Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Marzec 2025-faktura.pdf.exe

Overview

General Information

Sample name:Marzec 2025-faktura.pdf.exe
Analysis ID:1627800
MD5:56858d56add3084f1053360062d83b43
SHA1:acbc29804f9516092988b85a49e0643d59011712
SHA256:0bca775fc5e307eab4c0bebc7515cfdd901eefb02bcdf258378dbe9d600abdcb
Tags:exeuser-cvcv
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Double Extension File Execution
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected FormBook
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Uses an obfuscated file name to hide its real file extension (double extension)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • Marzec 2025-faktura.pdf.exe (PID: 3180 cmdline: "C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exe" MD5: 56858D56ADD3084F1053360062D83B43)
    • svchost.exe (PID: 2960 cmdline: "C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • explorer.exe (PID: 4004 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
        • svchost.exe (PID: 6516 cmdline: "C:\Windows\SysWOW64\svchost.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
          • cmd.exe (PID: 2820 cmdline: /c del "C:\Windows\SysWOW64\svchost.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 716 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
{"C2 list": ["www.hoihitclbu.xyz/u023/"], "decoy": ["uggestionapi.xyz", "trat0buy5.shop", "ropcoin.world", "ehanika43-proremont.online", "ulsahguldali.online", "eson.fun", "361b7g7.xyz", "rudencecorporation.baby", "atewayrealestate.info", "elfi.day", "ental-implants-66019.bond", "i4workforce.online", "iunveiled.online", "hepurpleporpoise.fun", "ptinhub.net", "iotcopilots.xyz", "iemthexua.mobi", "he-finsgrow.net", "egashop.world", "ongbachkim55.net", "rumprat.fun", "emalhocateknik.info", "cuybzop.xyz", "pfwealthy.click", "egalamagia.net", "onstruiline.shop", "ophisticateddata.xyz", "jdbbw.xyz", "oldpay.online", "outhampton-cruises-2025.today", "avigateart.xyz", "mentix.tech", "xclusivepromodeals24.sbs", "ketchagi.xyz", "ysvision.online", "rimebs.online", "aluablecoins.shop", "ookdreamstudio.art", "aveenkumar.pro", "inio.cyou", "eans-hot.sbs", "hattype.shop", "riendswithbeverages.club", "olar-lights-089.bond", "ata-protection-98537.bond", "d-pen-45714.bond", "etwork-tools-348962211.click", "ydeardeer.net", "arcelkido.net", "ittleone.baby", "rotomedia.xyz", "ree-burial-pods-wars.sbs", "onfansub.xyz", "orgeskalender.online", "ixue.social", "tdgermanyfantasy.pro", "ickysminis.net", "ellbeingonline.shop", "opflash.media", "oodbrackets.xyz", "sheek.club", "uestelligence.net", "ontroldatabasiselitepioneer.xyz", "urewaterhq.net"]}
SourceRuleDescriptionAuthorStrings
00000003.00000002.4647167786.0000000002E30000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000003.00000002.4647167786.0000000002E30000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000003.00000002.4647167786.0000000002E30000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x6251:$a1: 3C 30 50 4F 53 54 74 09 40
      • 0x1cb80:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0xa9bf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      • 0x158a7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
      00000003.00000002.4647167786.0000000002E30000.00000004.00000800.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b72:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x156a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x157a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1591f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa58a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1440c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb283:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b8e7:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c8ea:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      00000003.00000002.4647167786.0000000002E30000.00000004.00000800.00020000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
      • 0x18809:$sqlite3step: 68 34 1C 7B E1
      • 0x1891c:$sqlite3step: 68 34 1C 7B E1
      • 0x18838:$sqlite3text: 68 38 2A 90 C5
      • 0x1895d:$sqlite3text: 68 38 2A 90 C5
      • 0x1884b:$sqlite3blob: 68 53 D8 7F 8C
      • 0x18973:$sqlite3blob: 68 53 D8 7F 8C
      Click to see the 34 entries
      SourceRuleDescriptionAuthorStrings
      1.2.svchost.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        1.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          1.2.svchost.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x5451:$a1: 3C 30 50 4F 53 54 74 09 40
          • 0x1bd80:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0x9bbf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
          • 0x14aa7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
          1.2.svchost.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x8b08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x8d72:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x148a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x14391:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x149a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x14b1f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x978a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1360c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xa483:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1aae7:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1baea:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          1.2.svchost.exe.400000.0.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
          • 0x17a09:$sqlite3step: 68 34 1C 7B E1
          • 0x17b1c:$sqlite3step: 68 34 1C 7B E1
          • 0x17a38:$sqlite3text: 68 38 2A 90 C5
          • 0x17b5d:$sqlite3text: 68 38 2A 90 C5
          • 0x17a4b:$sqlite3blob: 68 53 D8 7F 8C
          • 0x17b73:$sqlite3blob: 68 53 D8 7F 8C
          Click to see the 15 entries

          System Summary

          barindex
          Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exe", CommandLine: "C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exe, NewProcessName: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exe, OriginalFileName: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exe", ProcessId: 3180, ProcessName: Marzec 2025-faktura.pdf.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exe", CommandLine: "C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exe", ParentImage: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exe, ParentProcessId: 3180, ParentProcessName: Marzec 2025-faktura.pdf.exe, ProcessCommandLine: "C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exe", ProcessId: 2960, ProcessName: svchost.exe
          Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exe", CommandLine: "C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exe", ParentImage: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exe, ParentProcessId: 3180, ParentProcessName: Marzec 2025-faktura.pdf.exe, ProcessCommandLine: "C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exe", ProcessId: 2960, ProcessName: svchost.exe
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-03-03T08:33:27.135335+010020314531Malware Command and Control Activity Detected192.168.2.649987104.21.80.180TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 00000003.00000002.4647167786.0000000002E30000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.hoihitclbu.xyz/u023/"], "decoy": ["uggestionapi.xyz", "trat0buy5.shop", "ropcoin.world", "ehanika43-proremont.online", "ulsahguldali.online", "eson.fun", "361b7g7.xyz", "rudencecorporation.baby", "atewayrealestate.info", "elfi.day", "ental-implants-66019.bond", "i4workforce.online", "iunveiled.online", "hepurpleporpoise.fun", "ptinhub.net", "iotcopilots.xyz", "iemthexua.mobi", "he-finsgrow.net", "egashop.world", "ongbachkim55.net", "rumprat.fun", "emalhocateknik.info", "cuybzop.xyz", "pfwealthy.click", "egalamagia.net", "onstruiline.shop", "ophisticateddata.xyz", "jdbbw.xyz", "oldpay.online", "outhampton-cruises-2025.today", "avigateart.xyz", "mentix.tech", "xclusivepromodeals24.sbs", "ketchagi.xyz", "ysvision.online", "rimebs.online", "aluablecoins.shop", "ookdreamstudio.art", "aveenkumar.pro", "inio.cyou", "eans-hot.sbs", "hattype.shop", "riendswithbeverages.club", "olar-lights-089.bond", "ata-protection-98537.bond", "d-pen-45714.bond", "etwork-tools-348962211.click", "ydeardeer.net", "arcelkido.net", "ittleone.baby", "rotomedia.xyz", "ree-burial-pods-wars.sbs", "onfansub.xyz", "orgeskalender.online", "ixue.social", "tdgermanyfantasy.pro", "ickysminis.net", "ellbeingonline.shop", "opflash.media", "oodbrackets.xyz", "sheek.club", "uestelligence.net", "ontroldatabasiselitepioneer.xyz", "urewaterhq.net"]}
          Source: Marzec 2025-faktura.pdf.exeReversingLabs: Detection: 42%
          Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Marzec 2025-faktura.pdf.exe.2110000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Marzec 2025-faktura.pdf.exe.2110000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.4647167786.0000000002E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.4646847720.0000000002E00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2251503947.00000000038A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2251547387.00000000038D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.4643447879.00000000023D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2250802653.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2187435514.0000000002110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: Marzec 2025-faktura.pdf.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: Binary string: wntdll.pdbUGP source: Marzec 2025-faktura.pdf.exe, 00000000.00000003.2183845802.0000000003DF0000.00000004.00001000.00020000.00000000.sdmp, Marzec 2025-faktura.pdf.exe, 00000000.00000003.2185159501.0000000003F90000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.2185174064.0000000003700000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2251919484.0000000003C9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2251919484.0000000003B00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.2187581633.0000000003900000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2253183977.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.4647854617.00000000031DE000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2250978832.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.4647854617.0000000003040000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: svchost.exe, svchost.exe, 00000003.00000003.2253183977.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.4647854617.00000000031DE000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2250978832.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.4647854617.0000000003040000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: svchost.pdb source: svchost.exe, svchost.exe, 00000003.00000002.4646287770.0000000002A12000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.4648422635.000000000358F000.00000004.10000000.00040000.00000000.sdmp, svchost.exe, 00000003.00000002.4642370479.0000000000200000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: svchost.pdbUGP source: svchost.exe, 00000001.00000003.2250125078.0000000003426000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.2248999788.000000000341C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2251591239.0000000003900000.00000040.10000000.00040000.00000000.sdmp, explorer.exe, 00000002.00000002.4657535728.0000000010CAF000.00000004.80000000.00040000.00000000.sdmp, svchost.exe, 00000003.00000002.4646287770.0000000002A12000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.4648422635.000000000358F000.00000004.10000000.00040000.00000000.sdmp, svchost.exe, 00000003.00000002.4642370479.0000000000200000.00000040.80000000.00040000.00000000.sdmp
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0078445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0078445A
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0078C6D1 FindFirstFileW,FindClose,0_2_0078C6D1
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0078C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0078C75C
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0078EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0078EF95
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0078F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0078F0F2
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0078F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0078F3F3
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007837EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007837EF
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_00783B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00783B12
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0078BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0078BCBC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then pop ebx1_2_00407B1E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then pop edi1_2_00417D78
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then pop ebx3_2_023D7B1E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then pop edi3_2_023E7D78

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2031412 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.6:49987 -> 104.21.80.1:80
          Source: Network trafficSuricata IDS: 2031449 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.6:49987 -> 104.21.80.1:80
          Source: Network trafficSuricata IDS: 2031453 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.6:49987 -> 104.21.80.1:80
          Source: C:\Windows\explorer.exeNetwork Connect: 104.21.80.1 80Jump to behavior
          Source: Malware configuration extractorURLs: www.hoihitclbu.xyz/u023/
          Source: DNS query: www.hoihitclbu.xyz
          Source: DNS query: www.ketchagi.xyz
          Source: global trafficHTTP traffic detected: GET /u023/?lneDc=2js00DxFGjY6gHlVOW1q9a10L3HzPIs7WpRmaT2A/LnakQk0VzYAjcxSKMUcEwKHsPPKaiHoQA==&NvExnX=FrapFFYPB HTTP/1.1Host: www.oldpay.onlineConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 104.21.80.1 104.21.80.1
          Source: Joe Sandbox ViewIP Address: 104.21.80.1 104.21.80.1
          Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007922EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_007922EE
          Source: global trafficHTTP traffic detected: GET /u023/?lneDc=2js00DxFGjY6gHlVOW1q9a10L3HzPIs7WpRmaT2A/LnakQk0VzYAjcxSKMUcEwKHsPPKaiHoQA==&NvExnX=FrapFFYPB HTTP/1.1Host: www.oldpay.onlineConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficDNS traffic detected: DNS query: www.orgeskalender.online
          Source: global trafficDNS traffic detected: DNS query: www.hoihitclbu.xyz
          Source: global trafficDNS traffic detected: DNS query: www.trat0buy5.shop
          Source: global trafficDNS traffic detected: DNS query: www.oldpay.online
          Source: global trafficDNS traffic detected: DNS query: www.he-finsgrow.net
          Source: global trafficDNS traffic detected: DNS query: www.inio.cyou
          Source: global trafficDNS traffic detected: DNS query: www.tdgermanyfantasy.pro
          Source: global trafficDNS traffic detected: DNS query: www.ketchagi.xyz
          Source: global trafficDNS traffic detected: DNS query: www.iunveiled.online
          Source: global trafficDNS traffic detected: DNS query: www.arcelkido.net
          Source: explorer.exe, 00000002.00000000.2195604470.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2195604470.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4651466079.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4651466079.000000000978C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
          Source: explorer.exe, 00000002.00000000.2195604470.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2195604470.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4651466079.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4651466079.000000000978C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
          Source: explorer.exe, 00000002.00000000.2195604470.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2195604470.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4651466079.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4651466079.000000000978C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
          Source: explorer.exe, 00000002.00000000.2195604470.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2195604470.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4651466079.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4651466079.000000000978C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
          Source: explorer.exe, 00000002.00000000.2195604470.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4651466079.000000000962B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
          Source: explorer.exe, 00000002.00000002.4647411529.00000000028A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000002.4650482441.0000000007B50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2194002650.0000000007B60000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.arcelkido.net
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.arcelkido.net/u023/
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.arcelkido.net/u023/www.ysvision.online
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.arcelkido.netReferer:
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ata-protection-98537.bond
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ata-protection-98537.bond/u023/
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ata-protection-98537.bond/u023/www.ixue.social
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ata-protection-98537.bondReferer:
          Source: explorer.exe, 00000002.00000003.2979768880.000000000C354000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2209836863.000000000C354000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981097239.000000000C40D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980805146.000000000C35C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.cuybzop.xyz
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.cuybzop.xyz/u023/
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.cuybzop.xyz/u023/www.inio.cyou
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.cuybzop.xyzReferer:
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.he-finsgrow.net
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.he-finsgrow.net/u023/
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.he-finsgrow.net/u023/www.cuybzop.xyz
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.he-finsgrow.netReferer:
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.hoihitclbu.xyz
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.hoihitclbu.xyz/u023/
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.hoihitclbu.xyz/u023/www.trat0buy5.shop
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.hoihitclbu.xyzReferer:
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.inio.cyou
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.inio.cyou/u023/
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.inio.cyou/u023/www.tdgermanyfantasy.pro
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.inio.cyouReferer:
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.iunveiled.online
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.iunveiled.online/u023/
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.iunveiled.online/u023/www.arcelkido.net
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.iunveiled.onlineReferer:
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ixue.social
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ixue.social/u023/
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ixue.social/u023/www.jdbbw.xyz
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ixue.socialReferer:
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.jdbbw.xyz
          Source: explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.jdbbw.xyz/u023/
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.jdbbw.xyzReferer:
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ketchagi.xyz
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ketchagi.xyz/u023/
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ketchagi.xyz/u023/www.iunveiled.online
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ketchagi.xyzReferer:
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.oldpay.online
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.oldpay.online/u023/
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.oldpay.online/u023/www.he-finsgrow.net
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.oldpay.onlineReferer:
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.orgeskalender.online
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.orgeskalender.online/u023/
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.orgeskalender.online/u023/www.hoihitclbu.xyz
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.orgeskalender.onlineReferer:
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.rumprat.fun
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.rumprat.fun/u023/
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.rumprat.fun/u023/www.ata-protection-98537.bond
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.rumprat.funReferer:
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.tdgermanyfantasy.pro
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.tdgermanyfantasy.pro/u023/
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.tdgermanyfantasy.pro/u023/www.ketchagi.xyz
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.tdgermanyfantasy.proReferer:
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.trat0buy5.shop
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.trat0buy5.shop/u023/
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.trat0buy5.shop/u023/www.oldpay.online
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.trat0buy5.shopReferer:
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ysvision.online
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ysvision.online/u023/
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ysvision.online/u023/www.rumprat.fun
          Source: explorer.exe, 00000002.00000003.3075182357.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980755941.000000000C547000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2980556903.000000000C519000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.2981030681.000000000C567000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4656767819.000000000C54E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ysvision.onlineReferer:
          Source: explorer.exe, 00000002.00000000.2196234913.00000000099AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
          Source: explorer.exe, 00000002.00000000.2209836863.000000000BFDF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
          Source: explorer.exe, 00000002.00000000.2195604470.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4651466079.000000000962B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
          Source: explorer.exe, 00000002.00000000.2192583142.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4649405454.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=435B7A89D7D74BDF801F2DA188906BAF&timeOut=5000&oc
          Source: explorer.exe, 00000002.00000000.2192583142.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4649405454.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
          Source: explorer.exe, 00000002.00000000.2195604470.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4651466079.000000000973C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.com
          Source: explorer.exe, 00000002.00000002.4649405454.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
          Source: explorer.exe, 00000002.00000002.4649405454.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
          Source: explorer.exe, 00000002.00000002.4649405454.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
          Source: explorer.exe, 00000002.00000002.4649405454.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
          Source: explorer.exe, 00000002.00000000.2192583142.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4649405454.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz
          Source: explorer.exe, 00000002.00000000.2192583142.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4649405454.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz-dark
          Source: explorer.exe, 00000002.00000002.4655176709.000000000C048000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2209836863.000000000C048000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com-
          Source: explorer.exe, 00000002.00000002.4649405454.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
          Source: explorer.exe, 00000002.00000000.2192583142.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4649405454.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAzME7S.img
          Source: explorer.exe, 00000002.00000002.4655176709.000000000C048000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2209836863.000000000C048000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.come
          Source: explorer.exe, 00000002.00000000.2209836863.000000000BFEF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4655176709.000000000BFEF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comEMd
          Source: explorer.exe, 00000002.00000000.2192583142.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4649405454.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
          Source: explorer.exe, 00000002.00000000.2192583142.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4649405454.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
          Source: explorer.exe, 00000002.00000000.2196234913.00000000099AB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4651986176.00000000099AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/e
          Source: explorer.exe, 00000002.00000002.4655176709.000000000C048000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2209836863.000000000C048000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.comM
          Source: explorer.exe, 00000002.00000000.2192583142.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4649405454.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/10-things-rich-people-never-buy-and-you-shouldn-t-ei
          Source: explorer.exe, 00000002.00000000.2192583142.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4649405454.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/money-matters-changing-institution-of-marriage/ar-AA
          Source: explorer.exe, 00000002.00000000.2192583142.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4649405454.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
          Source: explorer.exe, 00000002.00000000.2192583142.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4649405454.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/savingandinvesting/americans-average-net-worth-by-age/ar-AA1h4ngF
          Source: explorer.exe, 00000002.00000000.2192583142.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4649405454.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/how-donald-trump-helped-kari-lake-become-arizona-s-and-ameri
          Source: explorer.exe, 00000002.00000000.2192583142.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4649405454.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/kevin-mccarthy-s-ouster-as-house-speaker-could-cost-gop-its-
          Source: explorer.exe, 00000002.00000000.2192583142.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4649405454.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/republicans-already-barred-trump-from-being-speaker-of-the-h
          Source: explorer.exe, 00000002.00000000.2192583142.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4649405454.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/trump-campaign-says-he-raised-more-than-45-million-in-3rd-qu
          Source: explorer.exe, 00000002.00000000.2192583142.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4649405454.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/technology/a-federal-emergency-alert-will-be-sent-to-us-phones-nation
          Source: explorer.exe, 00000002.00000000.2192583142.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4649405454.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/biden-administration-waives-26-federal-laws-to-allow-border-wall-c
          Source: explorer.exe, 00000002.00000000.2192583142.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4649405454.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
          Source: explorer.exe, 00000002.00000000.2192583142.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4649405454.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/us-supplies-ukraine-with-a-million-rounds-of-ammunition-seized-
          Source: explorer.exe, 00000002.00000000.2192583142.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4649405454.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/travel/news/you-can-t-beat-bobby-flay-s-phoenix-airport-restaurant-one-of-
          Source: explorer.exe, 00000002.00000000.2192583142.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4649405454.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/california-s-reservoirs-runneth-over-in-astounding-reve
          Source: explorer.exe, 00000002.00000000.2192583142.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4649405454.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
          Source: explorer.exe, 00000002.00000002.4657535728.000000001119F000.00000004.80000000.00040000.00000000.sdmp, svchost.exe, 00000003.00000002.4648422635.0000000003A7F000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.oldpay.online/u023/?lneDc=2js00DxFGjY6gHlVOW1q9a10L3HzPIs7WpRmaT2A/LnakQk0VzYAjcxSKMUcEw
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_00794164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00794164
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_00794164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00794164
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_00793F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00793F66
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0078001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_0078001C
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007ACABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_007ACABC

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Marzec 2025-faktura.pdf.exe.2110000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Marzec 2025-faktura.pdf.exe.2110000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.4647167786.0000000002E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.4646847720.0000000002E00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2251503947.00000000038A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2251547387.00000000038D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.4643447879.00000000023D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2250802653.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2187435514.0000000002110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.Marzec 2025-faktura.pdf.exe.2110000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 0.2.Marzec 2025-faktura.pdf.exe.2110000.1.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.Marzec 2025-faktura.pdf.exe.2110000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.Marzec 2025-faktura.pdf.exe.2110000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 0.2.Marzec 2025-faktura.pdf.exe.2110000.1.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.Marzec 2025-faktura.pdf.exe.2110000.1.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000002.4647167786.0000000002E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000003.00000002.4647167786.0000000002E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000002.4647167786.0000000002E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000002.4646847720.0000000002E00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000003.00000002.4646847720.0000000002E00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000002.4646847720.0000000002E00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000002.2251503947.00000000038A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000001.00000002.2251503947.00000000038A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000002.2251503947.00000000038A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000002.2251547387.00000000038D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000001.00000002.2251547387.00000000038D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000002.2251547387.00000000038D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000002.4643447879.00000000023D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000003.00000002.4643447879.00000000023D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000002.4643447879.00000000023D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000002.2250802653.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000001.00000002.2250802653.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000002.2250802653.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.2187435514.0000000002110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000000.00000002.2187435514.0000000002110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.2187435514.0000000002110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: Process Memory Space: Marzec 2025-faktura.pdf.exe PID: 3180, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: svchost.exe PID: 2960, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: explorer.exe PID: 4004, type: MEMORYSTRMatched rule: Semi-Auto-generated - file ironshell.php.txt Author: Neo23x0 Yara BRG + customization by Stefan -dfate- Molls
          Source: Process Memory Space: svchost.exe PID: 6516, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: This is a third-party compiled AutoIt script.0_2_00723B3A
          Source: Marzec 2025-faktura.pdf.exeString found in binary or memory: This is a third-party compiled AutoIt script.
          Source: Marzec 2025-faktura.pdf.exe, 00000000.00000002.2186363759.00000000007D4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_f135eb2e-4
          Source: Marzec 2025-faktura.pdf.exe, 00000000.00000002.2186363759.00000000007D4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_67ec9fc3-5
          Source: Marzec 2025-faktura.pdf.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_64bab537-4
          Source: Marzec 2025-faktura.pdf.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_41d77438-c
          Source: initial sampleStatic PE information: Filename: Marzec 2025-faktura.pdf.exe
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041A320 NtCreateFile,1_2_0041A320
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041A3D0 NtReadFile,1_2_0041A3D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041A450 NtClose,1_2_0041A450
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041A500 NtAllocateVirtualMemory,1_2_0041A500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041A3CF NtReadFile,1_2_0041A3CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041A44F NtClose,1_2_0041A44F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041A4FA NtAllocateVirtualMemory,1_2_0041A4FA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72BF0 NtAllocateVirtualMemory,LdrInitializeThunk,1_2_03B72BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72B60 NtClose,LdrInitializeThunk,1_2_03B72B60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72AD0 NtReadFile,LdrInitializeThunk,1_2_03B72AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72FB0 NtResumeThread,LdrInitializeThunk,1_2_03B72FB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72F90 NtProtectVirtualMemory,LdrInitializeThunk,1_2_03B72F90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72FE0 NtCreateFile,LdrInitializeThunk,1_2_03B72FE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72F30 NtCreateSection,LdrInitializeThunk,1_2_03B72F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72EA0 NtAdjustPrivilegesToken,LdrInitializeThunk,1_2_03B72EA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72E80 NtReadVirtualMemory,LdrInitializeThunk,1_2_03B72E80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72DF0 NtQuerySystemInformation,LdrInitializeThunk,1_2_03B72DF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72DD0 NtDelayExecution,LdrInitializeThunk,1_2_03B72DD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72D30 NtUnmapViewOfSection,LdrInitializeThunk,1_2_03B72D30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72D10 NtMapViewOfSection,LdrInitializeThunk,1_2_03B72D10
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72CA0 NtQueryInformationToken,LdrInitializeThunk,1_2_03B72CA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B74340 NtSetContextThread,1_2_03B74340
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B74650 NtSuspendThread,1_2_03B74650
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72BA0 NtEnumerateValueKey,1_2_03B72BA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72B80 NtQueryInformationFile,1_2_03B72B80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72BE0 NtQueryValueKey,1_2_03B72BE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72AB0 NtWaitForSingleObject,1_2_03B72AB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72AF0 NtWriteFile,1_2_03B72AF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72FA0 NtQuerySection,1_2_03B72FA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72F60 NtCreateProcessEx,1_2_03B72F60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72EE0 NtQueueApcThread,1_2_03B72EE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72E30 NtWriteVirtualMemory,1_2_03B72E30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72DB0 NtEnumerateKey,1_2_03B72DB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72D00 NtSetInformationFile,1_2_03B72D00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72CF0 NtOpenProcess,1_2_03B72CF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72CC0 NtQueryVirtualMemory,1_2_03B72CC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72C00 NtQueryInformationProcess,1_2_03B72C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72C70 NtFreeVirtualMemory,1_2_03B72C70
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72C60 NtCreateKey,1_2_03B72C60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B73090 NtSetValueKey,1_2_03B73090
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B73010 NtOpenDirectoryObject,1_2_03B73010
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B735C0 NtCreateMutant,1_2_03B735C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B739B0 NtGetContextThread,1_2_03B739B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B73D10 NtOpenProcessToken,1_2_03B73D10
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B73D70 NtOpenThread,1_2_03B73D70
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADA036 NtQueryInformationProcess,NtSuspendThread,NtSetContextThread,NtQueueApcThread,NtResumeThread,NtClose,1_2_03ADA036
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADA042 NtQueryInformationProcess,1_2_03ADA042
          Source: C:\Windows\explorer.exeCode function: 2_2_114ACE12 NtProtectVirtualMemory,2_2_114ACE12
          Source: C:\Windows\explorer.exeCode function: 2_2_114AB232 NtCreateFile,2_2_114AB232
          Source: C:\Windows\explorer.exeCode function: 2_2_114ACE0A NtProtectVirtualMemory,2_2_114ACE0A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00202720 RegOpenKeyExW,RegOpenKeyExW,RegOpenKeyExW,RegCloseKey,RegCloseKey,HeapAlloc,RegQueryValueExW,ExpandEnvironmentStringsW,LCMapStringW,RegQueryValueExW,HeapFree,AcquireSRWLockShared,ReleaseSRWLockShared,HeapAlloc,memcpy,memcpy,AcquireSRWLockExclusive,ReleaseSRWLockExclusive,RegGetValueW,ActivateActCtx,LoadLibraryExW,MultiByteToWideChar,RtlRunOnceExecuteOnce,NtQuerySystemInformation,GetProcAddress,DeactivateActCtx,ActivateActCtx,MultiByteToWideChar,RtlRunOnceExecuteOnce,NtQuerySystemInformation,GetProcAddress,DeactivateActCtx,ActivateActCtx,MultiByteToWideChar,RtlRunOnceExecuteOnce,NtQuerySystemInformation,GetProcAddress,DeactivateActCtx,RegCloseKey,HeapAlloc,RegGetValueW,WideCharToMultiByte,HeapAlloc,WideCharToMultiByte,HeapFree,ExpandEnvironmentStringsW,HeapFree,CreateActCtxW,GetLastError,HeapFree,HeapFree,GetLastError,CreateActCtxW,GetLastError,ReleaseActCtx,GetLastError,GetLastError,RtlNtStatusToDosError,GetLastError,LoadLibraryExW,RtlNtStatusToDosError,LoadLibraryExW,RtlNtStatusToDosError,HeapFree,ReleaseActCtx,3_2_00202720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00203540 RtlImageNtHeader,RpcMgmtSetServerStackSize,I_RpcServerDisableExceptionFilter,RtlSetProcessIsCritical,SetProcessMitigationPolicy,SetProcessMitigationPolicy,SetProcessMitigationPolicy,SetProtectedPolicy,HeapSetInformation,NtSetInformationProcess,3_2_00203540
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002033C0 NtSetInformationProcess,SetUnhandledExceptionFilter,SetErrorMode,GetProcessHeap,InitializeSRWLock,InitializeSRWLock,RegDisablePredefinedCacheEx,EventRegister,GetCommandLineW,memset,GetCurrentProcess,NtSetInformationProcess,HeapFree,HeapFree,ExitProcess,GetCurrentProcess,SetProcessAffinityUpdateMode,3_2_002033C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2B60 NtClose,LdrInitializeThunk,3_2_030B2B60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2BE0 NtQueryValueKey,LdrInitializeThunk,3_2_030B2BE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2BF0 NtAllocateVirtualMemory,LdrInitializeThunk,3_2_030B2BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2AD0 NtReadFile,LdrInitializeThunk,3_2_030B2AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2F30 NtCreateSection,LdrInitializeThunk,3_2_030B2F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2FE0 NtCreateFile,LdrInitializeThunk,3_2_030B2FE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2EA0 NtAdjustPrivilegesToken,LdrInitializeThunk,3_2_030B2EA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2D10 NtMapViewOfSection,LdrInitializeThunk,3_2_030B2D10
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2DD0 NtDelayExecution,LdrInitializeThunk,3_2_030B2DD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2DF0 NtQuerySystemInformation,LdrInitializeThunk,3_2_030B2DF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2C60 NtCreateKey,LdrInitializeThunk,3_2_030B2C60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2C70 NtFreeVirtualMemory,LdrInitializeThunk,3_2_030B2C70
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2CA0 NtQueryInformationToken,LdrInitializeThunk,3_2_030B2CA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B35C0 NtCreateMutant,LdrInitializeThunk,3_2_030B35C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B4340 NtSetContextThread,3_2_030B4340
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B4650 NtSuspendThread,3_2_030B4650
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2B80 NtQueryInformationFile,3_2_030B2B80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2BA0 NtEnumerateValueKey,3_2_030B2BA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2AB0 NtWaitForSingleObject,3_2_030B2AB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2AF0 NtWriteFile,3_2_030B2AF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2F60 NtCreateProcessEx,3_2_030B2F60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2F90 NtProtectVirtualMemory,3_2_030B2F90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2FA0 NtQuerySection,3_2_030B2FA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2FB0 NtResumeThread,3_2_030B2FB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2E30 NtWriteVirtualMemory,3_2_030B2E30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2E80 NtReadVirtualMemory,3_2_030B2E80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2EE0 NtQueueApcThread,3_2_030B2EE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2D00 NtSetInformationFile,3_2_030B2D00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2D30 NtUnmapViewOfSection,3_2_030B2D30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2DB0 NtEnumerateKey,3_2_030B2DB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2C00 NtQueryInformationProcess,3_2_030B2C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2CC0 NtQueryVirtualMemory,3_2_030B2CC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2CF0 NtOpenProcess,3_2_030B2CF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B3010 NtOpenDirectoryObject,3_2_030B3010
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B3090 NtSetValueKey,3_2_030B3090
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B39B0 NtGetContextThread,3_2_030B39B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B3D10 NtOpenProcessToken,3_2_030B3D10
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B3D70 NtOpenThread,3_2_030B3D70
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_023EA320 NtCreateFile,3_2_023EA320
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_023EA3D0 NtReadFile,3_2_023EA3D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_023EA450 NtClose,3_2_023EA450
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_023EA500 NtAllocateVirtualMemory,3_2_023EA500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_023EA3CF NtReadFile,3_2_023EA3CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_023EA44F NtClose,3_2_023EA44F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_023EA4FA NtAllocateVirtualMemory,3_2_023EA4FA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F09BAF NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtUnmapViewOfSection,NtClose,3_2_02F09BAF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F0A036 NtQueryInformationProcess,NtSuspendThread,NtSetContextThread,NtQueueApcThread,NtResumeThread,3_2_02F0A036
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F09BB2 NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,3_2_02F09BB2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F0A042 NtQueryInformationProcess,3_2_02F0A042
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0078A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_0078A1EF
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_00778310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00778310
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007851BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_007851BD
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0072E6A00_2_0072E6A0
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0074D9750_2_0074D975
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0072FCE00_2_0072FCE0
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007421C50_2_007421C5
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007562D20_2_007562D2
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007A03DA0_2_007A03DA
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0075242E0_2_0075242E
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007425FA0_2_007425FA
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0077E6160_2_0077E616
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007366E10_2_007366E1
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0075878F0_2_0075878F
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007A08570_2_007A0857
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007568440_2_00756844
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007388080_2_00738808
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007888890_2_00788889
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0074CB210_2_0074CB21
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_00756DB60_2_00756DB6
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_00736F9E0_2_00736F9E
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007330300_2_00733030
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0074F1D90_2_0074F1D9
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007431870_2_00743187
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007212870_2_00721287
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007414840_2_00741484
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007355200_2_00735520
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007476960_2_00747696
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007357600_2_00735760
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007419780_2_00741978
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_00759AB50_2_00759AB5
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007A7DDB0_2_007A7DDB
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0074BDA60_2_0074BDA6
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_00741D900_2_00741D90
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0072DF000_2_0072DF00
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_00733FE00_2_00733FE0
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_014B6D680_2_014B6D68
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004010271_2_00401027
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004010301_2_00401030
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041E3441_2_0041E344
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041E54F1_2_0041E54F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00402D8D1_2_00402D8D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00402D901_2_00402D90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00409E4B1_2_00409E4B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00409E501_2_00409E50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041D73E1_2_0041D73E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00402FB01_2_00402FB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C003E61_2_03C003E6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4E3F01_2_03B4E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFA3521_2_03BFA352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC02C01_2_03BC02C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE02741_2_03BE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF41A21_2_03BF41A2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C001AA1_2_03C001AA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF81CC1_2_03BF81CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDA1181_2_03BDA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B301001_2_03B30100
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC81581_2_03BC8158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD20001_2_03BD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3C7C01_2_03B3C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B407701_2_03B40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B647501_2_03B64750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5C6E01_2_03B5C6E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C005911_2_03C00591
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B405351_2_03B40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BEE4F61_2_03BEE4F6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE44201_2_03BE4420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF24461_2_03BF2446
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF6BD71_2_03BF6BD7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFAB401_2_03BFAB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3EA801_2_03B3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B429A01_2_03B429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C0A9A61_2_03C0A9A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B569621_2_03B56962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B268B81_2_03B268B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6E8F01_2_03B6E8F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4A8401_2_03B4A840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B428401_2_03B42840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BBEFA01_2_03BBEFA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4CFE01_2_03B4CFE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B32FC81_2_03B32FC8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B60F301_2_03B60F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE2F301_2_03BE2F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B82F281_2_03B82F28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB4F401_2_03BB4F40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B52E901_2_03B52E90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFCE931_2_03BFCE93
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFEEDB1_2_03BFEEDB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFEE261_2_03BFEE26
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40E591_2_03B40E59
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B58DBF1_2_03B58DBF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3ADE01_2_03B3ADE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDCD1F1_2_03BDCD1F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4AD001_2_03B4AD00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE0CB51_2_03BE0CB5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B30CF21_2_03B30CF2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40C001_2_03B40C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B8739A1_2_03B8739A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF132D1_2_03BF132D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2D34C1_2_03B2D34C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B452A01_2_03B452A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE12ED1_2_03BE12ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5B2C01_2_03B5B2C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4B1B01_2_03B4B1B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C0B16B1_2_03C0B16B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2F1721_2_03B2F172
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B7516C1_2_03B7516C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF70E91_2_03BF70E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFF0E01_2_03BFF0E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BEF0CC1_2_03BEF0CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B470C01_2_03B470C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFF7B01_2_03BFF7B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF16CC1_2_03BF16CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B856301_2_03B85630
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C095C31_2_03C095C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDD5B01_2_03BDD5B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF75711_2_03BF7571
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFF43F1_2_03BFF43F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B314601_2_03B31460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5FB801_2_03B5FB80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB5BF01_2_03BB5BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B7DBF91_2_03B7DBF9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFFB761_2_03BFFB76
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDDAAC1_2_03BDDAAC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B85AA01_2_03B85AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE1AA31_2_03BE1AA3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BEDAC61_2_03BEDAC6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB3A6C1_2_03BB3A6C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFFA491_2_03BFFA49
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF7A461_2_03BF7A46
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD59101_2_03BD5910
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B499501_2_03B49950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5B9501_2_03B5B950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B438E01_2_03B438E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAD8001_2_03BAD800
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFFFB11_2_03BFFFB1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B41F921_2_03B41F92
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFFF091_2_03BFFF09
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B49EB01_2_03B49EB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5FDC01_2_03B5FDC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF7D731_2_03BF7D73
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF1D5A1_2_03BF1D5A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B43D401_2_03B43D40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFFCF21_2_03BFFCF2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB9C321_2_03BB9C32
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADA0361_2_03ADA036
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADB2321_2_03ADB232
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AD10821_2_03AD1082
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADE5CD1_2_03ADE5CD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AD5B301_2_03AD5B30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AD5B321_2_03AD5B32
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AD89121_2_03AD8912
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AD2D021_2_03AD2D02
          Source: C:\Windows\explorer.exeCode function: 2_2_109FB0822_2_109FB082
          Source: C:\Windows\explorer.exeCode function: 2_2_10A040362_2_10A04036
          Source: C:\Windows\explorer.exeCode function: 2_2_10A085CD2_2_10A085CD
          Source: C:\Windows\explorer.exeCode function: 2_2_109FCD022_2_109FCD02
          Source: C:\Windows\explorer.exeCode function: 2_2_10A029122_2_10A02912
          Source: C:\Windows\explorer.exeCode function: 2_2_10A052322_2_10A05232
          Source: C:\Windows\explorer.exeCode function: 2_2_109FFB322_2_109FFB32
          Source: C:\Windows\explorer.exeCode function: 2_2_109FFB302_2_109FFB30
          Source: C:\Windows\explorer.exeCode function: 2_2_114AB2322_2_114AB232
          Source: C:\Windows\explorer.exeCode function: 2_2_114A2D022_2_114A2D02
          Source: C:\Windows\explorer.exeCode function: 2_2_114A89122_2_114A8912
          Source: C:\Windows\explorer.exeCode function: 2_2_114A5B322_2_114A5B32
          Source: C:\Windows\explorer.exeCode function: 2_2_114A5B302_2_114A5B30
          Source: C:\Windows\explorer.exeCode function: 2_2_114AE5CD2_2_114AE5CD
          Source: C:\Windows\explorer.exeCode function: 2_2_114AA0362_2_114AA036
          Source: C:\Windows\explorer.exeCode function: 2_2_114A10822_2_114A1082
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002027203_2_00202720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313A3523_2_0313A352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031403E63_2_031403E6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0308E3F03_2_0308E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031202743_2_03120274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031002C03_2_031002C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030701003_2_03070100
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0311A1183_2_0311A118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031081583_2_03108158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031341A23_2_031341A2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031401AA3_2_031401AA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031381CC3_2_031381CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031120003_2_03112000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030A47503_2_030A4750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030807703_2_03080770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0307C7C03_2_0307C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0309C6E03_2_0309C6E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030805353_2_03080535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031405913_2_03140591
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031244203_2_03124420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031324463_2_03132446
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0312E4F63_2_0312E4F6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313AB403_2_0313AB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03136BD73_2_03136BD7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0307EA803_2_0307EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030969623_2_03096962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030829A03_2_030829A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0314A9A63_2_0314A9A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0308A8403_2_0308A840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030828403_2_03082840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030668B83_2_030668B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030AE8F03_2_030AE8F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03122F303_2_03122F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030C2F283_2_030C2F28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030A0F303_2_030A0F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030F4F403_2_030F4F40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030FEFA03_2_030FEFA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072FC83_2_03072FC8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0308CFE03_2_0308CFE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313EE263_2_0313EE26
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03080E593_2_03080E59
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313CE933_2_0313CE93
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03092E903_2_03092E90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313EEDB3_2_0313EEDB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0308AD003_2_0308AD00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0311CD1F3_2_0311CD1F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03098DBF3_2_03098DBF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0307ADE03_2_0307ADE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03080C003_2_03080C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03120CB53_2_03120CB5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03070CF23_2_03070CF2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313132D3_2_0313132D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306D34C3_2_0306D34C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030C739A3_2_030C739A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030852A03_2_030852A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0309B2C03_2_0309B2C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031212ED3_2_031212ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B516C3_2_030B516C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306F1723_2_0306F172
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0314B16B3_2_0314B16B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0308B1B03_2_0308B1B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030870C03_2_030870C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0312F0CC3_2_0312F0CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313F0E03_2_0313F0E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031370E93_2_031370E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313F7B03_2_0313F7B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030C56303_2_030C5630
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031316CC3_2_031316CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031375713_2_03137571
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0311D5B03_2_0311D5B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031495C33_2_031495C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313F43F3_2_0313F43F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030714603_2_03071460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313FB763_2_0313FB76
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0309FB803_2_0309FB80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030BDBF93_2_030BDBF9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030F5BF03_2_030F5BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03137A463_2_03137A46
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313FA493_2_0313FA49
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030F3A6C3_2_030F3A6C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030C5AA03_2_030C5AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03121AA33_2_03121AA3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0311DAAC3_2_0311DAAC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0312DAC63_2_0312DAC6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031159103_2_03115910
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030899503_2_03089950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0309B9503_2_0309B950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030ED8003_2_030ED800
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030838E03_2_030838E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313FF093_2_0313FF09
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03081F923_2_03081F92
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313FFB13_2_0313FFB1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03043FD53_2_03043FD5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03043FD23_2_03043FD2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03089EB03_2_03089EB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03083D403_2_03083D40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03131D5A3_2_03131D5A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03137D733_2_03137D73
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0309FDC03_2_0309FDC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030F9C323_2_030F9C32
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313FCF23_2_0313FCF2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_023EE3443_2_023EE344
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_023EE54F3_2_023EE54F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_023D9E503_2_023D9E50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_023D9E4B3_2_023D9E4B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_023D2FB03_2_023D2FB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_023D2D903_2_023D2D90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_023D2D8D3_2_023D2D8D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F0A0363_2_02F0A036
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F0B2323_2_02F0B232
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F05B303_2_02F05B30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F05B323_2_02F05B32
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F010823_2_02F01082
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F089123_2_02F08912
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F0E5CD3_2_02F0E5CD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F02D023_2_02F02D02
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03BAEA12 appears 86 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 030FF290 appears 105 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03B75130 appears 58 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03BBF290 appears 105 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03B2B970 appears 280 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03B87E54 appears 111 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 030EEA12 appears 86 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0306B970 appears 280 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 030B5130 appears 58 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 030C7E54 appears 111 times
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: String function: 00748900 appears 42 times
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: String function: 00727DE1 appears 36 times
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: String function: 00740AE3 appears 70 times
          Source: Marzec 2025-faktura.pdf.exe, 00000000.00000003.2183075731.00000000040BD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Marzec 2025-faktura.pdf.exe
          Source: Marzec 2025-faktura.pdf.exe, 00000000.00000003.2184986675.0000000003F13000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Marzec 2025-faktura.pdf.exe
          Source: Marzec 2025-faktura.pdf.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.Marzec 2025-faktura.pdf.exe.2110000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 0.2.Marzec 2025-faktura.pdf.exe.2110000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.Marzec 2025-faktura.pdf.exe.2110000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.Marzec 2025-faktura.pdf.exe.2110000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 0.2.Marzec 2025-faktura.pdf.exe.2110000.1.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.Marzec 2025-faktura.pdf.exe.2110000.1.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000002.4647167786.0000000002E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000003.00000002.4647167786.0000000002E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000002.4647167786.0000000002E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000002.4646847720.0000000002E00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000003.00000002.4646847720.0000000002E00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000002.4646847720.0000000002E00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000002.2251503947.00000000038A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000001.00000002.2251503947.00000000038A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000002.2251503947.00000000038A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000002.2251547387.00000000038D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000001.00000002.2251547387.00000000038D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000002.2251547387.00000000038D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000002.4643447879.00000000023D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000003.00000002.4643447879.00000000023D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000002.4643447879.00000000023D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000002.2250802653.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000001.00000002.2250802653.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000002.2250802653.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.2187435514.0000000002110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000000.00000002.2187435514.0000000002110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.2187435514.0000000002110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: Process Memory Space: Marzec 2025-faktura.pdf.exe PID: 3180, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: svchost.exe PID: 2960, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: explorer.exe PID: 4004, type: MEMORYSTRMatched rule: ironshell_php author = Neo23x0 Yara BRG + customization by Stefan -dfate- Molls, description = Semi-Auto-generated - file ironshell.php.txt, hash = 8bfa2eeb8a3ff6afc619258e39fded56
          Source: Process Memory Space: svchost.exe PID: 6516, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: classification engineClassification label: mal100.troj.evad.winEXE@8/2@10/1
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0078A06A GetLastError,FormatMessageW,0_2_0078A06A
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007781CB AdjustTokenPrivileges,CloseHandle,0_2_007781CB
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007787E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_007787E1
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0078B333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0078B333
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0079EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0079EE0D
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007983BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_007983BB
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_00724E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00724E89
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00203360 I_RegisterSvchostNotificationCallback,StartServiceCtrlDispatcherW,ExitProcess,3_2_00203360
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00203360 I_RegisterSvchostNotificationCallback,StartServiceCtrlDispatcherW,ExitProcess,3_2_00203360
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:716:120:WilError_03
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\aut268C.tmpJump to behavior
          Source: Marzec 2025-faktura.pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: Marzec 2025-faktura.pdf.exeReversingLabs: Detection: 42%
          Source: unknownProcess created: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exe "C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exe"
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exe"
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Windows\SysWOW64\svchost.exe"
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Windows\SysWOW64\svchost.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exe"Jump to behavior
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Windows\SysWOW64\svchost.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Windows\SysWOW64\svchost.exe"Jump to behavior
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: windows.cloudstore.schema.shell.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: mfsrcsnk.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: vcruntime140_1.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: msvcp140.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{50CE75BC-766C-4136-BF5E-9197AA23569E}\InProcServer32Jump to behavior
          Source: Marzec 2025-faktura.pdf.exeStatic file information: File size 1086976 > 1048576
          Source: Marzec 2025-faktura.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
          Source: Marzec 2025-faktura.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
          Source: Marzec 2025-faktura.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
          Source: Marzec 2025-faktura.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Marzec 2025-faktura.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
          Source: Marzec 2025-faktura.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
          Source: Marzec 2025-faktura.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: wntdll.pdbUGP source: Marzec 2025-faktura.pdf.exe, 00000000.00000003.2183845802.0000000003DF0000.00000004.00001000.00020000.00000000.sdmp, Marzec 2025-faktura.pdf.exe, 00000000.00000003.2185159501.0000000003F90000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.2185174064.0000000003700000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2251919484.0000000003C9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2251919484.0000000003B00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.2187581633.0000000003900000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2253183977.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.4647854617.00000000031DE000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2250978832.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.4647854617.0000000003040000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: svchost.exe, svchost.exe, 00000003.00000003.2253183977.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.4647854617.00000000031DE000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2250978832.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.4647854617.0000000003040000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: svchost.pdb source: svchost.exe, svchost.exe, 00000003.00000002.4646287770.0000000002A12000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.4648422635.000000000358F000.00000004.10000000.00040000.00000000.sdmp, svchost.exe, 00000003.00000002.4642370479.0000000000200000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: svchost.pdbUGP source: svchost.exe, 00000001.00000003.2250125078.0000000003426000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.2248999788.000000000341C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2251591239.0000000003900000.00000040.10000000.00040000.00000000.sdmp, explorer.exe, 00000002.00000002.4657535728.0000000010CAF000.00000004.80000000.00040000.00000000.sdmp, svchost.exe, 00000003.00000002.4646287770.0000000002A12000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.4648422635.000000000358F000.00000004.10000000.00040000.00000000.sdmp, svchost.exe, 00000003.00000002.4642370479.0000000000200000.00000040.80000000.00040000.00000000.sdmp
          Source: Marzec 2025-faktura.pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
          Source: Marzec 2025-faktura.pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
          Source: Marzec 2025-faktura.pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
          Source: Marzec 2025-faktura.pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
          Source: Marzec 2025-faktura.pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_00724B37 LoadLibraryA,GetProcAddress,0_2_00724B37
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0072C4C7 push A30072BAh; retn 0072h0_2_0072C50D
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_00748945 push ecx; ret 0_2_00748958
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00417A08 push cs; ret 1_2_00417A11
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00417A22 push ds; iretd 1_2_00417A23
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041D475 push eax; ret 1_2_0041D4C8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041D4C2 push eax; ret 1_2_0041D4C8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041D4CB push eax; ret 1_2_0041D532
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041D52C push eax; ret 1_2_0041D532
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00417596 pushfd ; iretd 1_2_004175B2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004175A0 pushfd ; iretd 1_2_004175B2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B0225F pushad ; ret 1_2_03B027F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B027FA pushad ; ret 1_2_03B027F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B309AD push ecx; mov dword ptr [esp], ecx1_2_03B309B6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B0283D push eax; iretd 1_2_03B02858
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADEB02 push esp; retn 0000h1_2_03ADEB03
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADEB1E push esp; retn 0000h1_2_03ADEB1F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADE9B5 push esp; retn 0000h1_2_03ADEAE7
          Source: C:\Windows\explorer.exeCode function: 2_2_10A089B5 push esp; retn 0000h2_2_10A08AE7
          Source: C:\Windows\explorer.exeCode function: 2_2_10A08B02 push esp; retn 0000h2_2_10A08B03
          Source: C:\Windows\explorer.exeCode function: 2_2_10A08B1E push esp; retn 0000h2_2_10A08B1F
          Source: C:\Windows\explorer.exeCode function: 2_2_114AEB02 push esp; retn 0000h2_2_114AEB03
          Source: C:\Windows\explorer.exeCode function: 2_2_114AEB1E push esp; retn 0000h2_2_114AEB1F
          Source: C:\Windows\explorer.exeCode function: 2_2_114AE9B5 push esp; retn 0000h2_2_114AEAE7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0304225F pushad ; ret 3_2_030427F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030427FA pushad ; ret 3_2_030427F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030709AD push ecx; mov dword ptr [esp], ecx3_2_030709B6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0304283D push eax; iretd 3_2_03042858
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0304134E push eax; iretd 3_2_03041369
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_023ED475 push eax; ret 3_2_023ED4C8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_023ED4CB push eax; ret 3_2_023ED532
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_023ED4C2 push eax; ret 3_2_023ED4C8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00203360 I_RegisterSvchostNotificationCallback,StartServiceCtrlDispatcherW,ExitProcess,3_2_00203360

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x8A 0xAE 0xE4
          Source: Possible double extension: pdf.exeStatic PE information: Marzec 2025-faktura.pdf.exe
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007248D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_007248D7
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007A5376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_007A5376
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_00743187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00743187
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeAPI/Special instruction interceptor: Address: 14B698C
          Source: C:\Windows\SysWOW64\svchost.exeAPI/Special instruction interceptor: Address: 7FFDB442D324
          Source: C:\Windows\SysWOW64\svchost.exeAPI/Special instruction interceptor: Address: 7FFDB4430774
          Source: C:\Windows\SysWOW64\svchost.exeAPI/Special instruction interceptor: Address: 7FFDB4430154
          Source: C:\Windows\SysWOW64\svchost.exeAPI/Special instruction interceptor: Address: 7FFDB442D8A4
          Source: C:\Windows\SysWOW64\svchost.exeAPI/Special instruction interceptor: Address: 7FFDB442DA44
          Source: C:\Windows\SysWOW64\svchost.exeAPI/Special instruction interceptor: Address: 7FFDB442D1E4
          Source: C:\Windows\SysWOW64\svchost.exeAPI/Special instruction interceptor: Address: 7FFDB442D944
          Source: C:\Windows\SysWOW64\svchost.exeAPI/Special instruction interceptor: Address: 7FFDB442D504
          Source: C:\Windows\SysWOW64\svchost.exeAPI/Special instruction interceptor: Address: 7FFDB442D544
          Source: C:\Windows\SysWOW64\svchost.exeRDTSC instruction interceptor: First address: 409904 second address: 40990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\svchost.exeRDTSC instruction interceptor: First address: 409B6E second address: 409B74 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\svchost.exeRDTSC instruction interceptor: First address: 23D9904 second address: 23D990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\svchost.exeRDTSC instruction interceptor: First address: 23D9B6E second address: 23D9B74 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00409AA0 rdtsc 1_2_00409AA0
          Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 9723Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 880Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 864Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: threadDelayed 655Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: threadDelayed 9314Jump to behavior
          Source: C:\Windows\explorer.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-102284
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeAPI coverage: 4.4 %
          Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 1.9 %
          Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 1.8 %
          Source: C:\Windows\explorer.exe TID: 2548Thread sleep count: 9723 > 30Jump to behavior
          Source: C:\Windows\explorer.exe TID: 2548Thread sleep time: -19446000s >= -30000sJump to behavior
          Source: C:\Windows\explorer.exe TID: 2548Thread sleep count: 214 > 30Jump to behavior
          Source: C:\Windows\explorer.exe TID: 2548Thread sleep time: -428000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exe TID: 2144Thread sleep count: 655 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exe TID: 2144Thread sleep time: -1310000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exe TID: 2144Thread sleep count: 9314 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exe TID: 2144Thread sleep time: -18628000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\svchost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0078445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0078445A
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0078C6D1 FindFirstFileW,FindClose,0_2_0078C6D1
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0078C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0078C75C
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0078EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0078EF95
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0078F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0078F0F2
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0078F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0078F3F3
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007837EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007837EF
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_00783B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00783B12
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0078BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0078BCBC
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007249A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007249A0
          Source: explorer.exe, 00000002.00000003.2980556903.000000000C4FA000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}me
          Source: explorer.exe, 00000002.00000000.2195604470.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4651466079.000000000962B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWystem32\DriverStore\en-US\msmouse.inf_locv
          Source: explorer.exe, 00000002.00000000.2196234913.00000000097F3000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
          Source: explorer.exe, 00000002.00000000.2195604470.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4651466079.000000000973C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWws
          Source: explorer.exe, 00000002.00000000.2211389341.000000000C58E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000002.00000003.2980556903.000000000C4FA000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}P1
          Source: explorer.exe, 00000002.00000003.2980556903.000000000C4FA000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}sersd
          Source: explorer.exe, 00000002.00000002.4651986176.00000000098AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}RoamingCom
          Source: explorer.exe, 00000002.00000002.4651466079.0000000009605000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTVMWare
          Source: explorer.exe, 00000002.00000000.2189859285.0000000000D99000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000002.00000000.2189859285.0000000000D99000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000W
          Source: explorer.exe, 00000002.00000000.2195604470.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4651466079.000000000978C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: explorer.exe, 00000002.00000000.2211389341.000000000C58E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Z
          Source: explorer.exe, 00000002.00000002.4649405454.00000000073E5000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
          Source: explorer.exe, 00000002.00000002.4651986176.00000000098AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}lnkramW6
          Source: explorer.exe, 00000002.00000000.2189859285.0000000000D99000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
          Source: explorer.exe, 00000002.00000000.2189859285.0000000000D99000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000002.00000002.4651986176.00000000098AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeAPI call chain: ExitProcess graph end nodegraph_0-101646
          Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00409AA0 rdtsc 1_2_00409AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040ACE0 LdrLoadDll,1_2_0040ACE0
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_00793F09 BlockInput,0_2_00793F09
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_00723B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00723B3A
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_00755A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00755A7C
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_00724B37 LoadLibraryA,GetProcAddress,0_2_00724B37
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_014B55E8 mov eax, dword ptr fs:[00000030h]0_2_014B55E8
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_014B6BF8 mov eax, dword ptr fs:[00000030h]0_2_014B6BF8
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_014B6C58 mov eax, dword ptr fs:[00000030h]0_2_014B6C58
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B28397 mov eax, dword ptr fs:[00000030h]1_2_03B28397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B28397 mov eax, dword ptr fs:[00000030h]1_2_03B28397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B28397 mov eax, dword ptr fs:[00000030h]1_2_03B28397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2E388 mov eax, dword ptr fs:[00000030h]1_2_03B2E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2E388 mov eax, dword ptr fs:[00000030h]1_2_03B2E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2E388 mov eax, dword ptr fs:[00000030h]1_2_03B2E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5438F mov eax, dword ptr fs:[00000030h]1_2_03B5438F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5438F mov eax, dword ptr fs:[00000030h]1_2_03B5438F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4E3F0 mov eax, dword ptr fs:[00000030h]1_2_03B4E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4E3F0 mov eax, dword ptr fs:[00000030h]1_2_03B4E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4E3F0 mov eax, dword ptr fs:[00000030h]1_2_03B4E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B663FF mov eax, dword ptr fs:[00000030h]1_2_03B663FF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B403E9 mov eax, dword ptr fs:[00000030h]1_2_03B403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B403E9 mov eax, dword ptr fs:[00000030h]1_2_03B403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B403E9 mov eax, dword ptr fs:[00000030h]1_2_03B403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B403E9 mov eax, dword ptr fs:[00000030h]1_2_03B403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B403E9 mov eax, dword ptr fs:[00000030h]1_2_03B403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B403E9 mov eax, dword ptr fs:[00000030h]1_2_03B403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B403E9 mov eax, dword ptr fs:[00000030h]1_2_03B403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B403E9 mov eax, dword ptr fs:[00000030h]1_2_03B403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDE3DB mov eax, dword ptr fs:[00000030h]1_2_03BDE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDE3DB mov eax, dword ptr fs:[00000030h]1_2_03BDE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDE3DB mov ecx, dword ptr fs:[00000030h]1_2_03BDE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDE3DB mov eax, dword ptr fs:[00000030h]1_2_03BDE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD43D4 mov eax, dword ptr fs:[00000030h]1_2_03BD43D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD43D4 mov eax, dword ptr fs:[00000030h]1_2_03BD43D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BEC3CD mov eax, dword ptr fs:[00000030h]1_2_03BEC3CD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A3C0 mov eax, dword ptr fs:[00000030h]1_2_03B3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A3C0 mov eax, dword ptr fs:[00000030h]1_2_03B3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A3C0 mov eax, dword ptr fs:[00000030h]1_2_03B3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A3C0 mov eax, dword ptr fs:[00000030h]1_2_03B3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A3C0 mov eax, dword ptr fs:[00000030h]1_2_03B3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A3C0 mov eax, dword ptr fs:[00000030h]1_2_03B3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B383C0 mov eax, dword ptr fs:[00000030h]1_2_03B383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B383C0 mov eax, dword ptr fs:[00000030h]1_2_03B383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B383C0 mov eax, dword ptr fs:[00000030h]1_2_03B383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B383C0 mov eax, dword ptr fs:[00000030h]1_2_03B383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB63C0 mov eax, dword ptr fs:[00000030h]1_2_03BB63C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C0634F mov eax, dword ptr fs:[00000030h]1_2_03C0634F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2C310 mov ecx, dword ptr fs:[00000030h]1_2_03B2C310
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B50310 mov ecx, dword ptr fs:[00000030h]1_2_03B50310
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6A30B mov eax, dword ptr fs:[00000030h]1_2_03B6A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6A30B mov eax, dword ptr fs:[00000030h]1_2_03B6A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6A30B mov eax, dword ptr fs:[00000030h]1_2_03B6A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD437C mov eax, dword ptr fs:[00000030h]1_2_03BD437C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C08324 mov eax, dword ptr fs:[00000030h]1_2_03C08324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C08324 mov ecx, dword ptr fs:[00000030h]1_2_03C08324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C08324 mov eax, dword ptr fs:[00000030h]1_2_03C08324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C08324 mov eax, dword ptr fs:[00000030h]1_2_03C08324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB035C mov eax, dword ptr fs:[00000030h]1_2_03BB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB035C mov eax, dword ptr fs:[00000030h]1_2_03BB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB035C mov eax, dword ptr fs:[00000030h]1_2_03BB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB035C mov ecx, dword ptr fs:[00000030h]1_2_03BB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB035C mov eax, dword ptr fs:[00000030h]1_2_03BB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB035C mov eax, dword ptr fs:[00000030h]1_2_03BB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFA352 mov eax, dword ptr fs:[00000030h]1_2_03BFA352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD8350 mov ecx, dword ptr fs:[00000030h]1_2_03BD8350
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB2349 mov eax, dword ptr fs:[00000030h]1_2_03BB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB2349 mov eax, dword ptr fs:[00000030h]1_2_03BB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB2349 mov eax, dword ptr fs:[00000030h]1_2_03BB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB2349 mov eax, dword ptr fs:[00000030h]1_2_03BB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB2349 mov eax, dword ptr fs:[00000030h]1_2_03BB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB2349 mov eax, dword ptr fs:[00000030h]1_2_03BB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB2349 mov eax, dword ptr fs:[00000030h]1_2_03BB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB2349 mov eax, dword ptr fs:[00000030h]1_2_03BB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB2349 mov eax, dword ptr fs:[00000030h]1_2_03BB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB2349 mov eax, dword ptr fs:[00000030h]1_2_03BB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB2349 mov eax, dword ptr fs:[00000030h]1_2_03BB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB2349 mov eax, dword ptr fs:[00000030h]1_2_03BB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB2349 mov eax, dword ptr fs:[00000030h]1_2_03BB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB2349 mov eax, dword ptr fs:[00000030h]1_2_03BB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB2349 mov eax, dword ptr fs:[00000030h]1_2_03BB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C062D6 mov eax, dword ptr fs:[00000030h]1_2_03C062D6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC62A0 mov eax, dword ptr fs:[00000030h]1_2_03BC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC62A0 mov ecx, dword ptr fs:[00000030h]1_2_03BC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC62A0 mov eax, dword ptr fs:[00000030h]1_2_03BC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC62A0 mov eax, dword ptr fs:[00000030h]1_2_03BC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC62A0 mov eax, dword ptr fs:[00000030h]1_2_03BC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC62A0 mov eax, dword ptr fs:[00000030h]1_2_03BC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6E284 mov eax, dword ptr fs:[00000030h]1_2_03B6E284
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6E284 mov eax, dword ptr fs:[00000030h]1_2_03B6E284
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB0283 mov eax, dword ptr fs:[00000030h]1_2_03BB0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB0283 mov eax, dword ptr fs:[00000030h]1_2_03BB0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB0283 mov eax, dword ptr fs:[00000030h]1_2_03BB0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B402E1 mov eax, dword ptr fs:[00000030h]1_2_03B402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B402E1 mov eax, dword ptr fs:[00000030h]1_2_03B402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B402E1 mov eax, dword ptr fs:[00000030h]1_2_03B402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A2C3 mov eax, dword ptr fs:[00000030h]1_2_03B3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A2C3 mov eax, dword ptr fs:[00000030h]1_2_03B3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A2C3 mov eax, dword ptr fs:[00000030h]1_2_03B3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A2C3 mov eax, dword ptr fs:[00000030h]1_2_03B3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A2C3 mov eax, dword ptr fs:[00000030h]1_2_03B3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2823B mov eax, dword ptr fs:[00000030h]1_2_03B2823B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C0625D mov eax, dword ptr fs:[00000030h]1_2_03C0625D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE0274 mov eax, dword ptr fs:[00000030h]1_2_03BE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE0274 mov eax, dword ptr fs:[00000030h]1_2_03BE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE0274 mov eax, dword ptr fs:[00000030h]1_2_03BE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE0274 mov eax, dword ptr fs:[00000030h]1_2_03BE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE0274 mov eax, dword ptr fs:[00000030h]1_2_03BE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE0274 mov eax, dword ptr fs:[00000030h]1_2_03BE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE0274 mov eax, dword ptr fs:[00000030h]1_2_03BE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE0274 mov eax, dword ptr fs:[00000030h]1_2_03BE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE0274 mov eax, dword ptr fs:[00000030h]1_2_03BE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE0274 mov eax, dword ptr fs:[00000030h]1_2_03BE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE0274 mov eax, dword ptr fs:[00000030h]1_2_03BE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE0274 mov eax, dword ptr fs:[00000030h]1_2_03BE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B34260 mov eax, dword ptr fs:[00000030h]1_2_03B34260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B34260 mov eax, dword ptr fs:[00000030h]1_2_03B34260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B34260 mov eax, dword ptr fs:[00000030h]1_2_03B34260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2826B mov eax, dword ptr fs:[00000030h]1_2_03B2826B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2A250 mov eax, dword ptr fs:[00000030h]1_2_03B2A250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B36259 mov eax, dword ptr fs:[00000030h]1_2_03B36259
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BEA250 mov eax, dword ptr fs:[00000030h]1_2_03BEA250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BEA250 mov eax, dword ptr fs:[00000030h]1_2_03BEA250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB8243 mov eax, dword ptr fs:[00000030h]1_2_03BB8243
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB8243 mov ecx, dword ptr fs:[00000030h]1_2_03BB8243
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB019F mov eax, dword ptr fs:[00000030h]1_2_03BB019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB019F mov eax, dword ptr fs:[00000030h]1_2_03BB019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB019F mov eax, dword ptr fs:[00000030h]1_2_03BB019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB019F mov eax, dword ptr fs:[00000030h]1_2_03BB019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2A197 mov eax, dword ptr fs:[00000030h]1_2_03B2A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2A197 mov eax, dword ptr fs:[00000030h]1_2_03B2A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2A197 mov eax, dword ptr fs:[00000030h]1_2_03B2A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C061E5 mov eax, dword ptr fs:[00000030h]1_2_03C061E5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B70185 mov eax, dword ptr fs:[00000030h]1_2_03B70185
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BEC188 mov eax, dword ptr fs:[00000030h]1_2_03BEC188
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BEC188 mov eax, dword ptr fs:[00000030h]1_2_03BEC188
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD4180 mov eax, dword ptr fs:[00000030h]1_2_03BD4180
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD4180 mov eax, dword ptr fs:[00000030h]1_2_03BD4180
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B601F8 mov eax, dword ptr fs:[00000030h]1_2_03B601F8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAE1D0 mov eax, dword ptr fs:[00000030h]1_2_03BAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAE1D0 mov eax, dword ptr fs:[00000030h]1_2_03BAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAE1D0 mov ecx, dword ptr fs:[00000030h]1_2_03BAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAE1D0 mov eax, dword ptr fs:[00000030h]1_2_03BAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAE1D0 mov eax, dword ptr fs:[00000030h]1_2_03BAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF61C3 mov eax, dword ptr fs:[00000030h]1_2_03BF61C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF61C3 mov eax, dword ptr fs:[00000030h]1_2_03BF61C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B60124 mov eax, dword ptr fs:[00000030h]1_2_03B60124
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C04164 mov eax, dword ptr fs:[00000030h]1_2_03C04164
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C04164 mov eax, dword ptr fs:[00000030h]1_2_03C04164
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDA118 mov ecx, dword ptr fs:[00000030h]1_2_03BDA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDA118 mov eax, dword ptr fs:[00000030h]1_2_03BDA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDA118 mov eax, dword ptr fs:[00000030h]1_2_03BDA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDA118 mov eax, dword ptr fs:[00000030h]1_2_03BDA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF0115 mov eax, dword ptr fs:[00000030h]1_2_03BF0115
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDE10E mov eax, dword ptr fs:[00000030h]1_2_03BDE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDE10E mov ecx, dword ptr fs:[00000030h]1_2_03BDE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDE10E mov eax, dword ptr fs:[00000030h]1_2_03BDE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDE10E mov eax, dword ptr fs:[00000030h]1_2_03BDE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDE10E mov ecx, dword ptr fs:[00000030h]1_2_03BDE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDE10E mov eax, dword ptr fs:[00000030h]1_2_03BDE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDE10E mov eax, dword ptr fs:[00000030h]1_2_03BDE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDE10E mov ecx, dword ptr fs:[00000030h]1_2_03BDE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDE10E mov eax, dword ptr fs:[00000030h]1_2_03BDE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDE10E mov ecx, dword ptr fs:[00000030h]1_2_03BDE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2C156 mov eax, dword ptr fs:[00000030h]1_2_03B2C156
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC8158 mov eax, dword ptr fs:[00000030h]1_2_03BC8158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B36154 mov eax, dword ptr fs:[00000030h]1_2_03B36154
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B36154 mov eax, dword ptr fs:[00000030h]1_2_03B36154
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC4144 mov eax, dword ptr fs:[00000030h]1_2_03BC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC4144 mov eax, dword ptr fs:[00000030h]1_2_03BC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC4144 mov ecx, dword ptr fs:[00000030h]1_2_03BC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC4144 mov eax, dword ptr fs:[00000030h]1_2_03BC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC4144 mov eax, dword ptr fs:[00000030h]1_2_03BC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF60B8 mov eax, dword ptr fs:[00000030h]1_2_03BF60B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF60B8 mov ecx, dword ptr fs:[00000030h]1_2_03BF60B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B280A0 mov eax, dword ptr fs:[00000030h]1_2_03B280A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC80A8 mov eax, dword ptr fs:[00000030h]1_2_03BC80A8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3208A mov eax, dword ptr fs:[00000030h]1_2_03B3208A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2C0F0 mov eax, dword ptr fs:[00000030h]1_2_03B2C0F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B720F0 mov ecx, dword ptr fs:[00000030h]1_2_03B720F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2A0E3 mov ecx, dword ptr fs:[00000030h]1_2_03B2A0E3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B380E9 mov eax, dword ptr fs:[00000030h]1_2_03B380E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB60E0 mov eax, dword ptr fs:[00000030h]1_2_03BB60E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB20DE mov eax, dword ptr fs:[00000030h]1_2_03BB20DE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC6030 mov eax, dword ptr fs:[00000030h]1_2_03BC6030
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2A020 mov eax, dword ptr fs:[00000030h]1_2_03B2A020
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2C020 mov eax, dword ptr fs:[00000030h]1_2_03B2C020
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4E016 mov eax, dword ptr fs:[00000030h]1_2_03B4E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4E016 mov eax, dword ptr fs:[00000030h]1_2_03B4E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4E016 mov eax, dword ptr fs:[00000030h]1_2_03B4E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4E016 mov eax, dword ptr fs:[00000030h]1_2_03B4E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB4000 mov ecx, dword ptr fs:[00000030h]1_2_03BB4000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD2000 mov eax, dword ptr fs:[00000030h]1_2_03BD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD2000 mov eax, dword ptr fs:[00000030h]1_2_03BD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD2000 mov eax, dword ptr fs:[00000030h]1_2_03BD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD2000 mov eax, dword ptr fs:[00000030h]1_2_03BD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD2000 mov eax, dword ptr fs:[00000030h]1_2_03BD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD2000 mov eax, dword ptr fs:[00000030h]1_2_03BD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD2000 mov eax, dword ptr fs:[00000030h]1_2_03BD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD2000 mov eax, dword ptr fs:[00000030h]1_2_03BD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5C073 mov eax, dword ptr fs:[00000030h]1_2_03B5C073
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B32050 mov eax, dword ptr fs:[00000030h]1_2_03B32050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB6050 mov eax, dword ptr fs:[00000030h]1_2_03BB6050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B307AF mov eax, dword ptr fs:[00000030h]1_2_03B307AF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE47A0 mov eax, dword ptr fs:[00000030h]1_2_03BE47A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD678E mov eax, dword ptr fs:[00000030h]1_2_03BD678E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B347FB mov eax, dword ptr fs:[00000030h]1_2_03B347FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B347FB mov eax, dword ptr fs:[00000030h]1_2_03B347FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B527ED mov eax, dword ptr fs:[00000030h]1_2_03B527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B527ED mov eax, dword ptr fs:[00000030h]1_2_03B527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B527ED mov eax, dword ptr fs:[00000030h]1_2_03B527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BBE7E1 mov eax, dword ptr fs:[00000030h]1_2_03BBE7E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3C7C0 mov eax, dword ptr fs:[00000030h]1_2_03B3C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB07C3 mov eax, dword ptr fs:[00000030h]1_2_03BB07C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6273C mov eax, dword ptr fs:[00000030h]1_2_03B6273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6273C mov ecx, dword ptr fs:[00000030h]1_2_03B6273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6273C mov eax, dword ptr fs:[00000030h]1_2_03B6273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAC730 mov eax, dword ptr fs:[00000030h]1_2_03BAC730
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6C720 mov eax, dword ptr fs:[00000030h]1_2_03B6C720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6C720 mov eax, dword ptr fs:[00000030h]1_2_03B6C720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B30710 mov eax, dword ptr fs:[00000030h]1_2_03B30710
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B60710 mov eax, dword ptr fs:[00000030h]1_2_03B60710
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6C700 mov eax, dword ptr fs:[00000030h]1_2_03B6C700
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B38770 mov eax, dword ptr fs:[00000030h]1_2_03B38770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40770 mov eax, dword ptr fs:[00000030h]1_2_03B40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40770 mov eax, dword ptr fs:[00000030h]1_2_03B40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40770 mov eax, dword ptr fs:[00000030h]1_2_03B40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40770 mov eax, dword ptr fs:[00000030h]1_2_03B40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40770 mov eax, dword ptr fs:[00000030h]1_2_03B40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40770 mov eax, dword ptr fs:[00000030h]1_2_03B40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40770 mov eax, dword ptr fs:[00000030h]1_2_03B40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40770 mov eax, dword ptr fs:[00000030h]1_2_03B40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40770 mov eax, dword ptr fs:[00000030h]1_2_03B40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40770 mov eax, dword ptr fs:[00000030h]1_2_03B40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40770 mov eax, dword ptr fs:[00000030h]1_2_03B40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40770 mov eax, dword ptr fs:[00000030h]1_2_03B40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B30750 mov eax, dword ptr fs:[00000030h]1_2_03B30750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BBE75D mov eax, dword ptr fs:[00000030h]1_2_03BBE75D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72750 mov eax, dword ptr fs:[00000030h]1_2_03B72750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72750 mov eax, dword ptr fs:[00000030h]1_2_03B72750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB4755 mov eax, dword ptr fs:[00000030h]1_2_03BB4755
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6674D mov esi, dword ptr fs:[00000030h]1_2_03B6674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6674D mov eax, dword ptr fs:[00000030h]1_2_03B6674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6674D mov eax, dword ptr fs:[00000030h]1_2_03B6674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B666B0 mov eax, dword ptr fs:[00000030h]1_2_03B666B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6C6A6 mov eax, dword ptr fs:[00000030h]1_2_03B6C6A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B34690 mov eax, dword ptr fs:[00000030h]1_2_03B34690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B34690 mov eax, dword ptr fs:[00000030h]1_2_03B34690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAE6F2 mov eax, dword ptr fs:[00000030h]1_2_03BAE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAE6F2 mov eax, dword ptr fs:[00000030h]1_2_03BAE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAE6F2 mov eax, dword ptr fs:[00000030h]1_2_03BAE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAE6F2 mov eax, dword ptr fs:[00000030h]1_2_03BAE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB06F1 mov eax, dword ptr fs:[00000030h]1_2_03BB06F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB06F1 mov eax, dword ptr fs:[00000030h]1_2_03BB06F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6A6C7 mov ebx, dword ptr fs:[00000030h]1_2_03B6A6C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6A6C7 mov eax, dword ptr fs:[00000030h]1_2_03B6A6C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4E627 mov eax, dword ptr fs:[00000030h]1_2_03B4E627
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B66620 mov eax, dword ptr fs:[00000030h]1_2_03B66620
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B68620 mov eax, dword ptr fs:[00000030h]1_2_03B68620
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3262C mov eax, dword ptr fs:[00000030h]1_2_03B3262C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72619 mov eax, dword ptr fs:[00000030h]1_2_03B72619
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAE609 mov eax, dword ptr fs:[00000030h]1_2_03BAE609
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4260B mov eax, dword ptr fs:[00000030h]1_2_03B4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4260B mov eax, dword ptr fs:[00000030h]1_2_03B4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4260B mov eax, dword ptr fs:[00000030h]1_2_03B4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4260B mov eax, dword ptr fs:[00000030h]1_2_03B4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4260B mov eax, dword ptr fs:[00000030h]1_2_03B4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4260B mov eax, dword ptr fs:[00000030h]1_2_03B4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4260B mov eax, dword ptr fs:[00000030h]1_2_03B4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B62674 mov eax, dword ptr fs:[00000030h]1_2_03B62674
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF866E mov eax, dword ptr fs:[00000030h]1_2_03BF866E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF866E mov eax, dword ptr fs:[00000030h]1_2_03BF866E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6A660 mov eax, dword ptr fs:[00000030h]1_2_03B6A660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6A660 mov eax, dword ptr fs:[00000030h]1_2_03B6A660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4C640 mov eax, dword ptr fs:[00000030h]1_2_03B4C640
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B545B1 mov eax, dword ptr fs:[00000030h]1_2_03B545B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B545B1 mov eax, dword ptr fs:[00000030h]1_2_03B545B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB05A7 mov eax, dword ptr fs:[00000030h]1_2_03BB05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB05A7 mov eax, dword ptr fs:[00000030h]1_2_03BB05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB05A7 mov eax, dword ptr fs:[00000030h]1_2_03BB05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6E59C mov eax, dword ptr fs:[00000030h]1_2_03B6E59C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B32582 mov eax, dword ptr fs:[00000030h]1_2_03B32582
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B32582 mov ecx, dword ptr fs:[00000030h]1_2_03B32582
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B64588 mov eax, dword ptr fs:[00000030h]1_2_03B64588
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5E5E7 mov eax, dword ptr fs:[00000030h]1_2_03B5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5E5E7 mov eax, dword ptr fs:[00000030h]1_2_03B5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5E5E7 mov eax, dword ptr fs:[00000030h]1_2_03B5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5E5E7 mov eax, dword ptr fs:[00000030h]1_2_03B5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5E5E7 mov eax, dword ptr fs:[00000030h]1_2_03B5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5E5E7 mov eax, dword ptr fs:[00000030h]1_2_03B5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5E5E7 mov eax, dword ptr fs:[00000030h]1_2_03B5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5E5E7 mov eax, dword ptr fs:[00000030h]1_2_03B5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B325E0 mov eax, dword ptr fs:[00000030h]1_2_03B325E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6C5ED mov eax, dword ptr fs:[00000030h]1_2_03B6C5ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6C5ED mov eax, dword ptr fs:[00000030h]1_2_03B6C5ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B365D0 mov eax, dword ptr fs:[00000030h]1_2_03B365D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6A5D0 mov eax, dword ptr fs:[00000030h]1_2_03B6A5D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6A5D0 mov eax, dword ptr fs:[00000030h]1_2_03B6A5D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6E5CF mov eax, dword ptr fs:[00000030h]1_2_03B6E5CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6E5CF mov eax, dword ptr fs:[00000030h]1_2_03B6E5CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40535 mov eax, dword ptr fs:[00000030h]1_2_03B40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40535 mov eax, dword ptr fs:[00000030h]1_2_03B40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40535 mov eax, dword ptr fs:[00000030h]1_2_03B40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40535 mov eax, dword ptr fs:[00000030h]1_2_03B40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40535 mov eax, dword ptr fs:[00000030h]1_2_03B40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40535 mov eax, dword ptr fs:[00000030h]1_2_03B40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5E53E mov eax, dword ptr fs:[00000030h]1_2_03B5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5E53E mov eax, dword ptr fs:[00000030h]1_2_03B5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5E53E mov eax, dword ptr fs:[00000030h]1_2_03B5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5E53E mov eax, dword ptr fs:[00000030h]1_2_03B5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5E53E mov eax, dword ptr fs:[00000030h]1_2_03B5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC6500 mov eax, dword ptr fs:[00000030h]1_2_03BC6500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C04500 mov eax, dword ptr fs:[00000030h]1_2_03C04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C04500 mov eax, dword ptr fs:[00000030h]1_2_03C04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C04500 mov eax, dword ptr fs:[00000030h]1_2_03C04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C04500 mov eax, dword ptr fs:[00000030h]1_2_03C04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C04500 mov eax, dword ptr fs:[00000030h]1_2_03C04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C04500 mov eax, dword ptr fs:[00000030h]1_2_03C04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C04500 mov eax, dword ptr fs:[00000030h]1_2_03C04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6656A mov eax, dword ptr fs:[00000030h]1_2_03B6656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6656A mov eax, dword ptr fs:[00000030h]1_2_03B6656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6656A mov eax, dword ptr fs:[00000030h]1_2_03B6656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B38550 mov eax, dword ptr fs:[00000030h]1_2_03B38550
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B38550 mov eax, dword ptr fs:[00000030h]1_2_03B38550
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B644B0 mov ecx, dword ptr fs:[00000030h]1_2_03B644B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BBA4B0 mov eax, dword ptr fs:[00000030h]1_2_03BBA4B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B364AB mov eax, dword ptr fs:[00000030h]1_2_03B364AB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BEA49A mov eax, dword ptr fs:[00000030h]1_2_03BEA49A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B304E5 mov ecx, dword ptr fs:[00000030h]1_2_03B304E5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6A430 mov eax, dword ptr fs:[00000030h]1_2_03B6A430
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2E420 mov eax, dword ptr fs:[00000030h]1_2_03B2E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2E420 mov eax, dword ptr fs:[00000030h]1_2_03B2E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2E420 mov eax, dword ptr fs:[00000030h]1_2_03B2E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2C427 mov eax, dword ptr fs:[00000030h]1_2_03B2C427
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB6420 mov eax, dword ptr fs:[00000030h]1_2_03BB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB6420 mov eax, dword ptr fs:[00000030h]1_2_03BB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB6420 mov eax, dword ptr fs:[00000030h]1_2_03BB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB6420 mov eax, dword ptr fs:[00000030h]1_2_03BB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB6420 mov eax, dword ptr fs:[00000030h]1_2_03BB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB6420 mov eax, dword ptr fs:[00000030h]1_2_03BB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB6420 mov eax, dword ptr fs:[00000030h]1_2_03BB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B68402 mov eax, dword ptr fs:[00000030h]1_2_03B68402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B68402 mov eax, dword ptr fs:[00000030h]1_2_03B68402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B68402 mov eax, dword ptr fs:[00000030h]1_2_03B68402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5A470 mov eax, dword ptr fs:[00000030h]1_2_03B5A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5A470 mov eax, dword ptr fs:[00000030h]1_2_03B5A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5A470 mov eax, dword ptr fs:[00000030h]1_2_03B5A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BBC460 mov ecx, dword ptr fs:[00000030h]1_2_03BBC460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BEA456 mov eax, dword ptr fs:[00000030h]1_2_03BEA456
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2645D mov eax, dword ptr fs:[00000030h]1_2_03B2645D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5245A mov eax, dword ptr fs:[00000030h]1_2_03B5245A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6E443 mov eax, dword ptr fs:[00000030h]1_2_03B6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6E443 mov eax, dword ptr fs:[00000030h]1_2_03B6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6E443 mov eax, dword ptr fs:[00000030h]1_2_03B6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6E443 mov eax, dword ptr fs:[00000030h]1_2_03B6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6E443 mov eax, dword ptr fs:[00000030h]1_2_03B6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6E443 mov eax, dword ptr fs:[00000030h]1_2_03B6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6E443 mov eax, dword ptr fs:[00000030h]1_2_03B6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6E443 mov eax, dword ptr fs:[00000030h]1_2_03B6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40BBE mov eax, dword ptr fs:[00000030h]1_2_03B40BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40BBE mov eax, dword ptr fs:[00000030h]1_2_03B40BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE4BB0 mov eax, dword ptr fs:[00000030h]1_2_03BE4BB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE4BB0 mov eax, dword ptr fs:[00000030h]1_2_03BE4BB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B38BF0 mov eax, dword ptr fs:[00000030h]1_2_03B38BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B38BF0 mov eax, dword ptr fs:[00000030h]1_2_03B38BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B38BF0 mov eax, dword ptr fs:[00000030h]1_2_03B38BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5EBFC mov eax, dword ptr fs:[00000030h]1_2_03B5EBFC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BBCBF0 mov eax, dword ptr fs:[00000030h]1_2_03BBCBF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDEBD0 mov eax, dword ptr fs:[00000030h]1_2_03BDEBD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B50BCB mov eax, dword ptr fs:[00000030h]1_2_03B50BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B50BCB mov eax, dword ptr fs:[00000030h]1_2_03B50BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B50BCB mov eax, dword ptr fs:[00000030h]1_2_03B50BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B30BCD mov eax, dword ptr fs:[00000030h]1_2_03B30BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B30BCD mov eax, dword ptr fs:[00000030h]1_2_03B30BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B30BCD mov eax, dword ptr fs:[00000030h]1_2_03B30BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5EB20 mov eax, dword ptr fs:[00000030h]1_2_03B5EB20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5EB20 mov eax, dword ptr fs:[00000030h]1_2_03B5EB20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF8B28 mov eax, dword ptr fs:[00000030h]1_2_03BF8B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF8B28 mov eax, dword ptr fs:[00000030h]1_2_03BF8B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C02B57 mov eax, dword ptr fs:[00000030h]1_2_03C02B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C02B57 mov eax, dword ptr fs:[00000030h]1_2_03C02B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C02B57 mov eax, dword ptr fs:[00000030h]1_2_03C02B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C02B57 mov eax, dword ptr fs:[00000030h]1_2_03C02B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAEB1D mov eax, dword ptr fs:[00000030h]1_2_03BAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAEB1D mov eax, dword ptr fs:[00000030h]1_2_03BAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAEB1D mov eax, dword ptr fs:[00000030h]1_2_03BAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAEB1D mov eax, dword ptr fs:[00000030h]1_2_03BAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAEB1D mov eax, dword ptr fs:[00000030h]1_2_03BAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAEB1D mov eax, dword ptr fs:[00000030h]1_2_03BAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAEB1D mov eax, dword ptr fs:[00000030h]1_2_03BAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAEB1D mov eax, dword ptr fs:[00000030h]1_2_03BAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAEB1D mov eax, dword ptr fs:[00000030h]1_2_03BAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C04B00 mov eax, dword ptr fs:[00000030h]1_2_03C04B00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2CB7E mov eax, dword ptr fs:[00000030h]1_2_03B2CB7E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B28B50 mov eax, dword ptr fs:[00000030h]1_2_03B28B50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDEB50 mov eax, dword ptr fs:[00000030h]1_2_03BDEB50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE4B4B mov eax, dword ptr fs:[00000030h]1_2_03BE4B4B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE4B4B mov eax, dword ptr fs:[00000030h]1_2_03BE4B4B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC6B40 mov eax, dword ptr fs:[00000030h]1_2_03BC6B40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC6B40 mov eax, dword ptr fs:[00000030h]1_2_03BC6B40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFAB40 mov eax, dword ptr fs:[00000030h]1_2_03BFAB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD8B42 mov eax, dword ptr fs:[00000030h]1_2_03BD8B42
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B38AA0 mov eax, dword ptr fs:[00000030h]1_2_03B38AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B38AA0 mov eax, dword ptr fs:[00000030h]1_2_03B38AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B86AA4 mov eax, dword ptr fs:[00000030h]1_2_03B86AA4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B68A90 mov edx, dword ptr fs:[00000030h]1_2_03B68A90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3EA80 mov eax, dword ptr fs:[00000030h]1_2_03B3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3EA80 mov eax, dword ptr fs:[00000030h]1_2_03B3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3EA80 mov eax, dword ptr fs:[00000030h]1_2_03B3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3EA80 mov eax, dword ptr fs:[00000030h]1_2_03B3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3EA80 mov eax, dword ptr fs:[00000030h]1_2_03B3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3EA80 mov eax, dword ptr fs:[00000030h]1_2_03B3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3EA80 mov eax, dword ptr fs:[00000030h]1_2_03B3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3EA80 mov eax, dword ptr fs:[00000030h]1_2_03B3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3EA80 mov eax, dword ptr fs:[00000030h]1_2_03B3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C04A80 mov eax, dword ptr fs:[00000030h]1_2_03C04A80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6AAEE mov eax, dword ptr fs:[00000030h]1_2_03B6AAEE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6AAEE mov eax, dword ptr fs:[00000030h]1_2_03B6AAEE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B30AD0 mov eax, dword ptr fs:[00000030h]1_2_03B30AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B64AD0 mov eax, dword ptr fs:[00000030h]1_2_03B64AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B64AD0 mov eax, dword ptr fs:[00000030h]1_2_03B64AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B86ACC mov eax, dword ptr fs:[00000030h]1_2_03B86ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B86ACC mov eax, dword ptr fs:[00000030h]1_2_03B86ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B86ACC mov eax, dword ptr fs:[00000030h]1_2_03B86ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B54A35 mov eax, dword ptr fs:[00000030h]1_2_03B54A35
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B54A35 mov eax, dword ptr fs:[00000030h]1_2_03B54A35
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6CA38 mov eax, dword ptr fs:[00000030h]1_2_03B6CA38
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6CA24 mov eax, dword ptr fs:[00000030h]1_2_03B6CA24
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5EA2E mov eax, dword ptr fs:[00000030h]1_2_03B5EA2E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BBCA11 mov eax, dword ptr fs:[00000030h]1_2_03BBCA11
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BACA72 mov eax, dword ptr fs:[00000030h]1_2_03BACA72
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BACA72 mov eax, dword ptr fs:[00000030h]1_2_03BACA72
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6CA6F mov eax, dword ptr fs:[00000030h]1_2_03B6CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6CA6F mov eax, dword ptr fs:[00000030h]1_2_03B6CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6CA6F mov eax, dword ptr fs:[00000030h]1_2_03B6CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDEA60 mov eax, dword ptr fs:[00000030h]1_2_03BDEA60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B36A50 mov eax, dword ptr fs:[00000030h]1_2_03B36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B36A50 mov eax, dword ptr fs:[00000030h]1_2_03B36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B36A50 mov eax, dword ptr fs:[00000030h]1_2_03B36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B36A50 mov eax, dword ptr fs:[00000030h]1_2_03B36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B36A50 mov eax, dword ptr fs:[00000030h]1_2_03B36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B36A50 mov eax, dword ptr fs:[00000030h]1_2_03B36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B36A50 mov eax, dword ptr fs:[00000030h]1_2_03B36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40A5B mov eax, dword ptr fs:[00000030h]1_2_03B40A5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40A5B mov eax, dword ptr fs:[00000030h]1_2_03B40A5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB89B3 mov esi, dword ptr fs:[00000030h]1_2_03BB89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB89B3 mov eax, dword ptr fs:[00000030h]1_2_03BB89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB89B3 mov eax, dword ptr fs:[00000030h]1_2_03BB89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B429A0 mov eax, dword ptr fs:[00000030h]1_2_03B429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B429A0 mov eax, dword ptr fs:[00000030h]1_2_03B429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B429A0 mov eax, dword ptr fs:[00000030h]1_2_03B429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B429A0 mov eax, dword ptr fs:[00000030h]1_2_03B429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B429A0 mov eax, dword ptr fs:[00000030h]1_2_03B429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B429A0 mov eax, dword ptr fs:[00000030h]1_2_03B429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B429A0 mov eax, dword ptr fs:[00000030h]1_2_03B429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B429A0 mov eax, dword ptr fs:[00000030h]1_2_03B429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B429A0 mov eax, dword ptr fs:[00000030h]1_2_03B429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B429A0 mov eax, dword ptr fs:[00000030h]1_2_03B429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B429A0 mov eax, dword ptr fs:[00000030h]1_2_03B429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B429A0 mov eax, dword ptr fs:[00000030h]1_2_03B429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B429A0 mov eax, dword ptr fs:[00000030h]1_2_03B429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B309AD mov eax, dword ptr fs:[00000030h]1_2_03B309AD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B309AD mov eax, dword ptr fs:[00000030h]1_2_03B309AD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B629F9 mov eax, dword ptr fs:[00000030h]1_2_03B629F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B629F9 mov eax, dword ptr fs:[00000030h]1_2_03B629F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BBE9E0 mov eax, dword ptr fs:[00000030h]1_2_03BBE9E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A9D0 mov eax, dword ptr fs:[00000030h]1_2_03B3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A9D0 mov eax, dword ptr fs:[00000030h]1_2_03B3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A9D0 mov eax, dword ptr fs:[00000030h]1_2_03B3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A9D0 mov eax, dword ptr fs:[00000030h]1_2_03B3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A9D0 mov eax, dword ptr fs:[00000030h]1_2_03B3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A9D0 mov eax, dword ptr fs:[00000030h]1_2_03B3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B649D0 mov eax, dword ptr fs:[00000030h]1_2_03B649D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFA9D3 mov eax, dword ptr fs:[00000030h]1_2_03BFA9D3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC69C0 mov eax, dword ptr fs:[00000030h]1_2_03BC69C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C04940 mov eax, dword ptr fs:[00000030h]1_2_03C04940
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB892A mov eax, dword ptr fs:[00000030h]1_2_03BB892A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC892B mov eax, dword ptr fs:[00000030h]1_2_03BC892B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BBC912 mov eax, dword ptr fs:[00000030h]1_2_03BBC912
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B28918 mov eax, dword ptr fs:[00000030h]1_2_03B28918
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B28918 mov eax, dword ptr fs:[00000030h]1_2_03B28918
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAE908 mov eax, dword ptr fs:[00000030h]1_2_03BAE908
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAE908 mov eax, dword ptr fs:[00000030h]1_2_03BAE908
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD4978 mov eax, dword ptr fs:[00000030h]1_2_03BD4978
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD4978 mov eax, dword ptr fs:[00000030h]1_2_03BD4978
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BBC97C mov eax, dword ptr fs:[00000030h]1_2_03BBC97C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B56962 mov eax, dword ptr fs:[00000030h]1_2_03B56962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B56962 mov eax, dword ptr fs:[00000030h]1_2_03B56962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B56962 mov eax, dword ptr fs:[00000030h]1_2_03B56962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B7096E mov eax, dword ptr fs:[00000030h]1_2_03B7096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B7096E mov edx, dword ptr fs:[00000030h]1_2_03B7096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B7096E mov eax, dword ptr fs:[00000030h]1_2_03B7096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB0946 mov eax, dword ptr fs:[00000030h]1_2_03BB0946
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C008C0 mov eax, dword ptr fs:[00000030h]1_2_03C008C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BBC89D mov eax, dword ptr fs:[00000030h]1_2_03BBC89D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B30887 mov eax, dword ptr fs:[00000030h]1_2_03B30887
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6C8F9 mov eax, dword ptr fs:[00000030h]1_2_03B6C8F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6C8F9 mov eax, dword ptr fs:[00000030h]1_2_03B6C8F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFA8E4 mov eax, dword ptr fs:[00000030h]1_2_03BFA8E4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5E8C0 mov eax, dword ptr fs:[00000030h]1_2_03B5E8C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B52835 mov eax, dword ptr fs:[00000030h]1_2_03B52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B52835 mov eax, dword ptr fs:[00000030h]1_2_03B52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B52835 mov eax, dword ptr fs:[00000030h]1_2_03B52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B52835 mov ecx, dword ptr fs:[00000030h]1_2_03B52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B52835 mov eax, dword ptr fs:[00000030h]1_2_03B52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B52835 mov eax, dword ptr fs:[00000030h]1_2_03B52835
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007780A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_007780A9
          Source: C:\Windows\SysWOW64\svchost.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0074A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0074A155
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0074A124 SetUnhandledExceptionFilter,0_2_0074A124
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002033C0 NtSetInformationProcess,SetUnhandledExceptionFilter,SetErrorMode,GetProcessHeap,InitializeSRWLock,InitializeSRWLock,RegDisablePredefinedCacheEx,EventRegister,GetCommandLineW,memset,GetCurrentProcess,NtSetInformationProcess,HeapFree,HeapFree,ExitProcess,GetCurrentProcess,SetProcessAffinityUpdateMode,3_2_002033C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00205848 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00205848

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\explorer.exeNetwork Connect: 104.21.80.1 80Jump to behavior
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeThread register set: target process: 4004Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeThread register set: target process: 4004Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeThread APC queued: target process: C:\Windows\explorer.exeJump to behavior
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2EEC008Jump to behavior
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007787B1 LogonUserW,0_2_007787B1
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_00723B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00723B3A
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007248D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_007248D7
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_00784C7F mouse_event,0_2_00784C7F
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Windows\SysWOW64\svchost.exe"Jump to behavior
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_00777CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00777CAF
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0077874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_0077874B
          Source: Marzec 2025-faktura.pdf.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
          Source: explorer.exe, 00000002.00000002.4646527992.00000000013A1000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2190439913.00000000013A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: IProgram Manager
          Source: Marzec 2025-faktura.pdf.exe, explorer.exe, 00000002.00000002.4646527992.00000000013A1000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2190439913.00000000013A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000002.4649167894.00000000048E0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000002.00000002.4646527992.00000000013A1000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2190439913.00000000013A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000002.00000002.4644013343.0000000000D60000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2189859285.0000000000D69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: +Progman
          Source: explorer.exe, 00000002.00000002.4646527992.00000000013A1000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2190439913.00000000013A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
          Source: explorer.exe, 00000002.00000000.2196234913.00000000098AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.4651986176.00000000098AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd31A
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_0074862B cpuid 0_2_0074862B
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_00754E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00754E87
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_00761E06 GetUserNameW,0_2_00761E06
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_00753F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00753F3A
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_007249A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007249A0

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Marzec 2025-faktura.pdf.exe.2110000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Marzec 2025-faktura.pdf.exe.2110000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.4647167786.0000000002E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.4646847720.0000000002E00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2251503947.00000000038A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2251547387.00000000038D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.4643447879.00000000023D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2250802653.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2187435514.0000000002110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Marzec 2025-faktura.pdf.exeBinary or memory string: WIN_81
          Source: Marzec 2025-faktura.pdf.exeBinary or memory string: WIN_XP
          Source: Marzec 2025-faktura.pdf.exeBinary or memory string: WIN_XPe
          Source: Marzec 2025-faktura.pdf.exeBinary or memory string: WIN_VISTA
          Source: Marzec 2025-faktura.pdf.exeBinary or memory string: WIN_7
          Source: Marzec 2025-faktura.pdf.exeBinary or memory string: WIN_8
          Source: Marzec 2025-faktura.pdf.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Marzec 2025-faktura.pdf.exe.2110000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Marzec 2025-faktura.pdf.exe.2110000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.4647167786.0000000002E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.4646847720.0000000002E00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2251503947.00000000038A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2251547387.00000000038D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.4643447879.00000000023D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2250802653.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2187435514.0000000002110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_00796283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00796283
          Source: C:\Users\user\Desktop\Marzec 2025-faktura.pdf.exeCode function: 0_2_00796747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00796747
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00206BB0 RpcServerUnregisterIfEx,EnterCriticalSection,RpcMgmtStopServerListening,RpcMgmtWaitServerListen,LeaveCriticalSection,I_RpcMapWin32Status,3_2_00206BB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00206B60 RpcServerUnregisterIf,EnterCriticalSection,RpcMgmtStopServerListening,RpcMgmtWaitServerListen,LeaveCriticalSection,I_RpcMapWin32Status,3_2_00206B60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00206AF0 EnterCriticalSection,RpcServerListen,LeaveCriticalSection,I_RpcMapWin32Status,3_2_00206AF0
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire Infrastructure2
          Valid Accounts
          2
          Native API
          1
          DLL Side-Loading
          1
          Exploitation for Privilege Escalation
          1
          Disable or Modify Tools
          1
          Credential API Hooking
          2
          System Time Discovery
          Remote Services1
          Archive Collected Data
          2
          Ingress Tool Transfer
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault Accounts2
          Service Execution
          2
          Valid Accounts
          1
          DLL Side-Loading
          1
          Deobfuscate/Decode Files or Information
          21
          Input Capture
          1
          Account Discovery
          Remote Desktop Protocol1
          Credential API Hooking
          1
          Encrypted Channel
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAt3
          Windows Service
          2
          Valid Accounts
          13
          Obfuscated Files or Information
          Security Account Manager2
          File and Directory Discovery
          SMB/Windows Admin Shares21
          Input Capture
          2
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
          Access Token Manipulation
          1
          DLL Side-Loading
          NTDS215
          System Information Discovery
          Distributed Component Object Model3
          Clipboard Data
          12
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script3
          Windows Service
          1
          Masquerading
          LSA Secrets251
          Security Software Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts512
          Process Injection
          1
          Rootkit
          Cached Domain Credentials2
          Virtualization/Sandbox Evasion
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
          Valid Accounts
          DCSync3
          Process Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
          Virtualization/Sandbox Evasion
          Proc Filesystem11
          Application Window Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
          Access Token Manipulation
          /etc/passwd and /etc/shadow1
          System Owner/User Discovery
          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron512
          Process Injection
          Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1627800 Sample: Marzec 2025-faktura.pdf.exe Startdate: 03/03/2025 Architecture: WINDOWS Score: 100 30 www.ketchagi.xyz 2->30 32 www.hoihitclbu.xyz 2->32 34 8 other IPs or domains 2->34 38 Suricata IDS alerts for network traffic 2->38 40 Found malware configuration 2->40 42 Malicious sample detected (through community Yara rule) 2->42 46 10 other signatures 2->46 11 Marzec 2025-faktura.pdf.exe 2 2->11         started        signatures3 44 Performs DNS queries to domains with low reputation 32->44 process4 signatures5 52 Binary is likely a compiled AutoIt script file 11->52 54 Writes to foreign memory regions 11->54 56 Maps a DLL or memory area into another process 11->56 14 svchost.exe 11->14         started        process6 signatures7 58 Modifies the context of a thread in another process (thread injection) 14->58 60 Maps a DLL or memory area into another process 14->60 62 Tries to detect virtualization through RDTSC time measurements 14->62 64 2 other signatures 14->64 17 explorer.exe 57 1 14->17 injected process8 dnsIp9 28 www.oldpay.online 104.21.80.1, 49987, 80 CLOUDFLARENETUS United States 17->28 36 System process connects to network (likely due to code injection or exploit) 17->36 21 svchost.exe 17->21         started        signatures10 process11 signatures12 48 Modifies the context of a thread in another process (thread injection) 21->48 50 Maps a DLL or memory area into another process 21->50 24 cmd.exe 1 21->24         started        process13 process14 26 conhost.exe 24->26         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.