 1CAEh 0x00000044 lea edx, dword ptr [00000000h+ebp*4] 0x0000004b rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 48A5A2 second address: 48A562 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB0DEEA33h 0x00000007 jmp 00007F8AB0DEE81Bh 0x0000000c ror cl, 00000000h 0x0000000f mov eax, FED2A885h 0x00000014 lea edx, dword ptr [eax+00004342h] 0x0000001a mov al, 8Bh 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 497AC6 second address: 497BD9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB1593F01h 0x00000004 sub esi, 04h 0x00000007 mov dx, 73F9h 0x0000000b mov ax, E32Dh 0x0000000f rcl ax, cl 0x00000012 jnl 00007F8AB1593E72h 0x00000014 jmp 00007F8AB1593EDAh 0x00000016 bsr edx, esi 0x00000019 mov ecx, dword ptr [ebp+00h] 0x0000001c mov dx, bx 0x0000001f bsr ax, dx 0x00000023 jmp 00007F8AB1593F69h 0x00000028 ja 00007F8AB1593D92h 0x0000002e lea eax, dword ptr [esi+54h] 0x00000031 lea edx, dword ptr [esp+eax] 0x00000034 mov al, dh 0x00000036 bsr ax, bx 0x0000003a lea eax, dword ptr [esp+edi] 0x0000003d bswap eax 0x0000003f call 00007F8AB1593EEDh 0x00000044 sub esp, 01h 0x00000047 mov dx, ax 0x0000004a xchg byte ptr [esp], al 0x0000004d mov byte ptr [esp], bl 0x00000050 mov byte ptr [esp], al 0x00000053 jmp 00007F8AB1593ED3h 0x00000055 lea esp, dword ptr [esp+01h] 0x00000059 xchg dword ptr [esp], edi 0x0000005c neg dx 0x0000005f mov eax, esi 0x00000061 lea edx, dword ptr [FA2511AAh] 0x00000067 jmp 00007F8AB1593E78h 0x00000069 mov eax, 5C79E6DCh 0x0000006e call 00007F8AB1593EF0h 0x00000073 lea edi, dword ptr [edi+5Eh] 0x00000076 mov edx, esi 0x00000078 dec dx 0x0000007a lea edx, dword ptr [ecx-3Bh] 0x0000007d or eax, 50115FD1h 0x00000082 jmp 00007F8AB1593E79h 0x00000084 sete dh 0x00000087 xchg dword ptr [esp+04h], edi 0x0000008b rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 49928B second address: 4992AB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB0DEE96Bh 0x00000004 push esi 0x00000005 mov ch, B9h 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4992AB second address: 499323 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov byte ptr [esp+1Ah], bh 0x00000007 jmp 00007F8AB1593EEDh 0x00000009 btr esi, esi 0x0000000c jbe 00007F8AB1593E87h 0x0000000e neg ebx 0x00000010 mov eax, dword ptr [esp] 0x00000013 jmp 00007F8AB1593EC1h 0x00000015 add esp, 20h 0x00000018 jmp 00007F8AB159487Fh 0x0000001d jns 00007F8AB15934C7h 0x00000023 pop edi 0x00000024 mov dx, di 0x00000027 lea ebx, dword ptr [00000000h+eax*4] 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4A94F0 second address: 4A999D instructions: 0x00000000 rdtsc 0x00000002 not dx 0x00000005 btr eax, esi 0x00000008 jnc 00007F8AB0DEEDF0h 0x0000000e jc 00007F8AB0DEEAE6h 0x00000014 shr dh, 1 0x00000016 jmp 00007F8AB0DEEC54h 0x0000001b sub ebp, 04h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 48B022 second address: 48B186 instructions: 0x00000000 rdtsc 0x00000002 and eax, ebx 0x00000004 bsr edx, esp 0x00000007 bswap edx 0x00000009 jmp 00007F8AB1593EB8h 0x0000000b dec cl 0x0000000d bsr dx, bp 0x00000011 jmp 00007F8AB1593EF2h 0x00000013 je 00007F8AB1593E54h 0x00000015 setp al 0x00000018 mov edx, eax 0x0000001a jmp 00007F8AB1593E52h 0x0000001c call 00007F8AB1593EF0h 0x00000021 mov eax, 4B8EAC0Fh 0x00000026 mov dx, di 0x00000029 adc dx, 1AB4h 0x0000002e rcr al, 00000002h 0x00000031 xchg dword ptr [esp], ebx 0x00000034 jmp 00007F8AB1593ED4h 0x00000036 lea edx, dword ptr [00000000h+ebx*4] 0x0000003d btc dx, bx 0x00000041 mov dh, 6Ch 0x00000043 mov dx, B473h 0x00000047 bts dx, sp 0x0000004b lea ebx, dword ptr [ebx+1Eh] 0x0000004e jmp 00007F8AB1594231h 0x00000053 mov dl, B7h 0x00000055 lea edx, dword ptr [edx+ebx] 0x00000058 bswap edx 0x0000005a mov dx, word ptr [esp] 0x0000005e bts edx, edi 0x00000061 xchg dword ptr [esp], ebx 0x00000064 jmp 00007F8AB1593D0Fh 0x00000069 bsr dx, sp 0x0000006d mov ax, word ptr [esp] 0x00000071 xchg ah, dh 0x00000073 mov ax, 08E7h 0x00000077 mov dx, cx 0x0000007a push dword ptr [esp] 0x0000007d retn 0004h 0x00000080 and ecx, 3Ch 0x00000083 jmp 00007F8AB1593FA7h 0x00000088 mov al, byte ptr [esp] 0x0000008b mov eax, esi 0x0000008d rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 49901A second address: 499086 instructions: 0x00000000 rdtsc 0x00000002 dec dh 0x00000004 jmp 00007F8AB0DEE97Ch 0x00000006 add cl, FFFFFFA1h 0x00000009 xchg ah, al 0x0000000b bsr edx, edi 0x0000000e jnbe 00007F8AB0DEE983h 0x00000010 xchg eax, edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 49B208 second address: 4870FE instructions: 0x00000000 rdtsc 0x00000002 add ecx, E346A1A5h 0x00000008 push dword ptr [esp+1Ch] 0x0000000c retn 0020h 0x0000000f push esi 0x00000010 jmp 00007F8AB1593F18h 0x00000012 and edx, D81356B1h 0x00000018 jnp 00007F8AB1593F02h 0x0000001a mov dx, word ptr [esp] 0x0000001e mov ah, 72h 0x00000020 jmp 00007F8AB1593E76h 0x00000022 mov ecx, ebx 0x00000024 mov edx, 568228A5h 0x00000029 jmp 00007F8AB1593EE9h 0x0000002b mov cx, word ptr [esp] 0x0000002f pop ebp 0x00000030 lea eax, dword ptr [ebx+esi] 0x00000033 not ax 0x00000036 jmp 00007F8AB1593E71h 0x00000038 bts si, dx 0x0000003c jle 00007F8AB1593ECDh 0x0000003e mov al, cl 0x00000040 jmp 00007F8AB1593ECBh 0x00000042 pop esi 0x00000043 jmp 00007F8AB157FD52h 0x00000048 mov ebx, esi 0x0000004a mov dh, cl 0x0000004c jmp 00007F8AB1593E59h 0x0000004e rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 49A712 second address: 49A6AB instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 not edx 0x00000005 jmp 00007F8AB0DEE911h 0x00000007 push edi 0x00000008 mov cl, byte ptr [esp] 0x0000000b lea edi, dword ptr [edi-7Bh] 0x0000000e setnle dl 0x00000011 mov edx, 58BD0688h 0x00000016 mov bl, dl 0x00000018 jmp 00007F8AB0DEE907h 0x0000001a cmc 0x0000001b jns 00007F8AB0DEE939h 0x0000001d bswap edi 0x0000001f jmp 00007F8AB0DEE985h 0x00000021 lea ecx, dword ptr [edi+3498DDEDh] 0x00000027 push esp 0x00000028 mov esi, dword ptr [esp+04h] 0x0000002c btc edx, ebx 0x0000002f jmp 00007F8AB0DEE96Ch 0x00000031 jns 00007F8AB0DEE90Ch 0x00000033 lea esp, dword ptr [esp+08h] 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 499046 second address: 499086 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB1593F1Ah 0x00000004 dec dh 0x00000006 jmp 00007F8AB1593E26h 0x00000008 add cl, FFFFFFA1h 0x0000000b xchg ah, al 0x0000000d bsr edx, edi 0x00000010 jnbe 00007F8AB1593ED3h 0x00000012 xchg eax, edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4A88E9 second address: 4A88F6 instructions: 0x00000000 rdtsc 0x00000002 mov bl, cl 0x00000004 jmp 00007F8AB0DEE979h 0x00000006 jmp 00007F8AB0DEE929h 0x00000008 mov ebp, dword ptr [esp] 0x0000000b lea esp, dword ptr [esp+04h] 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4A88F6 second address: 4A8956 instructions: 0x00000000 rdtsc 0x00000002 mov bx, word ptr [esp] 0x00000006 lea edi, dword ptr [ecx+esi] 0x00000009 call 00007F8AB1593ECFh 0x0000000e jmp 00007F8AB1593E8Ah 0x00000010 add esp, 08h 0x00000013 jle 00007F8AB1593ECBh 0x00000015 jnle 00007F8AB1593EC9h 0x00000017 pop esi 0x00000018 call 00007F8AB1593E89h 0x0000001d mov eax, ebp 0x0000001f neg bx 0x00000022 jmp 00007F8AB1593EF8h 0x00000024 jle 00007F8AB1593E5Fh 0x00000026 jnle 00007F8AB1593E5Dh 0x00000028 add esp, 04h 0x0000002b jmp 00007F8AB1593EC8h 0x0000002d jnbe 00007F8AB1593E7Eh 0x0000002f pop ebx 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4A8956 second address: 4870FE instructions: 0x00000000 rdtsc 0x00000002 call 00007F8AB0DEE99Fh 0x00000007 mov edx, dword ptr [esp+02h] 0x0000000b jmp 00007F8AB0DEE936h 0x0000000d add esp, 04h 0x00000010 jns 00007F8AB0DEE969h 0x00000012 pop edi 0x00000013 jmp 00007F8AB0DCD0E3h 0x00000018 mov ebx, esi 0x0000001a mov dh, cl 0x0000001c jmp 00007F8AB0DEE909h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4992C7 second address: 4992AB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB1593E7Fh 0x00000004 push esi 0x00000005 mov ch, B9h 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4AAC43 second address: 4AAC64 instructions: 0x00000000 rdtsc 0x00000002 xchg cx, dx 0x00000005 jmp 00007F8AB0DEE982h 0x00000007 mov al, dh 0x00000009 xchg dword ptr [esp], esi 0x0000000c setbe ch 0x0000000f mov ch, bl 0x00000011 lea ecx, dword ptr [ebx+54h] 0x00000014 lea esi, dword ptr [esi+27h] 0x00000017 jmp 00007F8AB0DEE92Ah 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4AAC64 second address: 49833F instructions: 0x00000000 rdtsc 0x00000002 xchg al, dl 0x00000004 mov dx, word ptr [esp] 0x00000008 xchg dword ptr [esp], esi 0x0000000b jmp 00007F8AB1593EBDh 0x0000000d lea eax, dword ptr [00000000h+eax*4] 0x00000014 mov dx, word ptr [esp] 0x00000018 mov ah, 97h 0x0000001a not ah 0x0000001c push dword ptr [esp] 0x0000001f retn 0004h 0x00000022 ja 00007F8AB15814F4h 0x00000028 jmp 00007F8AB1593ECDh 0x0000002a movzx ecx, byte ptr [ebp+00h] 0x0000002e sub esp, 00000000h 0x00000031 js 00007F8AB1593E6Eh 0x00000033 rcl dh, cl 0x00000035 jmp 00007F8AB1593F92h 0x0000003a sub esp, 18h 0x0000003d lea eax, dword ptr [eax+ebp] 0x00000040 bswap eax 0x00000042 jmp 00007F8AB1593E48h 0x00000044 bts eax, edx 0x00000047 jmp 00007F8AB1593DD2h 0x0000004c rcl dh, cl 0x0000004e call 00007F8AB1593F00h 0x00000053 mov eax, DD22D1A1h 0x00000058 sub esp, 0Eh 0x0000005b lea esp, dword ptr [esp+06h] 0x0000005f mov ah, dl 0x00000061 xchg eax, edx 0x00000062 jmp 00007F8AB1593ED3h 0x00000064 xchg dword ptr [esp+08h], ebp 0x00000068 bswap edx 0x0000006a mov ah, byte ptr [esp] 0x0000006d lea ebp, dword ptr [ebp+71h] 0x00000070 pushad 0x00000071 lea edx, dword ptr [475C02B4h] 0x00000077 jmp 00007F8AB1593E77h 0x00000079 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4B9816 second address: 4B97DC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB0DEE911h 0x00000004 add ebp, 02h 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4872E7 second address: 4872F6 instructions: 0x00000000 rdtsc 0x00000002 mov ecx, 765D225Fh 0x00000007 jmp 00007F8AB1593E81h 0x00000009 mov ecx, FC5B28A4h 0x0000000e bsr ax, si 0x00000012 jmp 00007F8AB1593F2Eh 0x00000017 sub esi, 68829BC1h 0x0000001d mov dx, word ptr [esp] 0x00000021 jmp 00007F8AB1593E36h 0x00000023 mov dh, byte ptr [esp] 0x00000026 mov al, 1Ah 0x00000028 lea ecx, dword ptr [eax+edx] 0x0000002b setb dh 0x0000002e mov eax, dword ptr [esp] 0x00000031 lea edx, dword ptr [esp+ebx] 0x00000034 jmp 00007F8AB1593E79h 0x00000036 dec esi 0x00000037 rcr dl, 00000006h 0x0000003a jc 00007F8AB1593EDBh 0x0000003c rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4B1379 second address: 4B1387 instructions: 0x00000000 rdtsc 0x00000002 neg edx 0x00000004 js 00007F8AB0DEE936h 0x00000006 call 00007F8AB0DEE98Ch 0x0000000b mov ecx, EEB6F27Eh 0x00000010 mov ecx, dword ptr [ebp+00h] 0x00000013 jmp 00007F8AB0DEE92Ah 0x00000015 mov ax, word ptr [esp] 0x00000019 mov eax, edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4B8CBF second address: 4AAC43 instructions: 0x00000000 rdtsc 0x00000002 call 00007F8AB1593EA6h 0x00000007 mov byte ptr [esp+01h], dl 0x0000000b clc 0x0000000c jmp 00007F8AB1593ED7h 0x0000000e jnl 00007F8AB1593E6Fh 0x00000010 sub esi, 08h 0x00000013 jmp 00007F8AB1593EB8h 0x00000015 xchg edx, ecx 0x00000017 call 00007F8AB1593ED5h 0x0000001c lea esp, dword ptr [esp+01h] 0x00000020 push word ptr [esp] 0x00000024 js 00007F8AB1593E7Bh 0x00000026 jns 00007F8AB1593EC0h 0x00000028 sub esp, 1Ah 0x0000002b lea esp, dword ptr [esp+03h] 0x0000002f jmp 00007F8AB1593E59h 0x00000031 mov dword ptr [esi], ecx 0x00000033 mov cl, ch 0x00000035 jmp 00007F8AB1593EBEh 0x00000037 lea ecx, dword ptr [00000000h+edi*4] 0x0000003e call 00007F8AB1593ED6h 0x00000043 mov byte ptr [esp+01h], dh 0x00000047 mov dword ptr [esi+04h], eax 0x0000004a mov ah, 76h 0x0000004c sub esp, 13h 0x0000004f jmp 00007F8AB1593EA6h 0x00000051 jnbe 00007F8AB1593E78h 0x00000053 xchg byte ptr [esp+0Dh], ch 0x00000057 call 00007F8AB1593FA9h 0x0000005c lea esp, dword ptr [esp+03h] 0x00000060 jmp 00007F8AB1585C4Ah 0x00000065 pushad 0x00000066 push word ptr [esp+06h] 0x0000006b jbe 00007F8AB1593E78h 0x0000006d lea esp, dword ptr [esp+02h] 0x00000071 jmp 00007F8AB1593E7Ch 0x00000073 lea edx, dword ptr [edi+50h] 0x00000076 xchg eax, ecx 0x00000077 mov eax, dword ptr [esp] 0x0000007a stc 0x0000007b jle 00007F8AB1593ED4h 0x0000007d jnle 00007F8AB1593EBCh 0x0000007f cmp esi, edx 0x00000081 call 00007F8AB1593EB6h 0x00000086 lea ecx, dword ptr [00000000h+edx*4] 0x0000008d mov cx, 4E80h 0x00000091 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4A94F0 second address: 4A999D instructions: 0x00000000 rdtsc 0x00000002 not dx 0x00000005 btr eax, esi 0x00000008 jnc 00007F8AB0DEEDF0h 0x0000000e shr dh, 1 0x00000010 sub ebp, 04h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 49B208 second address: 4870FE instructions: 0x00000000 rdtsc 0x00000002 add ecx, E346A1A5h 0x00000008 push dword ptr [esp+1Ch] 0x0000000c retn 0020h 0x0000000f push esi 0x00000010 jmp 00007F8AB1593F18h 0x00000012 and edx, D81356B1h 0x00000018 jnp 00007F8AB1593F02h 0x0000001a mov dx, word ptr [esp] 0x0000001e mov ah, 72h 0x00000020 mov ecx, ebx 0x00000022 jmp 00007F8AB1593EE2h 0x00000024 mov edx, 568228A5h 0x00000029 mov cx, word ptr [esp] 0x0000002d jmp 00007F8AB1593EDDh 0x0000002f pop ebp 0x00000030 lea eax, dword ptr [ebx+esi] 0x00000033 not ax 0x00000036 jmp 00007F8AB1593E71h 0x00000038 bts si, dx 0x0000003c jle 00007F8AB1593ECDh 0x0000003e mov al, cl 0x00000040 jmp 00007F8AB1593ECBh 0x00000042 pop esi 0x00000043 jmp 00007F8AB157FD52h 0x00000048 mov ebx, esi 0x0000004a mov dh, cl 0x0000004c jmp 00007F8AB1593E59h 0x0000004e rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4B1091 second address: 4AAC43 instructions: 0x00000000 rdtsc 0x00000002 rcl edx, cl 0x00000004 jmp 00007F8AB0DEE9AFh 0x00000006 jne 00007F8AB0DEE8F7h 0x00000008 mov ax, ss 0x0000000a lea edx, dword ptr [00000000h+eax*4] 0x00000011 push eax 0x00000012 jmp 00007F8AB0DEE4C3h 0x00000017 pop ss 0x00000018 pushfd 0x00000019 jmp 00007F8AB0DEEE06h 0x0000001e pop dword ptr [esi] 0x00000020 mov ecx, dword ptr [esp] 0x00000023 bt edx, ecx 0x00000026 jmp 00007F8AB0DEE986h 0x00000028 jp 00007F8AB0DEE920h 0x0000002a call 00007F8AB0DEE96Ah 0x0000002f jmp 00007F8AB0DE846Ah 0x00000034 pushad 0x00000035 push word ptr [esp+06h] 0x0000003a jbe 00007F8AB0DEE928h 0x0000003c lea esp, dword ptr [esp+02h] 0x00000040 jmp 00007F8AB0DEE92Ch 0x00000042 lea edx, dword ptr [edi+50h] 0x00000045 xchg eax, ecx 0x00000046 mov eax, dword ptr [esp] 0x00000049 stc 0x0000004a jle 00007F8AB0DEE984h 0x0000004c jnle 00007F8AB0DEE96Ch 0x0000004e cmp esi, edx 0x00000050 call 00007F8AB0DEE966h 0x00000055 lea ecx, dword ptr [00000000h+edx*4] 0x0000005c mov cx, 4E80h 0x00000060 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4E9C00 second address: 4E9D14 instructions: 0x00000000 rdtsc 0x00000002 call 00007F8AB1593E84h 0x00000007 mov ecx, ebx 0x00000009 shr dh, 00000004h 0x0000000c mov ecx, EECE932Dh 0x00000011 mov dx, word ptr [esp] 0x00000015 jmp 00007F8AB1593FE4h 0x0000001a xchg dword ptr [esp], esi 0x0000001d xchg edx, ecx 0x0000001f mov ax, di 0x00000022 lea edx, dword ptr [edx+edi] 0x00000025 mov dx, si 0x00000028 lea esi, dword ptr [esi-0000005Dh] 0x0000002e jmp 00007F8AB1593E58h 0x00000030 dec ax 0x00000032 lea ecx, dword ptr [F092C92Eh] 0x00000038 xchg dword ptr [esp], esi 0x0000003b mov ecx, dword ptr [esp] 0x0000003e not eax 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4E9D14 second address: 4E9CC4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB0DEE8D2h 0x00000004 push dword ptr [esp] 0x00000007 retn 0004h 0x0000000a not dword ptr [ebp+00h] 0x0000000d mov ax, CF5Ah 0x00000011 push ecx 0x00000012 shr dh, 00000005h 0x00000015 jmp 00007F8AB0DEE9C0h 0x00000017 jle 00007F8AB0DEE966h 0x00000019 mov cx, word ptr [ebp+00h] 0x0000001d add eax, 9FCEE7F0h 0x00000022 jnc 00007F8AB0DEE96Dh 0x00000024 jc 00007F8AB0DEE96Bh 0x00000026 call 00007F8AB0DEE966h 0x0000002b pop dx 0x0000002d jmp 00007F8AB0DEE91Fh 0x0000002f mov dh, al 0x00000031 lea esp, dword ptr [esp+02h] 0x00000035 jmp 00007F8AB0DEE97Dh 0x00000037 sub ebp, 02h 0x0000003a mov dx, 8960h 0x0000003e xchg eax, edx 0x0000003f mov edx, dword ptr [esp] 0x00000042 jmp 00007F8AB0DEE9A0h 0x00000044 or word ptr [ebp+04h], cx 0x00000048 xchg ax, dx 0x0000004a lea edx, dword ptr [edx-00000AEDh] 0x00000050 mov ax, word ptr [esp] 0x00000054 jmp 00007F8AB0DEE91Eh 0x00000056 pushfd 0x00000057 pop dword ptr [ebp+00h] 0x0000005a lea edx, dword ptr [00000000h+edx*4] 0x00000061 mov edx, 457163FEh 0x00000066 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 52A404 second address: 52A493 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 mov ax, word ptr [esp+01h] 0x00000008 lea edx, dword ptr [esi+45980130h] 0x0000000e mov dword ptr [esp], edi 0x00000011 jmp 00007F8AB1593E72h 0x00000013 mov dx, word ptr [esp] 0x00000017 mov ax, 82A6h 0x0000001b mov dl, ah 0x0000001d jmp 00007F8AB1594063h 0x00000022 lea edi, dword ptr [00000000h+ecx*4] 0x00000029 mov dx, word ptr [esp] 0x0000002d lea eax, dword ptr [esp+69177B39h] 0x00000034 pop edi 0x00000035 mov ax, bp 0x00000038 setle dl 0x0000003b jmp 00007F8AB1593D60h 0x00000040 not dx 0x00000043 push edx 0x00000044 xchg dh, al 0x00000046 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 499A83 second address: 499A87 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB1593E88h 0x00000004 xchg cx, ax 0x00000007 adc cx, dx 0x0000000a call 00007F8AB1593EB4h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4C6876 second address: 4C6A49 instructions: 0x00000000 rdtsc 0x00000002 neg dl 0x00000004 mov eax, ecx 0x00000006 jmp 00007F8AB0DEEB0Ch 0x0000000b lea edi, dword ptr [edi+0005040Bh] 0x00000011 lea eax, dword ptr [CD6A2DD3h] 0x00000017 mov edx, 9C0D1359h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4D99A3 second address: 48810D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB1593E2Bh 0x00000004 sub ebp, 08h 0x00000007 pushfd 0x00000008 lea esp, dword ptr [esp] 0x0000000b jmp 00007F8AB1593EF0h 0x0000000d mov dword ptr [ebp+00h], edx 0x00000010 mov dh, al 0x00000012 sub esp, 18h 0x00000015 jnl 00007F8AB1593ECEh 0x00000017 jmp 00007F8AB1593E8Ah 0x00000019 xchg eax, ecx 0x0000001a bsr dx, si 0x0000001e jnc 00007F8AB1593EC9h 0x00000020 clc 0x00000021 cmc 0x00000022 mov dword ptr [ebp+04h], ecx 0x00000025 mov dx, word ptr [esp] 0x00000029 lea edx, dword ptr [00000000h+edx*4] 0x00000030 jmp 00007F8AB154265Eh 0x00000035 neg eax 0x00000037 jl 00007F8AB1593E02h 0x0000003d jmp 00007F8AB1593E7Dh 0x0000003f mov ecx, dword ptr [esp] 0x00000042 bsf cx, cx 0x00000046 neg ah 0x00000048 jmp 00007F8AB1593E81h 0x0000004a lea ecx, dword ptr [edi+50h] 0x0000004d clc 0x0000004e jp 00007F8AB1593EBDh 0x00000050 mov dl, C2h 0x00000052 mov dh, byte ptr [esp] 0x00000055 rcl dx, cl 0x00000058 jmp 00007F8AB1593EEEh 0x0000005a mov ah, ch 0x0000005c jmp 00007F8AB1593E7Dh 0x0000005e cmp ebp, ecx 0x00000060 jl 00007F8AB1593EE1h 0x00000062 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4D6526 second address: 4D65FD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB0DEE980h 0x00000004 neg cl 0x00000006 lea eax, dword ptr [C399C3E4h] 0x0000000c lea eax, dword ptr [ecx+0000D6D8h] 0x00000012 lea eax, dword ptr [eax+esi] 0x00000015 jmp 00007F8AB0DEE96Dh 0x00000017 not cl 0x00000019 bswap eax 0x0000001b mov dx, ax 0x0000001e mov dx, word ptr [esp] 0x00000022 bsr ax, dx 0x00000026 jmp 00007F8AB0DEE99Eh 0x00000028 jle 00007F8AB0DEE908h 0x0000002a lea eax, dword ptr [edi-7CF34C86h] 0x00000030 shr dh, cl 0x00000032 jmp 00007F8AB0DEE92Ah 0x00000034 add cl, FFFFFF99h 0x00000037 push edx 0x00000038 mov ax, word ptr [esp+02h] 0x0000003d mov dh, 51h 0x0000003f push ax 0x00000041 jmp 00007F8AB0DEE96Bh 0x00000043 xchg dword ptr [esp], eax 0x00000046 lea esp, dword ptr [esp+02h] 0x0000004a lea esp, dword ptr [esp+04h] 0x0000004e sub cl, FFFFFF88h 0x00000051 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4D6540 second address: 4D65FD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB1593EB6h 0x00000004 neg cl 0x00000006 lea eax, dword ptr [C399C3E4h] 0x0000000c lea eax, dword ptr [ecx+0000D6D8h] 0x00000012 lea eax, dword ptr [eax+esi] 0x00000015 jmp 00007F8AB1593EBDh 0x00000017 not cl 0x00000019 bswap eax 0x0000001b mov dx, ax 0x0000001e mov dx, word ptr [esp] 0x00000022 bsr ax, dx 0x00000026 jmp 00007F8AB1593EEEh 0x00000028 jle 00007F8AB1593E58h 0x0000002a lea eax, dword ptr [edi-7CF34C86h] 0x00000030 shr dh, cl 0x00000032 jmp 00007F8AB1593E7Ah 0x00000034 add cl, FFFFFF99h 0x00000037 push edx 0x00000038 mov ax, word ptr [esp+02h] 0x0000003d mov dh, 51h 0x0000003f push ax 0x00000041 jmp 00007F8AB1593EBBh 0x00000043 xchg dword ptr [esp], eax 0x00000046 lea esp, dword ptr [esp+02h] 0x0000004a lea esp, dword ptr [esp+04h] 0x0000004e sub cl, FFFFFF88h 0x00000051 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 479B98 second address: 479C13 instructions: 0x00000000 rdtsc 0x00000002 mov ecx, dword ptr [esp] 0x00000005 call 00007F8AB0DEE988h 0x0000000a lea eax, dword ptr [edi+0000880Fh] 0x00000010 mov cx, dx 0x00000013 mov cx, word ptr [esp] 0x00000017 rcl ecx, 0Ch 0x0000001a jmp 00007F8AB0DEE975h 0x0000001c add al, ch 0x0000001e xchg dword ptr [esp], ebx 0x00000021 not edx 0x00000023 mov cl, dh 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 479C13 second address: 4CFDF2 instructions: 0x00000000 rdtsc 0x00000002 lea eax, dword ptr [ecx-00004680h] 0x00000008 jmp 00007F8AB15EA036h 0x0000000d lea ebx, dword ptr [ebx+49h] 0x00000010 lea eax, dword ptr [ebx+esi] 0x00000013 dec edx 0x00000014 lea edx, dword ptr [eax+ebp] 0x00000017 xchg dx, ax 0x0000001a pushad 0x0000001b jmp 00007F8AB1593E7Ch 0x0000001d xchg dword ptr [esp+20h], ebx 0x00000021 mov ax, si 0x00000024 lea edx, dword ptr [ecx+000000CEh] 0x0000002a shr dx, cl 0x0000002d jmp 00007F8AB1593ED6h 0x0000002f cmc 0x00000030 mov eax, dword ptr [esp] 0x00000033 push dword ptr [esp+20h] 0x00000037 retn 0024h 0x0000003a not ch 0x0000003c sub esp, 1Ah 0x0000003f jl 00007F8AB15EA07Bh 0x00000045 jnl 00007F8AB15EA0D5h 0x0000004b lea esp, dword ptr [esp+02h] 0x0000004f call 00007F8AB1593E5Dh 0x00000054 xchg dx, cx 0x00000057 not ax 0x0000005a rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4D42B5 second address: 4D42D0 instructions: 0x00000000 rdtsc 0x00000002 mov edx, dword ptr [esp] 0x00000005 and ah, 0000007Ah 0x00000008 xchg dword ptr [esp], ebp 0x0000000b jmp 00007F8AB0DEE9C2h 0x0000000d bsf ax, dx 0x00000011 bswap edx 0x00000013 mov edx, 76495E28h 0x00000018 pushfd 0x00000019 lea ebp, dword ptr [ebp-0000001Bh] 0x0000001f bswap edx 0x00000021 jmp 00007F8AB0DEE8CCh 0x00000026 mov ah, byte ptr [esp] 0x00000029 sub esp, 08h 0x0000002c dec dh 0x0000002e mov al, cl 0x00000030 xchg dword ptr [esp+0Ch], ebp 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4D42D0 second address: 4D431F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB1593EC9h 0x00000004 bsr dx, dx 0x00000008 bsf edx, esp 0x0000000b mov edx, 770EE750h 0x00000010 mov ah, dh 0x00000012 push dword ptr [esp+0Ch] 0x00000016 retn 0010h 0x00000019 mov cx, word ptr [ebp+00h] 0x0000001d mov eax, E6083829h 0x00000022 jmp 00007F8AB1593EB2h 0x00000024 pushfd 0x00000025 rcl dl, cl 0x00000027 jnl 00007F8AB1593EFBh 0x00000029 xchg dx, ax 0x0000002c jmp 00007F8AB1593F21h 0x0000002e sub ebp, 02h 0x00000031 xchg dh, dl 0x00000033 lea edx, dword ptr [ebx-0000352Ah] 0x00000039 mov dx, D04Ah 0x0000003d rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4D431F second address: 4D4367 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB0DEE990h 0x00000004 add word ptr [ebp+04h], cx 0x00000008 not eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 4E9BCB second address: 4E9CC4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8AB1593E7Dh 0x00000004 not dword ptr [ebp+00h] 0x00000007 mov ax, CF5Ah 0x0000000b push ecx 0x0000000c shr dh, 00000005h 0x0000000f jmp 00007F8AB1593F10h 0x00000011 jle 00007F8AB1593EB6h 0x00000013 mov cx, word ptr [ebp+00h] 0x00000017 add eax, 9FCEE7F0h 0x0000001c jnc 00007F8AB1593EBDh 0x0000001e jc 00007F8AB1593EBBh 0x00000020 call 00007F8AB1593EB6h 0x00000025 pop dx 0x00000027 jmp 00007F8AB1593E6Fh 0x00000029 mov dh, al 0x0000002b lea esp, dword ptr [esp+02h] 0x0000002f jmp 00007F8AB1593ECDh 0x00000031 sub ebp, 02h 0x00000034 mov dx, 8960h 0x00000038 xchg eax, edx 0x00000039 mov edx, dword ptr [esp] 0x0000003c jmp 00007F8AB1593EF0h 0x0000003e or word ptr [ebp+04h], cx 0x00000042 xchg ax, dx 0x00000044 lea edx, dword ptr [edx-00000AEDh] 0x0000004a mov ax, word ptr [esp] 0x0000004e jmp 00007F8AB1593E6Eh 0x00000050 pushfd 0x00000051 pop dword ptr [ebp+00h] 0x00000054 lea edx, dword ptr [00000000h+edx*4] 0x0000005b mov edx, 457163FEh 0x00000060 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | RDTSC instruction interceptor: First address: 48AF3C second address: 48B06E instructions: 0x00000000 rdtsc 0x00000002 lea esp, dword ptr [esp+03h] 0x00000006 call 00007F8AB0DEE931h 0x0000000b jmp 00007F8AB0DEE975h 0x0000000d sub esp, 02h 0x00000010 neg ax 0x00000013 xchg dx, ax 0x00000016 rol edx, 1Ah 0x00000019 lea esp, dword ptr [esp+02h] 0x0000001d xchg dword ptr [esp], esi 0x00000020 jmp 00007F8AB0DEE967h 0x00000022 xchg ax, dx 0x00000024 sub esp, 04h 0x00000027 btr dx, bx 0x0000002b xchg word ptr [esp+01h], dx 0x00000030 mov dx, word ptr [esp+02h] 0x00000035 lea esi, dword ptr [esi+67h] 0x00000038 jmp 00007F8AB0DEE9A2h 0x0000003a lea eax, dword ptr [00000000h+ebp*4] 0x00000041 mov dh, ah 0x00000043 mov eax, esp 0x00000045 sub esp, 15h 0x00000048 lea esp, dword ptr [esp+01h] 0x0000004c xchg dword ptr [esp+18h], esi 0x00000050 jmp 00007F8AB0DEE924h 0x00000052 mov ah, byte ptr [esp] 0x00000055 pushad 0x00000056 push ecx 0x00000057 push dword ptr [esp+3Ch] 0x0000005b retn 0040h 0x0000005e xor cl, FFFFFFC2h 0x00000061 bsr eax, ebx 0x00000064 jmp 00007F8AB0DEE9A1h 0x00000066 jp 00007F8AB0DEE966h 0x00000068 mov ax, si 0x0000006b mov dx, word ptr [esp] 0x0000006f jmp 00007F8AB0DEE9B0h 0x00000071 rdtsc |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DB23D mov eax, dword ptr fs:[00000030h] | 0_2_022DB23D |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C9218 mov eax, dword ptr fs:[00000030h] | 0_2_022C9218 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C9218 mov eax, dword ptr fs:[00000030h] | 0_2_022C9218 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C9218 mov eax, dword ptr fs:[00000030h] | 0_2_022C9218 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C9218 mov eax, dword ptr fs:[00000030h] | 0_2_022C9218 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C9218 mov ecx, dword ptr fs:[00000030h] | 0_2_022C9218 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CD26E mov eax, dword ptr fs:[00000030h] | 0_2_022CD26E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022A727B mov eax, dword ptr fs:[00000030h] | 0_2_022A727B |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C424E mov eax, dword ptr fs:[00000030h] | 0_2_022C424E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C424E mov ecx, dword ptr fs:[00000030h] | 0_2_022C424E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D4258 mov eax, dword ptr fs:[00000030h] | 0_2_022D4258 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022AC255 mov eax, dword ptr fs:[00000030h] | 0_2_022AC255 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022AC255 mov eax, dword ptr fs:[00000030h] | 0_2_022AC255 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BF2A2 mov eax, dword ptr fs:[00000030h] | 0_2_022BF2A2 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BF2A2 mov ecx, dword ptr fs:[00000030h] | 0_2_022BF2A2 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C82A2 mov eax, dword ptr fs:[00000030h] | 0_2_022C82A2 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C82A2 mov eax, dword ptr fs:[00000030h] | 0_2_022C82A2 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C82A2 mov eax, dword ptr fs:[00000030h] | 0_2_022C82A2 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C82A2 mov eax, dword ptr fs:[00000030h] | 0_2_022C82A2 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C82A2 mov eax, dword ptr fs:[00000030h] | 0_2_022C82A2 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C82A2 mov eax, dword ptr fs:[00000030h] | 0_2_022C82A2 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C82A2 mov ecx, dword ptr fs:[00000030h] | 0_2_022C82A2 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C82A2 mov eax, dword ptr fs:[00000030h] | 0_2_022C82A2 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B12BA mov eax, dword ptr fs:[00000030h] | 0_2_022B12BA |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B12BA mov eax, dword ptr fs:[00000030h] | 0_2_022B12BA |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0228C2BE mov ecx, dword ptr fs:[00000030h] | 0_2_0228C2BE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022A328C mov eax, dword ptr fs:[00000030h] | 0_2_022A328C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022AC29B mov eax, dword ptr fs:[00000030h] | 0_2_022AC29B |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022AC29B mov eax, dword ptr fs:[00000030h] | 0_2_022AC29B |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022AC29B mov ecx, dword ptr fs:[00000030h] | 0_2_022AC29B |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C3294 mov eax, dword ptr fs:[00000030h] | 0_2_022C3294 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C3294 mov eax, dword ptr fs:[00000030h] | 0_2_022C3294 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C3294 mov eax, dword ptr fs:[00000030h] | 0_2_022C3294 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D62C9 mov eax, dword ptr fs:[00000030h] | 0_2_022D62C9 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0229E2DE mov eax, dword ptr fs:[00000030h] | 0_2_0229E2DE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0229E2DE mov eax, dword ptr fs:[00000030h] | 0_2_0229E2DE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0229E2DE mov eax, dword ptr fs:[00000030h] | 0_2_0229E2DE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022812DF mov eax, dword ptr fs:[00000030h] | 0_2_022812DF |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022812DF mov eax, dword ptr fs:[00000030h] | 0_2_022812DF |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022812DF mov eax, dword ptr fs:[00000030h] | 0_2_022812DF |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B4321 mov eax, dword ptr fs:[00000030h] | 0_2_022B4321 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B4321 mov eax, dword ptr fs:[00000030h] | 0_2_022B4321 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0228531A mov eax, dword ptr fs:[00000030h] | 0_2_0228531A |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0228531A mov ecx, dword ptr fs:[00000030h] | 0_2_0228531A |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C331F mov eax, dword ptr fs:[00000030h] | 0_2_022C331F |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022A736E mov eax, dword ptr fs:[00000030h] | 0_2_022A736E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022A736E mov eax, dword ptr fs:[00000030h] | 0_2_022A736E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0229D37E mov eax, dword ptr fs:[00000030h] | 0_2_0229D37E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0229D37E mov ecx, dword ptr fs:[00000030h] | 0_2_0229D37E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0229D37E mov eax, dword ptr fs:[00000030h] | 0_2_0229D37E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BF34E mov eax, dword ptr fs:[00000030h] | 0_2_022BF34E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BF34E mov eax, dword ptr fs:[00000030h] | 0_2_022BF34E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BF34E mov eax, dword ptr fs:[00000030h] | 0_2_022BF34E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BF34E mov ecx, dword ptr fs:[00000030h] | 0_2_022BF34E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022A33AB mov eax, dword ptr fs:[00000030h] | 0_2_022A33AB |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022A33AB mov ecx, dword ptr fs:[00000030h] | 0_2_022A33AB |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022A33AB mov eax, dword ptr fs:[00000030h] | 0_2_022A33AB |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022A33AB mov eax, dword ptr fs:[00000030h] | 0_2_022A33AB |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022A33AB mov eax, dword ptr fs:[00000030h] | 0_2_022A33AB |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022A33AB mov eax, dword ptr fs:[00000030h] | 0_2_022A33AB |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D43A7 mov eax, dword ptr fs:[00000030h] | 0_2_022D43A7 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DB3A6 mov eax, dword ptr fs:[00000030h] | 0_2_022DB3A6 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DE3BE mov ecx, dword ptr fs:[00000030h] | 0_2_022DE3BE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C439E mov eax, dword ptr fs:[00000030h] | 0_2_022C439E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C439E mov ecx, dword ptr fs:[00000030h] | 0_2_022C439E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022E03EE mov eax, dword ptr fs:[00000030h] | 0_2_022E03EE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022E03EE mov eax, dword ptr fs:[00000030h] | 0_2_022E03EE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CD3EE mov eax, dword ptr fs:[00000030h] | 0_2_022CD3EE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DF3FB mov eax, dword ptr fs:[00000030h] | 0_2_022DF3FB |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_02281021 mov eax, dword ptr fs:[00000030h] | 0_2_02281021 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D7002 mov eax, dword ptr fs:[00000030h] | 0_2_022D7002 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D7002 mov eax, dword ptr fs:[00000030h] | 0_2_022D7002 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C1019 mov eax, dword ptr fs:[00000030h] | 0_2_022C1019 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_02280015 mov eax, dword ptr fs:[00000030h] | 0_2_02280015 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CB06E mov eax, dword ptr fs:[00000030h] | 0_2_022CB06E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0228506F mov esi, dword ptr fs:[00000030h] | 0_2_0228506F |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C107F mov eax, dword ptr fs:[00000030h] | 0_2_022C107F |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C004E mov eax, dword ptr fs:[00000030h] | 0_2_022C004E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C004E mov eax, dword ptr fs:[00000030h] | 0_2_022C004E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C004E mov eax, dword ptr fs:[00000030h] | 0_2_022C004E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C004E mov eax, dword ptr fs:[00000030h] | 0_2_022C004E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C004E mov eax, dword ptr fs:[00000030h] | 0_2_022C004E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C004E mov eax, dword ptr fs:[00000030h] | 0_2_022C004E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C004E mov eax, dword ptr fs:[00000030h] | 0_2_022C004E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C004E mov eax, dword ptr fs:[00000030h] | 0_2_022C004E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C004E mov eax, dword ptr fs:[00000030h] | 0_2_022C004E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C004E mov eax, dword ptr fs:[00000030h] | 0_2_022C004E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0229F044 mov eax, dword ptr fs:[00000030h] | 0_2_0229F044 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0229F044 mov eax, dword ptr fs:[00000030h] | 0_2_0229F044 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0229F044 mov eax, dword ptr fs:[00000030h] | 0_2_0229F044 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022800AE mov eax, dword ptr fs:[00000030h] | 0_2_022800AE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022800AE mov eax, dword ptr fs:[00000030h] | 0_2_022800AE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D60A7 mov eax, dword ptr fs:[00000030h] | 0_2_022D60A7 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D60A7 mov eax, dword ptr fs:[00000030h] | 0_2_022D60A7 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D60A7 mov eax, dword ptr fs:[00000030h] | 0_2_022D60A7 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C60BE mov ecx, dword ptr fs:[00000030h] | 0_2_022C60BE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D4088 mov eax, dword ptr fs:[00000030h] | 0_2_022D4088 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D4088 mov eax, dword ptr fs:[00000030h] | 0_2_022D4088 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D4088 mov eax, dword ptr fs:[00000030h] | 0_2_022D4088 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BF09C mov eax, dword ptr fs:[00000030h] | 0_2_022BF09C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BF09C mov ecx, dword ptr fs:[00000030h] | 0_2_022BF09C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_02280094 mov eax, dword ptr fs:[00000030h] | 0_2_02280094 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_02280094 mov eax, dword ptr fs:[00000030h] | 0_2_02280094 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B30FC mov eax, dword ptr fs:[00000030h] | 0_2_022B30FC |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B30FC mov eax, dword ptr fs:[00000030h] | 0_2_022B30FC |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022AB0D5 mov ecx, dword ptr fs:[00000030h] | 0_2_022AB0D5 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022AB0D5 mov eax, dword ptr fs:[00000030h] | 0_2_022AB0D5 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B111E mov eax, dword ptr fs:[00000030h] | 0_2_022B111E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B111E mov eax, dword ptr fs:[00000030h] | 0_2_022B111E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B111E mov eax, dword ptr fs:[00000030h] | 0_2_022B111E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B111E mov eax, dword ptr fs:[00000030h] | 0_2_022B111E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D6115 mov eax, dword ptr fs:[00000030h] | 0_2_022D6115 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0229D16F mov eax, dword ptr fs:[00000030h] | 0_2_0229D16F |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0229D16F mov eax, dword ptr fs:[00000030h] | 0_2_0229D16F |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0229D16F mov eax, dword ptr fs:[00000030h] | 0_2_0229D16F |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CB162 mov eax, dword ptr fs:[00000030h] | 0_2_022CB162 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CB162 mov eax, dword ptr fs:[00000030h] | 0_2_022CB162 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CB162 mov eax, dword ptr fs:[00000030h] | 0_2_022CB162 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CB162 mov eax, dword ptr fs:[00000030h] | 0_2_022CB162 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CB162 mov ecx, dword ptr fs:[00000030h] | 0_2_022CB162 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D61EF mov eax, dword ptr fs:[00000030h] | 0_2_022D61EF |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022AC1ED mov eax, dword ptr fs:[00000030h] | 0_2_022AC1ED |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022AC1ED mov eax, dword ptr fs:[00000030h] | 0_2_022AC1ED |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022AC1ED mov eax, dword ptr fs:[00000030h] | 0_2_022AC1ED |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022AC1ED mov eax, dword ptr fs:[00000030h] | 0_2_022AC1ED |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CC63D mov eax, dword ptr fs:[00000030h] | 0_2_022CC63D |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0228C60B mov eax, dword ptr fs:[00000030h] | 0_2_0228C60B |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0228C60B mov ecx, dword ptr fs:[00000030h] | 0_2_0228C60B |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0228C60B mov eax, dword ptr fs:[00000030h] | 0_2_0228C60B |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C461E mov eax, dword ptr fs:[00000030h] | 0_2_022C461E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C461E mov ecx, dword ptr fs:[00000030h] | 0_2_022C461E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BF660 mov eax, dword ptr fs:[00000030h] | 0_2_022BF660 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BF660 mov eax, dword ptr fs:[00000030h] | 0_2_022BF660 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022E0671 mov eax, dword ptr fs:[00000030h] | 0_2_022E0671 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022E0671 mov eax, dword ptr fs:[00000030h] | 0_2_022E0671 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BD643 mov eax, dword ptr fs:[00000030h] | 0_2_022BD643 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BD643 mov ecx, dword ptr fs:[00000030h] | 0_2_022BD643 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DC652 mov eax, dword ptr fs:[00000030h] | 0_2_022DC652 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DC652 mov eax, dword ptr fs:[00000030h] | 0_2_022DC652 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DC652 mov eax, dword ptr fs:[00000030h] | 0_2_022DC652 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DC652 mov eax, dword ptr fs:[00000030h] | 0_2_022DC652 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CD68E mov eax, dword ptr fs:[00000030h] | 0_2_022CD68E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B9682 mov eax, dword ptr fs:[00000030h] | 0_2_022B9682 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B9682 mov ecx, dword ptr fs:[00000030h] | 0_2_022B9682 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0228B6E9 mov eax, dword ptr fs:[00000030h] | 0_2_0228B6E9 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0227D6FC mov eax, dword ptr fs:[00000030h] | 0_2_0227D6FC |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D66F6 mov eax, dword ptr fs:[00000030h] | 0_2_022D66F6 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D66F6 mov eax, dword ptr fs:[00000030h] | 0_2_022D66F6 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022A76DC mov eax, dword ptr fs:[00000030h] | 0_2_022A76DC |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022A76DC mov eax, dword ptr fs:[00000030h] | 0_2_022A76DC |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BD72F mov eax, dword ptr fs:[00000030h] | 0_2_022BD72F |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BD72F mov eax, dword ptr fs:[00000030h] | 0_2_022BD72F |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DB736 mov eax, dword ptr fs:[00000030h] | 0_2_022DB736 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DB736 mov eax, dword ptr fs:[00000030h] | 0_2_022DB736 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C870E mov ecx, dword ptr fs:[00000030h] | 0_2_022C870E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B070E mov eax, dword ptr fs:[00000030h] | 0_2_022B070E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B070E mov eax, dword ptr fs:[00000030h] | 0_2_022B070E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B570E mov eax, dword ptr fs:[00000030h] | 0_2_022B570E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C476E mov eax, dword ptr fs:[00000030h] | 0_2_022C476E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C476E mov ecx, dword ptr fs:[00000030h] | 0_2_022C476E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D877F mov eax, dword ptr fs:[00000030h] | 0_2_022D877F |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022E0747 mov eax, dword ptr fs:[00000030h] | 0_2_022E0747 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022E0747 mov eax, dword ptr fs:[00000030h] | 0_2_022E0747 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0228C7A8 mov eax, dword ptr fs:[00000030h] | 0_2_0228C7A8 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CA7A4 mov eax, dword ptr fs:[00000030h] | 0_2_022CA7A4 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022AE783 mov eax, dword ptr fs:[00000030h] | 0_2_022AE783 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BE7FE mov eax, dword ptr fs:[00000030h] | 0_2_022BE7FE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C97CE mov ecx, dword ptr fs:[00000030h] | 0_2_022C97CE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CD7CE mov eax, dword ptr fs:[00000030h] | 0_2_022CD7CE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DE7DE mov eax, dword ptr fs:[00000030h] | 0_2_022DE7DE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DE7DE mov ecx, dword ptr fs:[00000030h] | 0_2_022DE7DE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B142E mov eax, dword ptr fs:[00000030h] | 0_2_022B142E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BD42E mov eax, dword ptr fs:[00000030h] | 0_2_022BD42E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022A443F mov eax, dword ptr fs:[00000030h] | 0_2_022A443F |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022A443F mov eax, dword ptr fs:[00000030h] | 0_2_022A443F |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022A443F mov eax, dword ptr fs:[00000030h] | 0_2_022A443F |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022A443F mov eax, dword ptr fs:[00000030h] | 0_2_022A443F |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022A443F mov eax, dword ptr fs:[00000030h] | 0_2_022A443F |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BD468 mov eax, dword ptr fs:[00000030h] | 0_2_022BD468 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0229F44E mov eax, dword ptr fs:[00000030h] | 0_2_0229F44E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CD45E mov eax, dword ptr fs:[00000030h] | 0_2_022CD45E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CA4BE mov eax, dword ptr fs:[00000030h] | 0_2_022CA4BE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CA4BE mov eax, dword ptr fs:[00000030h] | 0_2_022CA4BE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CA4BE mov eax, dword ptr fs:[00000030h] | 0_2_022CA4BE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CA4BE mov eax, dword ptr fs:[00000030h] | 0_2_022CA4BE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CA4BE mov eax, dword ptr fs:[00000030h] | 0_2_022CA4BE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B048E mov eax, dword ptr fs:[00000030h] | 0_2_022B048E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B048E mov eax, dword ptr fs:[00000030h] | 0_2_022B048E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B048E mov eax, dword ptr fs:[00000030h] | 0_2_022B048E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B048E mov eax, dword ptr fs:[00000030h] | 0_2_022B048E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D648A mov eax, dword ptr fs:[00000030h] | 0_2_022D648A |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D648A mov eax, dword ptr fs:[00000030h] | 0_2_022D648A |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BF4FD mov eax, dword ptr fs:[00000030h] | 0_2_022BF4FD |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022864CE mov eax, dword ptr fs:[00000030h] | 0_2_022864CE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B14DE mov eax, dword ptr fs:[00000030h] | 0_2_022B14DE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022E04DB mov eax, dword ptr fs:[00000030h] | 0_2_022E04DB |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022E04DB mov eax, dword ptr fs:[00000030h] | 0_2_022E04DB |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022E04DB mov eax, dword ptr fs:[00000030h] | 0_2_022E04DB |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022E04DB mov eax, dword ptr fs:[00000030h] | 0_2_022E04DB |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D6538 mov eax, dword ptr fs:[00000030h] | 0_2_022D6538 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BE57B mov eax, dword ptr fs:[00000030h] | 0_2_022BE57B |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BE57B mov eax, dword ptr fs:[00000030h] | 0_2_022BE57B |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0229E54E mov eax, dword ptr fs:[00000030h] | 0_2_0229E54E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0229E54E mov ecx, dword ptr fs:[00000030h] | 0_2_0229E54E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0229E54E mov eax, dword ptr fs:[00000030h] | 0_2_0229E54E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BD5A4 mov eax, dword ptr fs:[00000030h] | 0_2_022BD5A4 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BF582 mov eax, dword ptr fs:[00000030h] | 0_2_022BF582 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022845EE mov eax, dword ptr fs:[00000030h] | 0_2_022845EE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022845EE mov ecx, dword ptr fs:[00000030h] | 0_2_022845EE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DF5DD mov eax, dword ptr fs:[00000030h] | 0_2_022DF5DD |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DF5DD mov eax, dword ptr fs:[00000030h] | 0_2_022DF5DD |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DFA18 mov eax, dword ptr fs:[00000030h] | 0_2_022DFA18 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022AEA6E mov eax, dword ptr fs:[00000030h] | 0_2_022AEA6E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022AEA6E mov ecx, dword ptr fs:[00000030h] | 0_2_022AEA6E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D7A62 mov eax, dword ptr fs:[00000030h] | 0_2_022D7A62 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022ADA7E mov eax, dword ptr fs:[00000030h] | 0_2_022ADA7E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022ADA7E mov eax, dword ptr fs:[00000030h] | 0_2_022ADA7E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022ADA7E mov eax, dword ptr fs:[00000030h] | 0_2_022ADA7E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C7A4E mov eax, dword ptr fs:[00000030h] | 0_2_022C7A4E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C7A4E mov eax, dword ptr fs:[00000030h] | 0_2_022C7A4E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D2A45 mov eax, dword ptr fs:[00000030h] | 0_2_022D2A45 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D2A45 mov ecx, dword ptr fs:[00000030h] | 0_2_022D2A45 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DAA5C mov eax, dword ptr fs:[00000030h] | 0_2_022DAA5C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DCA55 mov eax, dword ptr fs:[00000030h] | 0_2_022DCA55 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BFAEE mov eax, dword ptr fs:[00000030h] | 0_2_022BFAEE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BFAEE mov eax, dword ptr fs:[00000030h] | 0_2_022BFAEE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0229DAFE mov eax, dword ptr fs:[00000030h] | 0_2_0229DAFE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0229DAFE mov ecx, dword ptr fs:[00000030h] | 0_2_0229DAFE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B1ADE mov eax, dword ptr fs:[00000030h] | 0_2_022B1ADE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C8B2F mov eax, dword ptr fs:[00000030h] | 0_2_022C8B2F |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C8B2F mov ecx, dword ptr fs:[00000030h] | 0_2_022C8B2F |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022A2B2E mov eax, dword ptr fs:[00000030h] | 0_2_022A2B2E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0228CB25 mov eax, dword ptr fs:[00000030h] | 0_2_0228CB25 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0228CB25 mov eax, dword ptr fs:[00000030h] | 0_2_0228CB25 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DCB37 mov eax, dword ptr fs:[00000030h] | 0_2_022DCB37 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CBB37 mov eax, dword ptr fs:[00000030h] | 0_2_022CBB37 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CBB37 mov eax, dword ptr fs:[00000030h] | 0_2_022CBB37 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CBB37 mov eax, dword ptr fs:[00000030h] | 0_2_022CBB37 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CBB37 mov eax, dword ptr fs:[00000030h] | 0_2_022CBB37 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CBB37 mov ecx, dword ptr fs:[00000030h] | 0_2_022CBB37 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CDB0A mov eax, dword ptr fs:[00000030h] | 0_2_022CDB0A |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DFB46 mov eax, dword ptr fs:[00000030h] | 0_2_022DFB46 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DFB46 mov eax, dword ptr fs:[00000030h] | 0_2_022DFB46 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022A4BAD mov ecx, dword ptr fs:[00000030h] | 0_2_022A4BAD |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022A4BAD mov eax, dword ptr fs:[00000030h] | 0_2_022A4BAD |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D6BB1 mov eax, dword ptr fs:[00000030h] | 0_2_022D6BB1 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D6BB1 mov eax, dword ptr fs:[00000030h] | 0_2_022D6BB1 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C3B80 mov eax, dword ptr fs:[00000030h] | 0_2_022C3B80 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C3B80 mov eax, dword ptr fs:[00000030h] | 0_2_022C3B80 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C3B80 mov eax, dword ptr fs:[00000030h] | 0_2_022C3B80 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022ABB86 mov eax, dword ptr fs:[00000030h] | 0_2_022ABB86 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022ABB86 mov eax, dword ptr fs:[00000030h] | 0_2_022ABB86 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022ABB86 mov eax, dword ptr fs:[00000030h] | 0_2_022ABB86 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022ABB86 mov eax, dword ptr fs:[00000030h] | 0_2_022ABB86 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BFB9E mov eax, dword ptr fs:[00000030h] | 0_2_022BFB9E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BFB9E mov eax, dword ptr fs:[00000030h] | 0_2_022BFB9E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B1BE5 mov eax, dword ptr fs:[00000030h] | 0_2_022B1BE5 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022AC83B mov eax, dword ptr fs:[00000030h] | 0_2_022AC83B |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022AC83B mov eax, dword ptr fs:[00000030h] | 0_2_022AC83B |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022AC83B mov ecx, dword ptr fs:[00000030h] | 0_2_022AC83B |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C980E mov eax, dword ptr fs:[00000030h] | 0_2_022C980E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022AD84E mov eax, dword ptr fs:[00000030h] | 0_2_022AD84E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022AD84E mov eax, dword ptr fs:[00000030h] | 0_2_022AD84E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022AD84E mov eax, dword ptr fs:[00000030h] | 0_2_022AD84E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022AD84E mov eax, dword ptr fs:[00000030h] | 0_2_022AD84E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0227D84E mov eax, dword ptr fs:[00000030h] | 0_2_0227D84E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0227D84E mov eax, dword ptr fs:[00000030h] | 0_2_0227D84E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0227D84E mov eax, dword ptr fs:[00000030h] | 0_2_0227D84E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0227D84E mov eax, dword ptr fs:[00000030h] | 0_2_0227D84E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DC8A4 mov eax, dword ptr fs:[00000030h] | 0_2_022DC8A4 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DC8A4 mov eax, dword ptr fs:[00000030h] | 0_2_022DC8A4 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D38B3 mov eax, dword ptr fs:[00000030h] | 0_2_022D38B3 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D38B3 mov eax, dword ptr fs:[00000030h] | 0_2_022D38B3 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C989E mov ecx, dword ptr fs:[00000030h] | 0_2_022C989E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BE8FE mov eax, dword ptr fs:[00000030h] | 0_2_022BE8FE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CC8F6 mov eax, dword ptr fs:[00000030h] | 0_2_022CC8F6 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CC8F6 mov eax, dword ptr fs:[00000030h] | 0_2_022CC8F6 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CC8F6 mov eax, dword ptr fs:[00000030h] | 0_2_022CC8F6 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CC8F6 mov eax, dword ptr fs:[00000030h] | 0_2_022CC8F6 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CC8F6 mov eax, dword ptr fs:[00000030h] | 0_2_022CC8F6 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CC8F6 mov eax, dword ptr fs:[00000030h] | 0_2_022CC8F6 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CC8F6 mov eax, dword ptr fs:[00000030h] | 0_2_022CC8F6 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CC8F6 mov eax, dword ptr fs:[00000030h] | 0_2_022CC8F6 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CC8F6 mov eax, dword ptr fs:[00000030h] | 0_2_022CC8F6 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B08DE mov eax, dword ptr fs:[00000030h] | 0_2_022B08DE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B08DE mov eax, dword ptr fs:[00000030h] | 0_2_022B08DE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B08DE mov eax, dword ptr fs:[00000030h] | 0_2_022B08DE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B08DE mov ecx, dword ptr fs:[00000030h] | 0_2_022B08DE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B08DE mov eax, dword ptr fs:[00000030h] | 0_2_022B08DE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B08DE mov eax, dword ptr fs:[00000030h] | 0_2_022B08DE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B08DE mov eax, dword ptr fs:[00000030h] | 0_2_022B08DE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B08DE mov eax, dword ptr fs:[00000030h] | 0_2_022B08DE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B08DE mov eax, dword ptr fs:[00000030h] | 0_2_022B08DE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BE93E mov eax, dword ptr fs:[00000030h] | 0_2_022BE93E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DD980 mov eax, dword ptr fs:[00000030h] | 0_2_022DD980 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022E09C4 mov eax, dword ptr fs:[00000030h] | 0_2_022E09C4 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022E09C4 mov eax, dword ptr fs:[00000030h] | 0_2_022E09C4 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022E09C4 mov eax, dword ptr fs:[00000030h] | 0_2_022E09C4 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022E09C4 mov eax, dword ptr fs:[00000030h] | 0_2_022E09C4 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022AC9C5 mov eax, dword ptr fs:[00000030h] | 0_2_022AC9C5 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022AC9C5 mov eax, dword ptr fs:[00000030h] | 0_2_022AC9C5 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022AC9C5 mov eax, dword ptr fs:[00000030h] | 0_2_022AC9C5 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BEE2E mov eax, dword ptr fs:[00000030h] | 0_2_022BEE2E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BEE2E mov eax, dword ptr fs:[00000030h] | 0_2_022BEE2E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B0E4E mov eax, dword ptr fs:[00000030h] | 0_2_022B0E4E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B0E4E mov eax, dword ptr fs:[00000030h] | 0_2_022B0E4E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B0E4E mov ecx, dword ptr fs:[00000030h] | 0_2_022B0E4E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B0E4E mov eax, dword ptr fs:[00000030h] | 0_2_022B0E4E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B0E4E mov eax, dword ptr fs:[00000030h] | 0_2_022B0E4E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B0E4E mov eax, dword ptr fs:[00000030h] | 0_2_022B0E4E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B0E4E mov eax, dword ptr fs:[00000030h] | 0_2_022B0E4E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BFE8E mov eax, dword ptr fs:[00000030h] | 0_2_022BFE8E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0227CE95 mov eax, dword ptr fs:[00000030h] | 0_2_0227CE95 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0227CE95 mov ecx, dword ptr fs:[00000030h] | 0_2_0227CE95 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BFEEE mov eax, dword ptr fs:[00000030h] | 0_2_022BFEEE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BFEEE mov eax, dword ptr fs:[00000030h] | 0_2_022BFEEE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022ABEDE mov eax, dword ptr fs:[00000030h] | 0_2_022ABEDE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022ABEDE mov eax, dword ptr fs:[00000030h] | 0_2_022ABEDE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022ABEDE mov eax, dword ptr fs:[00000030h] | 0_2_022ABEDE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022ABEDE mov eax, dword ptr fs:[00000030h] | 0_2_022ABEDE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DCF20 mov eax, dword ptr fs:[00000030h] | 0_2_022DCF20 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DCF20 mov eax, dword ptr fs:[00000030h] | 0_2_022DCF20 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022AAF31 mov ecx, dword ptr fs:[00000030h] | 0_2_022AAF31 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022AAF31 mov eax, dword ptr fs:[00000030h] | 0_2_022AAF31 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C4F0E mov eax, dword ptr fs:[00000030h] | 0_2_022C4F0E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C4F0E mov eax, dword ptr fs:[00000030h] | 0_2_022C4F0E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BEF1C mov eax, dword ptr fs:[00000030h] | 0_2_022BEF1C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BEF1C mov eax, dword ptr fs:[00000030h] | 0_2_022BEF1C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CAF4E mov eax, dword ptr fs:[00000030h] | 0_2_022CAF4E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022CAF4E mov ecx, dword ptr fs:[00000030h] | 0_2_022CAF4E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DEF5D mov eax, dword ptr fs:[00000030h] | 0_2_022DEF5D |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DEF5D mov ecx, dword ptr fs:[00000030h] | 0_2_022DEF5D |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C3FAA mov eax, dword ptr fs:[00000030h] | 0_2_022C3FAA |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C3FAA mov eax, dword ptr fs:[00000030h] | 0_2_022C3FAA |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D6FBE mov eax, dword ptr fs:[00000030h] | 0_2_022D6FBE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BFFEE mov eax, dword ptr fs:[00000030h] | 0_2_022BFFEE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022E0C32 mov eax, dword ptr fs:[00000030h] | 0_2_022E0C32 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B0C0E mov eax, dword ptr fs:[00000030h] | 0_2_022B0C0E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B0C0E mov eax, dword ptr fs:[00000030h] | 0_2_022B0C0E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B0C0E mov eax, dword ptr fs:[00000030h] | 0_2_022B0C0E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B0C0E mov eax, dword ptr fs:[00000030h] | 0_2_022B0C0E |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C2C6A mov ecx, dword ptr fs:[00000030h] | 0_2_022C2C6A |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D7C54 mov eax, dword ptr fs:[00000030h] | 0_2_022D7C54 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D7C54 mov eax, dword ptr fs:[00000030h] | 0_2_022D7C54 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D7C54 mov eax, dword ptr fs:[00000030h] | 0_2_022D7C54 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_02281C8D mov eax, dword ptr fs:[00000030h] | 0_2_02281C8D |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C4C82 mov eax, dword ptr fs:[00000030h] | 0_2_022C4C82 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D3C9C mov eax, dword ptr fs:[00000030h] | 0_2_022D3C9C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D3C9C mov eax, dword ptr fs:[00000030h] | 0_2_022D3C9C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D3C9C mov eax, dword ptr fs:[00000030h] | 0_2_022D3C9C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D3C9C mov ecx, dword ptr fs:[00000030h] | 0_2_022D3C9C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D3C9C mov eax, dword ptr fs:[00000030h] | 0_2_022D3C9C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D3C9C mov ecx, dword ptr fs:[00000030h] | 0_2_022D3C9C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D6C90 mov eax, dword ptr fs:[00000030h] | 0_2_022D6C90 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022D6C90 mov eax, dword ptr fs:[00000030h] | 0_2_022D6C90 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022AECEE mov eax, dword ptr fs:[00000030h] | 0_2_022AECEE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022AECEE mov ecx, dword ptr fs:[00000030h] | 0_2_022AECEE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022E0CFF mov eax, dword ptr fs:[00000030h] | 0_2_022E0CFF |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C8CFE mov eax, dword ptr fs:[00000030h] | 0_2_022C8CFE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022C8CFE mov ecx, dword ptr fs:[00000030h] | 0_2_022C8CFE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DFCCF mov eax, dword ptr fs:[00000030h] | 0_2_022DFCCF |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DFCCF mov eax, dword ptr fs:[00000030h] | 0_2_022DFCCF |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DCCC8 mov eax, dword ptr fs:[00000030h] | 0_2_022DCCC8 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022DCCC8 mov eax, dword ptr fs:[00000030h] | 0_2_022DCCC8 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022ABD5C mov eax, dword ptr fs:[00000030h] | 0_2_022ABD5C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022ABD5C mov eax, dword ptr fs:[00000030h] | 0_2_022ABD5C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B1DB1 mov eax, dword ptr fs:[00000030h] | 0_2_022B1DB1 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B1DB1 mov eax, dword ptr fs:[00000030h] | 0_2_022B1DB1 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B1DB1 mov eax, dword ptr fs:[00000030h] | 0_2_022B1DB1 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022B1DB1 mov eax, dword ptr fs:[00000030h] | 0_2_022B1DB1 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0228CDCA mov eax, dword ptr fs:[00000030h] | 0_2_0228CDCA |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0228CDCA mov eax, dword ptr fs:[00000030h] | 0_2_0228CDCA |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022E0DCC mov eax, dword ptr fs:[00000030h] | 0_2_022E0DCC |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022E0DCC mov eax, dword ptr fs:[00000030h] | 0_2_022E0DCC |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022E0DCC mov eax, dword ptr fs:[00000030h] | 0_2_022E0DCC |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_022BEDCE mov eax, dword ptr fs:[00000030h] | 0_2_022BEDCE |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0248F2D7 mov eax, dword ptr fs:[00000030h] | 0_2_0248F2D7 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0248F2D7 mov eax, dword ptr fs:[00000030h] | 0_2_0248F2D7 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0248F2D7 mov eax, dword ptr fs:[00000030h] | 0_2_0248F2D7 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0248F2D7 mov eax, dword ptr fs:[00000030h] | 0_2_0248F2D7 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0248F2D7 mov ecx, dword ptr fs:[00000030h] | 0_2_0248F2D7 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0248F2D7 mov ecx, dword ptr fs:[00000030h] | 0_2_0248F2D7 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0248F2D7 mov eax, dword ptr fs:[00000030h] | 0_2_0248F2D7 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0248F2D7 mov ecx, dword ptr fs:[00000030h] | 0_2_0248F2D7 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0248F2D7 mov ecx, dword ptr fs:[00000030h] | 0_2_0248F2D7 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0248F2D7 mov eax, dword ptr fs:[00000030h] | 0_2_0248F2D7 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0248F2D7 mov ecx, dword ptr fs:[00000030h] | 0_2_0248F2D7 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0248F2D7 mov ecx, dword ptr fs:[00000030h] | 0_2_0248F2D7 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0248F2D7 mov eax, dword ptr fs:[00000030h] | 0_2_0248F2D7 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0248F2D7 mov eax, dword ptr fs:[00000030h] | 0_2_0248F2D7 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0248F2D7 mov eax, dword ptr fs:[00000030h] | 0_2_0248F2D7 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0248F2D7 mov eax, dword ptr fs:[00000030h] | 0_2_0248F2D7 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0248F2D7 mov eax, dword ptr fs:[00000030h] | 0_2_0248F2D7 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0248F2D7 mov eax, dword ptr fs:[00000030h] | 0_2_0248F2D7 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0248F2D7 mov eax, dword ptr fs:[00000030h] | 0_2_0248F2D7 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0248F2D7 mov eax, dword ptr fs:[00000030h] | 0_2_0248F2D7 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_02492657 mov ecx, dword ptr fs:[00000030h] | 0_2_02492657 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_02492657 mov ecx, dword ptr fs:[00000030h] | 0_2_02492657 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_02492657 mov eax, dword ptr fs:[00000030h] | 0_2_02492657 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_02492657 mov ecx, dword ptr fs:[00000030h] | 0_2_02492657 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_02492657 mov ecx, dword ptr fs:[00000030h] | 0_2_02492657 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_02492657 mov eax, dword ptr fs:[00000030h] | 0_2_02492657 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_02492657 mov eax, dword ptr fs:[00000030h] | 0_2_02492657 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_02492657 mov eax, dword ptr fs:[00000030h] | 0_2_02492657 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_02492657 mov eax, dword ptr fs:[00000030h] | 0_2_02492657 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_02492657 mov eax, dword ptr fs:[00000030h] | 0_2_02492657 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_02492657 mov eax, dword ptr fs:[00000030h] | 0_2_02492657 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_02492657 mov eax, dword ptr fs:[00000030h] | 0_2_02492657 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_02492657 mov eax, dword ptr fs:[00000030h] | 0_2_02492657 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_02492657 mov eax, dword ptr fs:[00000030h] | 0_2_02492657 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_02492657 mov eax, dword ptr fs:[00000030h] | 0_2_02492657 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_02492657 mov eax, dword ptr fs:[00000030h] | 0_2_02492657 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_02492657 mov eax, dword ptr fs:[00000030h] | 0_2_02492657 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247A709 mov eax, dword ptr fs:[00000030h] | 0_2_0247A709 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247A709 mov eax, dword ptr fs:[00000030h] | 0_2_0247A709 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247A709 mov eax, dword ptr fs:[00000030h] | 0_2_0247A709 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247A709 mov eax, dword ptr fs:[00000030h] | 0_2_0247A709 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247A709 mov eax, dword ptr fs:[00000030h] | 0_2_0247A709 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247A709 mov eax, dword ptr fs:[00000030h] | 0_2_0247A709 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247A709 mov eax, dword ptr fs:[00000030h] | 0_2_0247A709 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247A709 mov eax, dword ptr fs:[00000030h] | 0_2_0247A709 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247A709 mov eax, dword ptr fs:[00000030h] | 0_2_0247A709 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247A709 mov eax, dword ptr fs:[00000030h] | 0_2_0247A709 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247A709 mov eax, dword ptr fs:[00000030h] | 0_2_0247A709 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247A709 mov eax, dword ptr fs:[00000030h] | 0_2_0247A709 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247A709 mov eax, dword ptr fs:[00000030h] | 0_2_0247A709 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247A709 mov eax, dword ptr fs:[00000030h] | 0_2_0247A709 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247A709 mov eax, dword ptr fs:[00000030h] | 0_2_0247A709 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247A709 mov eax, dword ptr fs:[00000030h] | 0_2_0247A709 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247A709 mov eax, dword ptr fs:[00000030h] | 0_2_0247A709 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247A709 mov eax, dword ptr fs:[00000030h] | 0_2_0247A709 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247A709 mov eax, dword ptr fs:[00000030h] | 0_2_0247A709 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247A709 mov eax, dword ptr fs:[00000030h] | 0_2_0247A709 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247A709 mov eax, dword ptr fs:[00000030h] | 0_2_0247A709 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0248BACC mov eax, dword ptr fs:[00000030h] | 0_2_0248BACC |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0248BACC mov eax, dword ptr fs:[00000030h] | 0_2_0248BACC |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0248BACC mov eax, dword ptr fs:[00000030h] | 0_2_0248BACC |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0248BACC mov eax, dword ptr fs:[00000030h] | 0_2_0248BACC |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0248BACC mov eax, dword ptr fs:[00000030h] | 0_2_0248BACC |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0248BACC mov eax, dword ptr fs:[00000030h] | 0_2_0248BACC |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247ABBD mov eax, dword ptr fs:[00000030h] | 0_2_0247ABBD |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247ABBD mov eax, dword ptr fs:[00000030h] | 0_2_0247ABBD |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247ABBD mov eax, dword ptr fs:[00000030h] | 0_2_0247ABBD |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247ABBD mov eax, dword ptr fs:[00000030h] | 0_2_0247ABBD |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247ABBD mov eax, dword ptr fs:[00000030h] | 0_2_0247ABBD |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247ABBD mov eax, dword ptr fs:[00000030h] | 0_2_0247ABBD |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247ABBD mov eax, dword ptr fs:[00000030h] | 0_2_0247ABBD |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247ABBD mov eax, dword ptr fs:[00000030h] | 0_2_0247ABBD |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247ABBD mov eax, dword ptr fs:[00000030h] | 0_2_0247ABBD |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247AD51 mov eax, dword ptr fs:[00000030h] | 0_2_0247AD51 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247AD51 mov eax, dword ptr fs:[00000030h] | 0_2_0247AD51 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247AD51 mov eax, dword ptr fs:[00000030h] | 0_2_0247AD51 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247AD51 mov eax, dword ptr fs:[00000030h] | 0_2_0247AD51 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247AD51 mov eax, dword ptr fs:[00000030h] | 0_2_0247AD51 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247AD51 mov eax, dword ptr fs:[00000030h] | 0_2_0247AD51 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247AD51 mov eax, dword ptr fs:[00000030h] | 0_2_0247AD51 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247AD51 mov eax, dword ptr fs:[00000030h] | 0_2_0247AD51 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247AD51 mov eax, dword ptr fs:[00000030h] | 0_2_0247AD51 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0253B242 mov eax, dword ptr fs:[00000030h] | 0_2_0253B242 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0253B242 mov eax, dword ptr fs:[00000030h] | 0_2_0253B242 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0253B242 mov eax, dword ptr fs:[00000030h] | 0_2_0253B242 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0253B242 mov eax, dword ptr fs:[00000030h] | 0_2_0253B242 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0253B242 mov eax, dword ptr fs:[00000030h] | 0_2_0253B242 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0253B242 mov eax, dword ptr fs:[00000030h] | 0_2_0253B242 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0253B242 mov eax, dword ptr fs:[00000030h] | 0_2_0253B242 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0253B242 mov eax, dword ptr fs:[00000030h] | 0_2_0253B242 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0253B242 mov eax, dword ptr fs:[00000030h] | 0_2_0253B242 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0253B242 mov eax, dword ptr fs:[00000030h] | 0_2_0253B242 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0253B242 mov eax, dword ptr fs:[00000030h] | 0_2_0253B242 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0253B242 mov eax, dword ptr fs:[00000030h] | 0_2_0253B242 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0253B242 mov eax, dword ptr fs:[00000030h] | 0_2_0253B242 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0253B242 mov eax, dword ptr fs:[00000030h] | 0_2_0253B242 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0252C24C mov eax, dword ptr fs:[00000030h] | 0_2_0252C24C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0252C24C mov eax, dword ptr fs:[00000030h] | 0_2_0252C24C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0252C24C mov eax, dword ptr fs:[00000030h] | 0_2_0252C24C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0252C24C mov eax, dword ptr fs:[00000030h] | 0_2_0252C24C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0252C24C mov eax, dword ptr fs:[00000030h] | 0_2_0252C24C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0252C24C mov eax, dword ptr fs:[00000030h] | 0_2_0252C24C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0252C24C mov eax, dword ptr fs:[00000030h] | 0_2_0252C24C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0252C24C mov eax, dword ptr fs:[00000030h] | 0_2_0252C24C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0252C24C mov eax, dword ptr fs:[00000030h] | 0_2_0252C24C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0252C24C mov eax, dword ptr fs:[00000030h] | 0_2_0252C24C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0252C24C mov eax, dword ptr fs:[00000030h] | 0_2_0252C24C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0252C24C mov eax, dword ptr fs:[00000030h] | 0_2_0252C24C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0252C24C mov eax, dword ptr fs:[00000030h] | 0_2_0252C24C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_02474267 mov eax, dword ptr fs:[00000030h] | 0_2_02474267 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0252B276 mov eax, dword ptr fs:[00000030h] | 0_2_0252B276 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0252B276 mov eax, dword ptr fs:[00000030h] | 0_2_0252B276 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0252B276 mov eax, dword ptr fs:[00000030h] | 0_2_0252B276 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247326C mov eax, dword ptr fs:[00000030h] | 0_2_0247326C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247326C mov eax, dword ptr fs:[00000030h] | 0_2_0247326C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247326C mov eax, dword ptr fs:[00000030h] | 0_2_0247326C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247326C mov eax, dword ptr fs:[00000030h] | 0_2_0247326C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_0247326C mov eax, dword ptr fs:[00000030h] | 0_2_0247326C |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_024FF272 mov eax, dword ptr fs:[00000030h] | 0_2_024FF272 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_024FF272 mov eax, dword ptr fs:[00000030h] | 0_2_024FF272 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_024FF272 mov eax, dword ptr fs:[00000030h] | 0_2_024FF272 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_024AD213 mov eax, dword ptr fs:[00000030h] | 0_2_024AD213 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_02479237 mov eax, dword ptr fs:[00000030h] | 0_2_02479237 |
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.32303.15212.exe | Code function: 0_2_024F8237 mov ecx, dword ptr fs:[00000030h] | 0_2_024F8237 |