Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
2rvyZc27tz.exe

Overview

General Information

Sample name:2rvyZc27tz.exe
renamed because original name is a hash value
Original sample name:fe73375a820e10fa30553b0fec1b04bbc690002d36970750b396eca1b30ee069.exe
Analysis ID:1633523
MD5:77d62650787c93cd234a56ad1255c462
SHA1:0a8338894bab6b9343d37379aa5ebd12ce0d7388
SHA256:fe73375a820e10fa30553b0fec1b04bbc690002d36970750b396eca1b30ee069
Tags:exeuser-adrian__luca
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
Binary is likely a compiled AutoIt script file
Found direct / indirect Syscall (likely to bypass EDR)
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to detect virtual machines (SLDT)
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 2rvyZc27tz.exe (PID: 7024 cmdline: "C:\Users\user\Desktop\2rvyZc27tz.exe" MD5: 77D62650787C93CD234A56AD1255C462)
    • svchost.exe (PID: 7076 cmdline: "C:\Users\user\Desktop\2rvyZc27tz.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • BXT55iI64gw1yrBCtj.exe (PID: 3752 cmdline: "C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\dAcOThvikOgRG.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
        • mfpmp.exe (PID: 7132 cmdline: "C:\Windows\SysWOW64\mfpmp.exe" MD5: 9CD65F38A2B4E53E8180395DE4988D6A)
          • firefox.exe (PID: 5472 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000003.00000002.3388463854.0000000006A80000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000002.00000002.1065063450.0000000002E00000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000004.00000002.3380912632.0000000000800000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        00000002.00000002.1064547465.0000000000340000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000004.00000002.3382955858.0000000000C40000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            2.2.svchost.exe.340000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              2.2.svchost.exe.340000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\2rvyZc27tz.exe", CommandLine: "C:\Users\user\Desktop\2rvyZc27tz.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\2rvyZc27tz.exe", ParentImage: C:\Users\user\Desktop\2rvyZc27tz.exe, ParentProcessId: 7024, ParentProcessName: 2rvyZc27tz.exe, ProcessCommandLine: "C:\Users\user\Desktop\2rvyZc27tz.exe", ProcessId: 7076, ProcessName: svchost.exe
                Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\2rvyZc27tz.exe", CommandLine: "C:\Users\user\Desktop\2rvyZc27tz.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\2rvyZc27tz.exe", ParentImage: C:\Users\user\Desktop\2rvyZc27tz.exe, ParentProcessId: 7024, ParentProcessName: 2rvyZc27tz.exe, ProcessCommandLine: "C:\Users\user\Desktop\2rvyZc27tz.exe", ProcessId: 7076, ProcessName: svchost.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-10T12:51:25.320124+010028554651A Network Trojan was detected192.168.2.849687198.2.236.22180TCP
                2025-03-10T12:51:48.743863+010028554651A Network Trojan was detected192.168.2.85924813.248.169.4880TCP
                2025-03-10T12:52:02.359759+010028554651A Network Trojan was detected192.168.2.8592525.134.116.20180TCP
                2025-03-10T12:52:16.516697+010028554651A Network Trojan was detected192.168.2.85925618.139.62.22680TCP
                2025-03-10T12:52:30.147661+010028554651A Network Trojan was detected192.168.2.859260104.21.32.180TCP
                2025-03-10T12:52:43.552682+010028554651A Network Trojan was detected192.168.2.859264209.74.64.5880TCP
                2025-03-10T12:52:57.048681+010028554651A Network Trojan was detected192.168.2.859268199.59.243.22880TCP
                2025-03-10T12:53:12.904808+010028554651A Network Trojan was detected192.168.2.859272208.91.197.2780TCP
                2025-03-10T12:53:27.283226+010028554651A Network Trojan was detected192.168.2.85927647.83.1.9080TCP
                2025-03-10T12:53:40.971478+010028554651A Network Trojan was detected192.168.2.859280192.186.58.3180TCP
                2025-03-10T12:53:54.879116+010028554651A Network Trojan was detected192.168.2.859284199.59.243.16080TCP
                2025-03-10T12:54:08.304770+010028554651A Network Trojan was detected192.168.2.859288188.114.96.380TCP
                2025-03-10T12:54:21.467648+010028554651A Network Trojan was detected192.168.2.85929213.248.169.4880TCP
                2025-03-10T12:54:35.781418+010028554651A Network Trojan was detected192.168.2.85929747.83.1.9080TCP
                2025-03-10T12:54:50.706942+010028554651A Network Trojan was detected192.168.2.85930243.251.56.16180TCP
                2025-03-10T12:55:05.016992+010028554651A Network Trojan was detected192.168.2.85930613.248.169.4880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-10T12:51:40.865344+010028554641A Network Trojan was detected192.168.2.85924513.248.169.4880TCP
                2025-03-10T12:51:43.448138+010028554641A Network Trojan was detected192.168.2.85924613.248.169.4880TCP
                2025-03-10T12:51:46.036134+010028554641A Network Trojan was detected192.168.2.85924713.248.169.4880TCP
                2025-03-10T12:51:54.744402+010028554641A Network Trojan was detected192.168.2.8592495.134.116.20180TCP
                2025-03-10T12:51:57.296180+010028554641A Network Trojan was detected192.168.2.8592505.134.116.20180TCP
                2025-03-10T12:51:59.851497+010028554641A Network Trojan was detected192.168.2.8592515.134.116.20180TCP
                2025-03-10T12:52:08.837347+010028554641A Network Trojan was detected192.168.2.85925318.139.62.22680TCP
                2025-03-10T12:52:11.381613+010028554641A Network Trojan was detected192.168.2.85925418.139.62.22680TCP
                2025-03-10T12:52:13.949344+010028554641A Network Trojan was detected192.168.2.85925518.139.62.22680TCP
                2025-03-10T12:52:22.443494+010028554641A Network Trojan was detected192.168.2.859257104.21.32.180TCP
                2025-03-10T12:52:25.002973+010028554641A Network Trojan was detected192.168.2.859258104.21.32.180TCP
                2025-03-10T12:52:27.560871+010028554641A Network Trojan was detected192.168.2.859259104.21.32.180TCP
                2025-03-10T12:52:35.800533+010028554641A Network Trojan was detected192.168.2.859261209.74.64.5880TCP
                2025-03-10T12:52:38.353530+010028554641A Network Trojan was detected192.168.2.859262209.74.64.5880TCP
                2025-03-10T12:52:40.916995+010028554641A Network Trojan was detected192.168.2.859263209.74.64.5880TCP
                2025-03-10T12:52:49.294145+010028554641A Network Trojan was detected192.168.2.859265199.59.243.22880TCP
                2025-03-10T12:52:51.893640+010028554641A Network Trojan was detected192.168.2.859266199.59.243.22880TCP
                2025-03-10T12:52:54.482527+010028554641A Network Trojan was detected192.168.2.859267199.59.243.22880TCP
                2025-03-10T12:53:02.879978+010028554641A Network Trojan was detected192.168.2.859269208.91.197.2780TCP
                2025-03-10T12:53:05.420711+010028554641A Network Trojan was detected192.168.2.859270208.91.197.2780TCP
                2025-03-10T12:53:08.035561+010028554641A Network Trojan was detected192.168.2.859271208.91.197.2780TCP
                2025-03-10T12:53:19.559859+010028554641A Network Trojan was detected192.168.2.85927347.83.1.9080TCP
                2025-03-10T12:53:22.044742+010028554641A Network Trojan was detected192.168.2.85927447.83.1.9080TCP
                2025-03-10T12:53:24.656624+010028554641A Network Trojan was detected192.168.2.85927547.83.1.9080TCP
                2025-03-10T12:53:33.284741+010028554641A Network Trojan was detected192.168.2.859277192.186.58.3180TCP
                2025-03-10T12:53:35.852835+010028554641A Network Trojan was detected192.168.2.859278192.186.58.3180TCP
                2025-03-10T12:53:38.417752+010028554641A Network Trojan was detected192.168.2.859279192.186.58.3180TCP
                2025-03-10T12:53:47.233431+010028554641A Network Trojan was detected192.168.2.859281199.59.243.16080TCP
                2025-03-10T12:53:49.795054+010028554641A Network Trojan was detected192.168.2.859282199.59.243.16080TCP
                2025-03-10T12:53:52.358022+010028554641A Network Trojan was detected192.168.2.859283199.59.243.16080TCP
                2025-03-10T12:54:00.602020+010028554641A Network Trojan was detected192.168.2.859285188.114.96.380TCP
                2025-03-10T12:54:03.226629+010028554641A Network Trojan was detected192.168.2.859286188.114.96.380TCP
                2025-03-10T12:54:05.703331+010028554641A Network Trojan was detected192.168.2.859287188.114.96.380TCP
                2025-03-10T12:54:13.832776+010028554641A Network Trojan was detected192.168.2.85928913.248.169.4880TCP
                2025-03-10T12:54:16.383821+010028554641A Network Trojan was detected192.168.2.85929013.248.169.4880TCP
                2025-03-10T12:54:18.920668+010028554641A Network Trojan was detected192.168.2.85929113.248.169.4880TCP
                2025-03-10T12:54:27.991984+010028554641A Network Trojan was detected192.168.2.85929347.83.1.9080TCP
                2025-03-10T12:54:30.592621+010028554641A Network Trojan was detected192.168.2.85929447.83.1.9080TCP
                2025-03-10T12:54:33.138483+010028554641A Network Trojan was detected192.168.2.85929547.83.1.9080TCP
                2025-03-10T12:54:42.519772+010028554641A Network Trojan was detected192.168.2.85929943.251.56.16180TCP
                2025-03-10T12:54:45.056916+010028554641A Network Trojan was detected192.168.2.85930043.251.56.16180TCP
                2025-03-10T12:54:47.656566+010028554641A Network Trojan was detected192.168.2.85930143.251.56.16180TCP
                2025-03-10T12:54:56.474894+010028554641A Network Trojan was detected192.168.2.85930313.248.169.4880TCP
                2025-03-10T12:54:59.052237+010028554641A Network Trojan was detected192.168.2.85930413.248.169.4880TCP
                2025-03-10T12:55:01.587674+010028554641A Network Trojan was detected192.168.2.85930513.248.169.4880TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 2rvyZc27tz.exeAvira: detected
                Source: http://www.uarsg.xyz/zmlu/?Jh-=8FlqYiLPi66Wk3FaSftiQYqUUEw46KOIfSdIZbu3IcMEZZiYfnI+NTq7ZZY+PL7P+PxLQCrRNSCILlmzFTnBq1EUIHscapaAEzfnbciVHOhHAvfqSg7DdaWxuPhdPGa0hA==&Rz-4=PfK0sFHh0rAvira URL Cloud: Label: malware
                Source: http://www.gnlokn.info/885u/Avira URL Cloud: Label: malware
                Source: http://www.gnlokn.info/885u/?Rz-4=PfK0sFHh0r&Jh-=kNxcGR7XN/wYLGhgoN4eLeqnIb/SrGyx2a61waUV9eq+B84u7QLL02qOOmWf364spvjPkSimP8HalDvEWAtD0N2E+xUqjom9tM3VXorBI1wFFQGtcsJrb6FgD+2y89H3Zg==Avira URL Cloud: Label: malware
                Source: http://www.kdrqcyusevx.info/k7wl/?Jh-=fufNMwZxKNDTwooui2xRQbLM/3+Nczu3zRo6SABp4PJsbUwUgKaCiV9pnUAi1RvM9Y06h4YVVKrtcFtDk+h/sLRXwyqAUIHRy1oj7xX+kpmW1fKwBgD9UNTW8Sp9y7psEQ==&Rz-4=PfK0sFHh0rAvira URL Cloud: Label: malware
                Source: http://www.uarsg.xyz/zmlu/Avira URL Cloud: Label: malware
                Source: 2rvyZc27tz.exeVirustotal: Detection: 50%Perma Link
                Source: 2rvyZc27tz.exeReversingLabs: Detection: 68%
                Source: Yara matchFile source: 2.2.svchost.exe.340000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.340000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.3388463854.0000000006A80000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1065063450.0000000002E00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3380912632.0000000000800000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1064547465.0000000000340000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3382955858.0000000000C40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3382873447.0000000000BF0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1065598186.0000000003600000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3383591715.0000000002230000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: 2rvyZc27tz.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: MFPMP.pdb source: svchost.exe, 00000002.00000003.1033683248.0000000000824000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1033669190.000000000081A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1033549396.000000000081B000.00000004.00000020.00020000.00000000.sdmp, BXT55iI64gw1yrBCtj.exe, 00000003.00000003.1142413331.00000000005B8000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: MFPMP.pdbUGP source: svchost.exe, 00000002.00000003.1033683248.0000000000824000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1033669190.000000000081A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1033549396.000000000081B000.00000004.00000020.00020000.00000000.sdmp, BXT55iI64gw1yrBCtj.exe, 00000003.00000003.1142413331.00000000005B8000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: 2rvyZc27tz.exe, 00000000.00000003.934782047.0000000003570000.00000004.00001000.00020000.00000000.sdmp, 2rvyZc27tz.exe, 00000000.00000003.936099785.0000000003710000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.974287872.0000000002B00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1065108482.000000000309E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1065108482.0000000002F00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.976227505.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3383332479.00000000032CE000.00000040.00001000.00020000.00000000.sdmp, mfpmp.exe, 00000004.00000003.1067233430.0000000002F84000.00000004.00000020.00020000.00000000.sdmp, mfpmp.exe, 00000004.00000003.1064817012.0000000002DDB000.00000004.00000020.00020000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3383332479.0000000003130000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: 2rvyZc27tz.exe, 00000000.00000003.934782047.0000000003570000.00000004.00001000.00020000.00000000.sdmp, 2rvyZc27tz.exe, 00000000.00000003.936099785.0000000003710000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.974287872.0000000002B00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1065108482.000000000309E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1065108482.0000000002F00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.976227505.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, mfpmp.exe, mfpmp.exe, 00000004.00000002.3383332479.00000000032CE000.00000040.00001000.00020000.00000000.sdmp, mfpmp.exe, 00000004.00000003.1067233430.0000000002F84000.00000004.00000020.00020000.00000000.sdmp, mfpmp.exe, 00000004.00000003.1064817012.0000000002DDB000.00000004.00000020.00020000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3383332479.0000000003130000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: svchost.pdb source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.000000000464C000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3381523317.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.000000000375C000.00000004.10000000.00040000.00000000.sdmp, firefox.exe, 00000007.00000002.1366222112.000000003B05C000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: svchost.pdbUGP source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.000000000464C000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3381523317.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.000000000375C000.00000004.10000000.00040000.00000000.sdmp, firefox.exe, 00000007.00000002.1366222112.000000003B05C000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: C:\Work\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: BXT55iI64gw1yrBCtj.exe, 00000003.00000000.989201141.000000000012F000.00000002.00000001.01000000.00000004.sdmp
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0025445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0025445A
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0025C6D1 FindFirstFileW,FindClose,0_2_0025C6D1
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0025C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0025C75C
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0025EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0025EF95
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0025F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0025F0F2
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0025F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0025F3F3
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_002537EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_002537EF
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_00253B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00253B12
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0025BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0025BCBC
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0081C880 FindFirstFileW,FindNextFileW,FindClose,4_2_0081C880
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeCode function: 4x nop then pop edi3_2_06AC67ED
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeCode function: 4x nop then xor eax, eax3_2_06ABB152
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4x nop then xor eax, eax4_2_00809F70
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4x nop then pop edi4_2_0080E3F4
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4x nop then mov ebx, 00000004h4_2_02ED04D8

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59262 -> 209.74.64.58:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59278 -> 192.186.58.31:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.8:59280 -> 192.186.58.31:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.8:59272 -> 208.91.197.27:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.8:59260 -> 104.21.32.1:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59253 -> 18.139.62.226:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59259 -> 104.21.32.1:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59263 -> 209.74.64.58:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59261 -> 209.74.64.58:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.8:59268 -> 199.59.243.228:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.8:59256 -> 18.139.62.226:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.8:49687 -> 198.2.236.221:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59247 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.8:59252 -> 5.134.116.201:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59265 -> 199.59.243.228:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59266 -> 199.59.243.228:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59245 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59250 -> 5.134.116.201:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59269 -> 208.91.197.27:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59282 -> 199.59.243.160:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59257 -> 104.21.32.1:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59249 -> 5.134.116.201:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59271 -> 208.91.197.27:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59258 -> 104.21.32.1:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59290 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59295 -> 47.83.1.90:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59294 -> 47.83.1.90:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.8:59292 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59251 -> 5.134.116.201:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59283 -> 199.59.243.160:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.8:59288 -> 188.114.96.3:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59303 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.8:59302 -> 43.251.56.161:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59289 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59293 -> 47.83.1.90:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59246 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.8:59276 -> 47.83.1.90:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59270 -> 208.91.197.27:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59277 -> 192.186.58.31:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59279 -> 192.186.58.31:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.8:59297 -> 47.83.1.90:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59275 -> 47.83.1.90:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59291 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59281 -> 199.59.243.160:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59274 -> 47.83.1.90:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59267 -> 199.59.243.228:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59286 -> 188.114.96.3:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.8:59306 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.8:59248 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59301 -> 43.251.56.161:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59273 -> 47.83.1.90:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59285 -> 188.114.96.3:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59287 -> 188.114.96.3:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59299 -> 43.251.56.161:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59305 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59300 -> 43.251.56.161:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59304 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59254 -> 18.139.62.226:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.8:59255 -> 18.139.62.226:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.8:59264 -> 209.74.64.58:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.8:59284 -> 199.59.243.160:80
                Source: DNS query: www.berkilau.xyz
                Source: DNS query: www.limiles.xyz
                Source: DNS query: www.menekankan.xyz
                Source: DNS query: www.uarsg.xyz
                Source: DNS query: www.zkderby.xyz
                Source: global trafficTCP traffic: 192.168.2.8:59240 -> 1.1.1.1:53
                Source: global trafficTCP traffic: 192.168.2.8:60156 -> 162.159.36.2:53
                Source: Joe Sandbox ViewIP Address: 198.2.236.221 198.2.236.221
                Source: Joe Sandbox ViewIP Address: 13.248.169.48 13.248.169.48
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_002622EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_002622EE
                Source: global trafficHTTP traffic detected: GET /02mi/?Rz-4=PfK0sFHh0r&Jh-=3wNZiAFXbF4G40pvJKxTRRI2A7spWjbdIhqLp6Qq3RPu53FuVbsykeW4tAyMjm37U+p04yscHO8EvgD7hSXY9psb4R8ycJyfD685elNf1fEigJ+G+HDl69lYxgm33oWEnw== HTTP/1.1Host: www.zltbd.topAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.3; Nexus 7 Build/KTU84L) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/33.0.0.0 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /fhqx/?Jh-=sg65aQTAgcXDE4pi1LoEpKv7Hnjyc5PT978fD/Bc7Mjwi7/jUtt4G6vIwZIaK0V58dxjXgHD0OCWfoGTRu8V4R7qLMRv9+wSABt+AQDYPA4W5e7snU9IG7KuHe+Ye0zgNA==&Rz-4=PfK0sFHh0r HTTP/1.1Host: www.berkilau.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.3; Nexus 7 Build/KTU84L) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/33.0.0.0 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /koyo/?Jh-=BEWBr2ugDNg83+7sA04mYqXarvYa9CGJ/v9bHJ1E8nz2sjer7yt6ktorti1ODq7cPJzS+gvfg18c/upt3Bl/8G9IXyfHe08LOclUT4ljZZ0K5Q9jA4BFJsBBOByynSlULQ==&Rz-4=PfK0sFHh0r HTTP/1.1Host: www.theweb.servicesAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.3; Nexus 7 Build/KTU84L) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/33.0.0.0 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /pn6n/?Jh-=F01XRXi2fFjfb+f22IV9N/LPazDanMzAGtC6hNscqyS4t9KgNimRBM25Ha3jx6ln2Ye4YrWWH6pMrraIARx9bARA8Jwv/SG2i41C4ys+c0m1iN41UXCmtSqzc5rucXLTPA==&Rz-4=PfK0sFHh0r HTTP/1.1Host: www.dangky88kfree.onlineAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.3; Nexus 7 Build/KTU84L) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/33.0.0.0 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /k7wl/?Jh-=fufNMwZxKNDTwooui2xRQbLM/3+Nczu3zRo6SABp4PJsbUwUgKaCiV9pnUAi1RvM9Y06h4YVVKrtcFtDk+h/sLRXwyqAUIHRy1oj7xX+kpmW1fKwBgD9UNTW8Sp9y7psEQ==&Rz-4=PfK0sFHh0r HTTP/1.1Host: www.kdrqcyusevx.infoAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.3; Nexus 7 Build/KTU84L) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/33.0.0.0 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /8obd/?Jh-=eAurVpTKRnwVjPFbOEE/ugrWOvHNA3Hmd++atZNROcXXOY/llit+vObv85v7rekGquLftu+SU6fW5e4hfWdJovc+j9+Qsu1uQ9sbWCOW16yhmEeZxcQxf97beEnqMrhMmw==&Rz-4=PfK0sFHh0r HTTP/1.1Host: www.limiles.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.3; Nexus 7 Build/KTU84L) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/33.0.0.0 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /i9vf/?Jh-=VvBi+VT8kdZpqoTU28s7mIeF0U5MtQrRbGcVn+g3OdNCWKcRK5lL9eno6x4mmUMDnVg5dY4nq/So4H+CGOIlwi8hcTOQ7XrbPkX1TjvA9hM636MKUqw+FMTI6ZMQxAS3GA==&Rz-4=PfK0sFHh0r HTTP/1.1Host: www.sscexampyq.watchesAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.3; Nexus 7 Build/KTU84L) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/33.0.0.0 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /b6yd/?Jh-=09Ydga3BYivZK8YdlhFJ6xKm6F5xulXP4Jvi2sYrU/j8Vw61m4TNZVdh7BU9uNvDrF61ay9B7tbMkufmsOVjQbVgTBVKqcMbwL9RGhSpC37S2NM3PtmpxWHWv39jSahnPQ==&Rz-4=PfK0sFHh0r HTTP/1.1Host: www.fsp.financialAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.3; Nexus 7 Build/KTU84L) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/33.0.0.0 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /885u/?Rz-4=PfK0sFHh0r&Jh-=kNxcGR7XN/wYLGhgoN4eLeqnIb/SrGyx2a61waUV9eq+B84u7QLL02qOOmWf364spvjPkSimP8HalDvEWAtD0N2E+xUqjom9tM3VXorBI1wFFQGtcsJrb6FgD+2y89H3Zg== HTTP/1.1Host: www.gnlokn.infoAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.3; Nexus 7 Build/KTU84L) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/33.0.0.0 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /38vp/?Jh-=fygOJo7NVF5FJWN+wK+bZW3ICHLGzDQ6VpvTKpJ63nQF+Qh0jHE6xMEfzi4up9G5dVxqDHGXA9mAlsJfLYoXmOFn9fJxHjngvh+APPKFbkwnrF29pDLTaChTUNOMpN3Cxw==&Rz-4=PfK0sFHh0r HTTP/1.1Host: www.lianlianzhibo.netAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.3; Nexus 7 Build/KTU84L) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/33.0.0.0 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /i864/?Jh-=kUkuUqPpGSJgJHhjg7py745UP11DZ9z00U4hldmetJE5Ue+yg/ocgzqBQLg+xGUoflBkKStzcSNyEc2noL9GFcm4+WT6soXTVeGJQsHb7uQ8QHVWSftsOs/VDEiG62BuHw==&Rz-4=PfK0sFHh0r HTTP/1.1Host: www.travel-cure.sbsAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.3; Nexus 7 Build/KTU84L) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/33.0.0.0 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /50g8/?Jh-=s/yE9OmzwzCxllcbUBHW8Z2pUkR291ZfLyxILzOdWfRzbBzkVVtJbCQYNru3UURJ3e32HlsDkAsg+s3NQDPttrYmgo4Zx0NxRA1rfeial6/t//YfT1Hu0CXQnFcbTuY2Uw==&Rz-4=PfK0sFHh0r HTTP/1.1Host: www.timeinsardinia.infoAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.3; Nexus 7 Build/KTU84L) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/33.0.0.0 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /5h41/?Rz-4=PfK0sFHh0r&Jh-=fmP2u9XoOw2YK37La22MNMiSnxm6c2Vu8BlYWjYEIWMteqivvW8IpQS2N+KsqmXBdoCtcShqHL+qdmQsrNhh+w/R6vO1k7N7TFshGMBD06JFLEW5liHNd80Eyhiyn44Yyw== HTTP/1.1Host: www.menekankan.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.3; Nexus 7 Build/KTU84L) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/33.0.0.0 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /aycm/?Jh-=4FoSRZwAcot+LJhAMONBgWxAogC4brgXqhnvhWRiZR3Z58Lm/G9b0/oEiujh9WFV3z5N7c0i+9r1Dg83NFnP6MBqiGmHTKBXw1LdrHSZIlZAOm9M2zQSe5SjuL3NzvPrGQ==&Rz-4=PfK0sFHh0r HTTP/1.1Host: www.vvxcss.infoAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.3; Nexus 7 Build/KTU84L) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/33.0.0.0 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /zmlu/?Jh-=8FlqYiLPi66Wk3FaSftiQYqUUEw46KOIfSdIZbu3IcMEZZiYfnI+NTq7ZZY+PL7P+PxLQCrRNSCILlmzFTnBq1EUIHscapaAEzfnbciVHOhHAvfqSg7DdaWxuPhdPGa0hA==&Rz-4=PfK0sFHh0r HTTP/1.1Host: www.uarsg.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.3; Nexus 7 Build/KTU84L) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/33.0.0.0 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /fxeu/?Jh-=tgOY5OP2K67lIxLVEa1XA9Th7f/BIJL/WJ9nebv9H1IsTD1qdS0dBdwuGPcuMn3Sankzugk645BSkpEvkvxiO5714Nr8+J124STdOpYiRsHzBP1WrL9skSM22JQwXq+azw==&Rz-4=PfK0sFHh0r HTTP/1.1Host: www.zkderby.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.3; Nexus 7 Build/KTU84L) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/33.0.0.0 Safari/537.36
                Source: mfpmp.exe, 00000004.00000002.3384121543.0000000003FFA000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: Content-Security-Policy: upgrade-insecure-requests; default-src data: 'unsafe-inline' 'unsafe-eval' https:; script-src data: 'unsafe-inline' 'unsafe-eval' https: blob: https://www.googleanalytics.com https://www.google-analytics.com https://www.googleoptimize.com https://optimize.google.com https://td.doubleclick.net https://fburl.com https://www.facebook.com https://connect.facebook.net; style-src data: 'unsafe-inline' https: https://optimize.google.com https://fonts.googleapis.com https://w.ladicdn.com https://s.ladicdn.com; img-src data: https: blob: android-webview-video-poster: https://www.google-analytics.com https://www.googletagmanager.com https://optimize.google.com https://w.ladicdn.com https://s.ladicdn.com; font-src data: https: https://fonts.gstatic.com https://w.ladicdn.com https://s.ladicdn.com; connect-src https: wss: blob:; media-src data: https: blob:; object-src https:; child-src https: data: blob:; form-action https:; frame-ancestors https://popupx.ladi.me https://*.ladi.me https://s.ladicdn.com https://g.ladicdn.com https://w.ladicdn.com https://*.ladicdn.com https://www.facebook.com https://*.facebook.com equals www.facebook.com (Facebook)
                Source: global trafficDNS traffic detected: DNS query: www.zltbd.top
                Source: global trafficDNS traffic detected: DNS query: 18.31.95.13.in-addr.arpa
                Source: global trafficDNS traffic detected: DNS query: www.berkilau.xyz
                Source: global trafficDNS traffic detected: DNS query: www.theweb.services
                Source: global trafficDNS traffic detected: DNS query: www.dangky88kfree.online
                Source: global trafficDNS traffic detected: DNS query: www.kdrqcyusevx.info
                Source: global trafficDNS traffic detected: DNS query: www.limiles.xyz
                Source: global trafficDNS traffic detected: DNS query: www.sscexampyq.watches
                Source: global trafficDNS traffic detected: DNS query: www.fsp.financial
                Source: global trafficDNS traffic detected: DNS query: www.gnlokn.info
                Source: global trafficDNS traffic detected: DNS query: www.lianlianzhibo.net
                Source: global trafficDNS traffic detected: DNS query: www.travel-cure.sbs
                Source: global trafficDNS traffic detected: DNS query: www.timeinsardinia.info
                Source: global trafficDNS traffic detected: DNS query: www.menekankan.xyz
                Source: global trafficDNS traffic detected: DNS query: www.vvxcss.info
                Source: global trafficDNS traffic detected: DNS query: www.uarsg.xyz
                Source: global trafficDNS traffic detected: DNS query: www.zkderby.xyz
                Source: unknownHTTP traffic detected: POST /fhqx/ HTTP/1.1Host: www.berkilau.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: closeCache-Control: max-age=0Content-Type: application/x-www-form-urlencodedContent-Length: 204Origin: http://www.berkilau.xyzReferer: http://www.berkilau.xyz/fhqx/User-Agent: Mozilla/5.0 (Linux; Android 4.4.3; Nexus 7 Build/KTU84L) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/33.0.0.0 Safari/537.36Data Raw: 4a 68 2d 3d 68 69 53 5a 5a 67 6d 61 74 34 54 31 44 38 46 57 68 50 38 66 72 36 6e 45 44 53 54 5a 4c 70 66 75 33 4a 6f 31 65 4d 51 4c 37 50 54 35 68 66 37 56 4d 4a 6c 63 4f 61 4f 69 75 39 78 6e 4d 55 46 67 69 65 39 6e 61 6a 33 5a 32 50 32 71 42 72 65 51 65 64 34 37 38 51 2f 4c 64 76 73 5a 69 4f 6b 44 4c 42 52 42 62 6a 72 55 45 79 34 7a 67 4d 71 5a 6f 55 5a 37 4f 71 2b 35 66 4e 43 55 64 33 57 52 66 77 5a 53 4d 51 55 53 4c 49 6e 36 66 42 4e 6b 47 61 49 58 42 57 66 52 56 46 77 48 55 52 7a 42 66 36 37 44 34 55 7a 69 34 37 31 4b 46 4a 72 56 61 45 4f 50 43 50 4d 74 4d 69 38 4c 6f 66 4a 58 46 45 67 62 37 7a 59 3d Data Ascii: Jh-=hiSZZgmat4T1D8FWhP8fr6nEDSTZLpfu3Jo1eMQL7PT5hf7VMJlcOaOiu9xnMUFgie9naj3Z2P2qBreQed478Q/LdvsZiOkDLBRBbjrUEy4zgMqZoUZ7Oq+5fNCUd3WRfwZSMQUSLIn6fBNkGaIXBWfRVFwHURzBf67D4Uzi471KFJrVaEOPCPMtMi8LofJXFEgb7zY=
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundTransfer-Encoding: chunkedServer: Microsoft-HTTPAPI/2.0Date: Mon, 10 Mar 2025 11:51:22 GMTConnection: closeData Raw: 30 0d 0a 0d 0a Data Ascii: 0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closex-litespeed-tag: 6d9_HTTP.404content-type: text/html; charset=UTF-8link: <https://theweb.services/wp-json/>; rel="https://api.w.org/"x-tec-api-version: v1x-tec-api-root: https://theweb.services/wp-json/tribe/events/v1/x-tec-api-origin: https://theweb.servicesexpires: Wed, 11 Jan 1984 05:00:00 GMTx-litespeed-cache-control: no-cachecache-control: no-cache, no-store, must-revalidate, max-age=0content-length: 2061content-encoding: gzipvary: Accept-Encodingdate: Mon, 10 Mar 2025 11:51:54 GMTserver: LiteSpeedData Raw: 1f 8b 08 00 00 00 00 00 00 03 c5 58 eb 6e dc b8 15 fe ed 79 0a 9a 41 eb 3f 43 49 33 8e e3 64 22 29 68 b7 29 10 60 8b 5d 20 09 d0 c2 36 06 94 c4 91 68 53 a4 96 a4 e6 b2 86 1f a8 af d1 27 2b 0e 29 cd 68 2e 4e 8c 36 45 1d 20 33 c3 cb 39 1f cf 8d df 61 7c fe 97 5f 7e fa f2 8f 5f 3f a2 ca d6 22 1d c5 f0 81 04 95 65 82 99 24 5f 3f 63 18 63 b4 48 47 67 71 cd 2c 45 79 45 b5 61 36 c1 5f bf fc 95 bc c5 28 84 19 cb ad 60 e9 67 6e 19 e2 06 b5 b2 60 ba 54 5c 96 a8 a6 5c 5a 26 a9 cc 59 1c fa 55 67 b1 e0 f2 01 69 26 12 cc 73 25 31 aa 34 5b 24 b8 b2 b6 31 b3 30 b4 15 5b b1 2c 30 4c 2f 79 ce 4c b8 6a 48 ae 40 88 0d db 46 28 5a 98 70 1a 4d 5f 87 93 49 b8 e4 9a 17 9c 4a 4b 78 ae c8 e4 2a 5a 4f ae a2 60 c5 b2 06 23 c3 7f 67 26 c1 97 d3 f5 e5 d4 a1 fc 5f a9 bd 8c a2 f5 65 74 a0 76 f2 6e ba 9e bc 3b 52 4c 9b 46 30 62 55 9b 57 00 f9 c7 9d 7d 1f 44 98 8e bc b3 24 ad 59 82 6b 03 7a 79 4e 2d 57 92 7c e1 82 7d aa 69 c9 30 ea ec fa 03 6c 7f a4 bf 8b 16 0f 60 c9 d9 aa 51 da 0e 34 ae 78 61 ab a4 60 e0 63 e2 7e 8c 51 4d d7 bc 6e 6b 62 72 2a 58 32 19 23 2e b9 e5 54 ec 06 6a 2e 87 2b f0 36 2a bd 9e 82 99 5c f3 06 8e 39 50 85 5d 88 ba e0 85 18 23 ec b7 96 2f 13 fc 77 f2 f5 4f e4 27 55 37 d4 f2 4c 0c ad d1 05 b5 db d1 68 d5 30 6d 37 09 56 e5 cc 70 cb e6 a0 6a 20 fd cf 90 14 04 0d 94 ec 6d 71 31 3f 58 fe ed 1c 79 56 ca a6 19 ea fc db 2e ab 9e db d1 6a 31 d0 0a e7 3e 4e ad e7 f6 9e 36 a3 43 be e2 42 a0 8c 21 ba a4 5c d0 4c 30 64 94 92 01 fa 52 51 f9 80 36 aa 45 0b a5 e1 53 23 b0 2b 93 39 3b 77 6a 86 59 df 68 b5 e0 60 f1 5d e2 cf c2 b0 ac 9b 32 50 ba 0c d7 0b 19 4e 26 9d 13 76 b5 a2 e1 b2 cc 68 fe 70 b0 ed b0 5c ac 6b a1 9b 3c 68 aa e6 50 c2 85 b1 1b c1 4c c5 98 bd 40 bc 48 2e 6a 2b 73 e2 06 49 6e cc 85 87 73 71 da 56 c3 32 d4 88 b6 e4 d2 84 83 e2 16 42 61 0a 73 63 42 27 2f c8 8d f9 b0 64 3a 99 5c 5f be 9d bc 9e 46 93 77 17 a8 66 05 a7 c9 05 15 e2 02 aa e6 ae 1e 9d 06 b6 50 d2 9a 1f 08 cc c9 7b 11 30 77 04 64 37 0d 4b b0 65 6b 0b e7 c2 69 a6 8a 0d 7a 04 0f 94 5a b5 b2 Data Ascii: XnyA?CI3d")h)`] 6hS'+)h.N6E 39a|_~_?"e$_?ccHGgq,EyEa6_(`gn`T\\Z&YUgi&s%14[$10[,0L/yLjH@F(ZpM_IJKx*ZO`#g&_etvn;RLF0bUW}D$YkzyN-W|}i0l`Q4xa`c~QMnkbr*X2#.Tj.+6*\9P]#/wO'U7Lh0m7Vpj mq1?X
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closex-litespeed-tag: 6d9_HTTP.404content-type: text/html; charset=UTF-8link: <https://theweb.services/wp-json/>; rel="https://api.w.org/"x-tec-api-version: v1x-tec-api-root: https://theweb.services/wp-json/tribe/events/v1/x-tec-api-origin: https://theweb.servicesexpires: Wed, 11 Jan 1984 05:00:00 GMTx-litespeed-cache-control: no-cachecache-control: no-cache, no-store, must-revalidate, max-age=0content-length: 2061content-encoding: gzipvary: Accept-Encodingdate: Mon, 10 Mar 2025 11:51:57 GMTserver: LiteSpeedData Raw: 1f 8b 08 00 00 00 00 00 00 03 c5 58 eb 6e dc b8 15 fe ed 79 0a 9a 41 eb 3f 43 49 33 8e e3 64 22 29 68 b7 29 10 60 8b 5d 20 09 d0 c2 36 06 94 c4 91 68 53 a4 96 a4 e6 b2 86 1f a8 af d1 27 2b 0e 29 cd 68 2e 4e 8c 36 45 1d 20 33 c3 cb 39 1f cf 8d df 61 7c fe 97 5f 7e fa f2 8f 5f 3f a2 ca d6 22 1d c5 f0 81 04 95 65 82 99 24 5f 3f 63 18 63 b4 48 47 67 71 cd 2c 45 79 45 b5 61 36 c1 5f bf fc 95 bc c5 28 84 19 cb ad 60 e9 67 6e 19 e2 06 b5 b2 60 ba 54 5c 96 a8 a6 5c 5a 26 a9 cc 59 1c fa 55 67 b1 e0 f2 01 69 26 12 cc 73 25 31 aa 34 5b 24 b8 b2 b6 31 b3 30 b4 15 5b b1 2c 30 4c 2f 79 ce 4c b8 6a 48 ae 40 88 0d db 46 28 5a 98 70 1a 4d 5f 87 93 49 b8 e4 9a 17 9c 4a 4b 78 ae c8 e4 2a 5a 4f ae a2 60 c5 b2 06 23 c3 7f 67 26 c1 97 d3 f5 e5 d4 a1 fc 5f a9 bd 8c a2 f5 65 74 a0 76 f2 6e ba 9e bc 3b 52 4c 9b 46 30 62 55 9b 57 00 f9 c7 9d 7d 1f 44 98 8e bc b3 24 ad 59 82 6b 03 7a 79 4e 2d 57 92 7c e1 82 7d aa 69 c9 30 ea ec fa 03 6c 7f a4 bf 8b 16 0f 60 c9 d9 aa 51 da 0e 34 ae 78 61 ab a4 60 e0 63 e2 7e 8c 51 4d d7 bc 6e 6b 62 72 2a 58 32 19 23 2e b9 e5 54 ec 06 6a 2e 87 2b f0 36 2a bd 9e 82 99 5c f3 06 8e 39 50 85 5d 88 ba e0 85 18 23 ec b7 96 2f 13 fc 77 f2 f5 4f e4 27 55 37 d4 f2 4c 0c ad d1 05 b5 db d1 68 d5 30 6d 37 09 56 e5 cc 70 cb e6 a0 6a 20 fd cf 90 14 04 0d 94 ec 6d 71 31 3f 58 fe ed 1c 79 56 ca a6 19 ea fc db 2e ab 9e db d1 6a 31 d0 0a e7 3e 4e ad e7 f6 9e 36 a3 43 be e2 42 a0 8c 21 ba a4 5c d0 4c 30 64 94 92 01 fa 52 51 f9 80 36 aa 45 0b a5 e1 53 23 b0 2b 93 39 3b 77 6a 86 59 df 68 b5 e0 60 f1 5d e2 cf c2 b0 ac 9b 32 50 ba 0c d7 0b 19 4e 26 9d 13 76 b5 a2 e1 b2 cc 68 fe 70 b0 ed b0 5c ac 6b a1 9b 3c 68 aa e6 50 c2 85 b1 1b c1 4c c5 98 bd 40 bc 48 2e 6a 2b 73 e2 06 49 6e cc 85 87 73 71 da 56 c3 32 d4 88 b6 e4 d2 84 83 e2 16 42 61 0a 73 63 42 27 2f c8 8d f9 b0 64 3a 99 5c 5f be 9d bc 9e 46 93 77 17 a8 66 05 a7 c9 05 15 e2 02 aa e6 ae 1e 9d 06 b6 50 d2 9a 1f 08 cc c9 7b 11 30 77 04 64 37 0d 4b b0 65 6b 0b e7 c2 69 a6 8a 0d 7a 04 0f 94 5a b5 b2 Data Ascii: XnyA?CI3d")h)`] 6hS'+)h.N6E 39a|_~_?"e$_?ccHGgq,EyEa6_(`gn`T\\Z&YUgi&s%14[$10[,0L/yLjH@F(ZpM_IJKx*ZO`#g&_etvn;RLF0bUW}D$YkzyN-W|}i0l`Q4xa`c~QMnkbr*X2#.Tj.+6*\9P]#/wO'U7Lh0m7Vpj mq1?X
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closex-litespeed-tag: 6d9_HTTP.404content-type: text/html; charset=UTF-8link: <https://theweb.services/wp-json/>; rel="https://api.w.org/"x-tec-api-version: v1x-tec-api-root: https://theweb.services/wp-json/tribe/events/v1/x-tec-api-origin: https://theweb.servicesexpires: Wed, 11 Jan 1984 05:00:00 GMTx-litespeed-cache-control: no-cachecache-control: no-cache, no-store, must-revalidate, max-age=0content-length: 2061content-encoding: gzipvary: Accept-Encodingdate: Mon, 10 Mar 2025 11:51:59 GMTserver: LiteSpeedData Raw: 1f 8b 08 00 00 00 00 00 00 03 c5 58 eb 6e dc b8 15 fe ed 79 0a 9a 41 eb 3f 43 49 33 8e e3 64 22 29 68 b7 29 10 60 8b 5d 20 09 d0 c2 36 06 94 c4 91 68 53 a4 96 a4 e6 b2 86 1f a8 af d1 27 2b 0e 29 cd 68 2e 4e 8c 36 45 1d 20 33 c3 cb 39 1f cf 8d df 61 7c fe 97 5f 7e fa f2 8f 5f 3f a2 ca d6 22 1d c5 f0 81 04 95 65 82 99 24 5f 3f 63 18 63 b4 48 47 67 71 cd 2c 45 79 45 b5 61 36 c1 5f bf fc 95 bc c5 28 84 19 cb ad 60 e9 67 6e 19 e2 06 b5 b2 60 ba 54 5c 96 a8 a6 5c 5a 26 a9 cc 59 1c fa 55 67 b1 e0 f2 01 69 26 12 cc 73 25 31 aa 34 5b 24 b8 b2 b6 31 b3 30 b4 15 5b b1 2c 30 4c 2f 79 ce 4c b8 6a 48 ae 40 88 0d db 46 28 5a 98 70 1a 4d 5f 87 93 49 b8 e4 9a 17 9c 4a 4b 78 ae c8 e4 2a 5a 4f ae a2 60 c5 b2 06 23 c3 7f 67 26 c1 97 d3 f5 e5 d4 a1 fc 5f a9 bd 8c a2 f5 65 74 a0 76 f2 6e ba 9e bc 3b 52 4c 9b 46 30 62 55 9b 57 00 f9 c7 9d 7d 1f 44 98 8e bc b3 24 ad 59 82 6b 03 7a 79 4e 2d 57 92 7c e1 82 7d aa 69 c9 30 ea ec fa 03 6c 7f a4 bf 8b 16 0f 60 c9 d9 aa 51 da 0e 34 ae 78 61 ab a4 60 e0 63 e2 7e 8c 51 4d d7 bc 6e 6b 62 72 2a 58 32 19 23 2e b9 e5 54 ec 06 6a 2e 87 2b f0 36 2a bd 9e 82 99 5c f3 06 8e 39 50 85 5d 88 ba e0 85 18 23 ec b7 96 2f 13 fc 77 f2 f5 4f e4 27 55 37 d4 f2 4c 0c ad d1 05 b5 db d1 68 d5 30 6d 37 09 56 e5 cc 70 cb e6 a0 6a 20 fd cf 90 14 04 0d 94 ec 6d 71 31 3f 58 fe ed 1c 79 56 ca a6 19 ea fc db 2e ab 9e db d1 6a 31 d0 0a e7 3e 4e ad e7 f6 9e 36 a3 43 be e2 42 a0 8c 21 ba a4 5c d0 4c 30 64 94 92 01 fa 52 51 f9 80 36 aa 45 0b a5 e1 53 23 b0 2b 93 39 3b 77 6a 86 59 df 68 b5 e0 60 f1 5d e2 cf c2 b0 ac 9b 32 50 ba 0c d7 0b 19 4e 26 9d 13 76 b5 a2 e1 b2 cc 68 fe 70 b0 ed b0 5c ac 6b a1 9b 3c 68 aa e6 50 c2 85 b1 1b c1 4c c5 98 bd 40 bc 48 2e 6a 2b 73 e2 06 49 6e cc 85 87 73 71 da 56 c3 32 d4 88 b6 e4 d2 84 83 e2 16 42 61 0a 73 63 42 27 2f c8 8d f9 b0 64 3a 99 5c 5f be 9d bc 9e 46 93 77 17 a8 66 05 a7 c9 05 15 e2 02 aa e6 ae 1e 9d 06 b6 50 d2 9a 1f 08 cc c9 7b 11 30 77 04 64 37 0d 4b b0 65 6b 0b e7 c2 69 a6 8a 0d 7a 04 0f 94 5a b5 b2 Data Ascii: XnyA?CI3d")h)`] 6hS'+)h.N6E 39a|_~_?"e$_?ccHGgq,EyEa6_(`gn`T\\Z&YUgi&s%14[$10[,0L/yLjH@F(ZpM_IJKx*ZO`#g&_etvn;RLF0bUW}D$YkzyN-W|}i0l`Q4xa`c~QMnkbr*X2#.Tj.+6*\9P]#/wO'U7Lh0m7Vpj mq1?X
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 10 Mar 2025 11:52:22 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jd4Gaz4an4JPRo0NKMee0OUDwgEXh2UbTFq7rsupYHsPSR5z8blgQtmDSw0o4vsYS6UmKmhNHJKcnfOGVK8tPzrZECfIjR1WSvS0Ud1b7S9jOfN2AHDPaxF83cYXHd7%2B7%2BlM%2FKawxg%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91e29b02dea35017-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2002&min_rtt=2002&rtt_var=1001&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=802&delivery_rate=0&cwnd=89&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 62 33 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8e 3d 0f 82 40 10 44 fb fb 15 2b bd 2c 18 ca cd 15 f2 11 49 10 89 39 0a 4b 0c 6b 8e 04 39 e4 0e 8d ff de 00 8d ed cc 9b 97 a1 5d 72 89 d5 ad 4a e1 a4 ce 05 54 f5 b1 c8 63 f0 f6 88 79 aa 32 c4 44 25 5b 73 f0 03 c4 b4 f4 a4 20 ed 9e bd 24 cd 4d 2b 05 b9 ce f5 2c a3 20 82 d2 38 c8 cc 3c b4 84 5b 28 08 57 88 ee a6 fd 2e bb 50 fe 31 3a 94 82 46 a9 34 c3 c4 af 99 ad e3 16 ea 6b 01 9f c6 c2 60 1c 3c 16 0e cc 00 4e 77 16 2c 4f 6f 9e 7c c2 71 f1 ae 46 c2 f5 c9 0f 00 00 ff ff e3 02 00 f3 7c 15 3c c4 00 00 00 0d 0a Data Ascii: b3L=@D+,I9Kk9]rJTcy2D%[s $M+, 8<[(W.P1:F4k`<Nw,Oo|qF|<
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 10 Mar 2025 11:52:24 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=NGKr7KYt6FH8c4sle2CjlBrIjp1TsJElzsnI4oel0%2FwIgUV5iOp0DTsLfQacTv9uIA6uerrQ2hcvtVCgvUnroG3TOlUW3oxQMRMY93sph14R1j9kaqOjwqD3UsnKxrGKq3pWYk4znA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91e29b12edfbc327-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1665&min_rtt=1665&rtt_var=832&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=822&delivery_rate=0&cwnd=182&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 62 33 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8e 3d 0f 82 40 10 44 fb fb 15 2b bd 2c 18 ca cd 15 f2 11 49 10 89 39 0a 4b 0c 6b 8e 04 39 e4 0e 8d ff de 00 8d ed cc 9b 97 a1 5d 72 89 d5 ad 4a e1 a4 ce 05 54 f5 b1 c8 63 f0 f6 88 79 aa 32 c4 44 25 5b 73 f0 03 c4 b4 f4 a4 20 ed 9e bd 24 cd 4d 2b 05 b9 ce f5 2c a3 20 82 d2 38 c8 cc 3c b4 84 5b 28 08 57 88 ee a6 fd 2e bb 50 fe 31 3a 94 82 46 a9 34 c3 c4 af 99 ad e3 16 ea 6b 01 9f c6 c2 60 1c 3c 16 0e cc 00 4e 77 16 2c 4f 6f 9e 7c c2 71 f1 ae 46 c2 f5 c9 0f 00 00 ff ff e3 02 00 f3 7c 15 3c c4 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: b3L=@D+,I9Kk9]rJTcy2D%[s $M+, 8<[(W.P1:F4k`<Nw,Oo|qF|<0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 10 Mar 2025 11:52:27 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2BJwB7PG8RTI12h8%2FEV4NH6i4GzO7Sc8qv1SouraSlRlVygFANrkiS4BWKBxrltdJ4Lxf%2FKkU5%2FocbOP6NNr7rUFm0PE1cnZkrncE%2F%2FS%2FvEQv%2FGiTX1jUMPy3Vnj4VQ9g%2FWIhOuePgw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91e29b22f9aa5017-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1992&min_rtt=1992&rtt_var=996&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=814&delivery_rate=0&cwnd=89&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 62 33 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8e 3d 0f 82 40 10 44 fb fb 15 2b bd 2c 18 ca cd 15 f2 11 49 10 89 39 0a 4b 0c 6b 8e 04 39 e4 0e 8d ff de 00 8d ed cc 9b 97 a1 5d 72 89 d5 ad 4a e1 a4 ce 05 54 f5 b1 c8 63 f0 f6 88 79 aa 32 c4 44 25 5b 73 f0 03 c4 b4 f4 a4 20 ed 9e bd 24 cd 4d 2b 05 b9 ce f5 2c a3 20 82 d2 38 c8 cc 3c b4 84 5b 28 08 57 88 ee a6 fd 2e bb 50 fe 31 3a 94 82 46 a9 34 c3 c4 af 99 ad e3 16 ea 6b 01 9f c6 c2 60 1c 3c 16 0e cc 00 4e 77 16 2c 4f 6f 9e 7c c2 71 f1 ae 46 c2 f5 c9 0f 00 00 ff ff e3 02 00 f3 7c 15 3c c4 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: b3L=@D+,I9Kk9]rJTcy2D%[s $M+, 8<[(W.P1:F4k`<Nw,Oo|qF|<0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 10 Mar 2025 11:52:30 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tRGBFxossrLN%2BMdBOYsO1ikzn9%2F7g0H26KWLp%2BBVIIsDnGXW0x%2BhkHUDQLVWZFYIiB%2Bdr5jqyj4jZtmW2AL6T99wEvZDgO6CRoDKOlQRx9nTztBRhdJ%2BDTEsIG5dzhGYb2AkMpSKoA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91e29b32f93bc327-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1591&min_rtt=1591&rtt_var=795&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=541&delivery_rate=0&cwnd=182&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 63 33 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 31 0d 0a 0a 0d 0a 30 0d 0a 0d 0a Data Ascii: c3<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p></body></html>10
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 10 Mar 2025 11:52:35 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 10 Mar 2025 11:52:38 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 10 Mar 2025 11:52:40 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 10 Mar 2025 11:52:43 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Mon, 10 Mar 2025 11:53:21 GMTTransfer-Encoding: chunkedConnection: closeData Raw: 30 0d 0a 0d 0a Data Ascii: 0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Mon, 10 Mar 2025 11:54:27 GMTTransfer-Encoding: chunkedConnection: closeData Raw: 30 0d 0a 0d 0a Data Ascii: 0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Mon, 10 Mar 2025 11:54:30 GMTTransfer-Encoding: chunkedConnection: closeData Raw: 30 0d 0a 0d 0a Data Ascii: 0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 10 Mar 2025 11:54:42 GMTContent-Type: text/html; charset=utf-8Vary: Accept-EncodingContent-Encoding: gzipX-Cache: MISS from ty8z2-cdnb52-151Transfer-Encoding: chunkedConnection: closeData Raw: 34 64 61 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ed 5d fb 73 23 c5 9d ff f9 ae ea fe 87 3e 65 2f 92 41 1a 3d fd d2 da ae d3 6a 65 5b c1 96 1c 49 de 07 cb 46 35 1a b5 a4 c1 a3 19 ed cc c8 96 17 b6 0a f2 00 52 c5 86 70 e4 b1 dc 91 e3 16 92 40 85 ca 92 70 77 40 80 25 ff cc ca eb fd e9 fe 85 fb 76 cf 43 3d 0f c9 62 61 62 eb 0e 6d 81 a5 9e ee 6f 77 7f fa fb ea 6f f7 74 af fc e3 c5 72 be 76 75 a7 80 3a 7a 57 5a fb 87 bf 5f b1 ff 62 be 09 bf 11 7c 56 ba 58 e7 91 d0 e1 55 0d eb ab a1 dd da 7a 6c 29 64 3d d3 45 5d c2 6b d5 43 4d c7 5d 54 50 55 45 5d 89 1b 69 6c 61 99 ef e2 d5 90 aa 34 14 5d 0b 21 41 91 75 2c 03 29 59 11 e5 26 1e 44 65 a5 a5 48 92 72 10 42 71 47 9d 46 b1 7d 11 1f f4 14 55 67 0a 1e 88 4d bd b3 da c4 fb a2 80 63 f4 47 14 89 b2 a8 8b bc 14 d3 04 5e c2 ab c9 28 ea 6b 58 a5 bf f8 06 24 c8 8a dd 66 4d 3f 84 36 1b ed 23 1d 8c 3f 81 2e f0 1a 46 4f c4 47 69 0d a5 79 88 9e 1b fd 26 f9 04 45 52 d4 2c fa 4e 3a 9d 3e ef 7c d2 82 1e 65 51 32 d3 1b a0 4b 58 6d f2 32 1f 45 a1 4d 2c ed 63 5d 14 78 54 c2 7d 1c 8a a2 8e 95 10 45 39 15 9a 1a 45 e1 6d 51 50 15 4d 69 e9 e8 2a bf 89 c5 70 14 69 bc ac c5 a0 e5 62 cb 55 47 97 57 db a2 9c 45 09 57 7a 8f 6f 36 45 b9 0d 0f 50 2a 01 0d 20 ff 73 65 39 50 d4 66 ac a1 62 7e 2f 8b e8 9f 18 49 61 32 dd 1a 75 a7 93 74 f5 da aa 37 49 88 27 3c d5 93 ae c7 34 f1 26 ce a2 d4 92 a7 66 fa f4 00 8b ed 0e e0 33 9f 70 b7 5d 12 65 1c eb 98 8f d3 29 47 71 b6 4d a9 31 23 91 49 2d 2d 09 d8 67 30 ec 3a 33 9e 3a 6d bc 16 48 7f c6 80 4c 9f 79 9e 32 7d 4d 7a fb da 00 4c 81 e3 80 c7 75 a5 0b dc 00 24 34 45 12 9b e8 3b 18 b3 6d 64 3b 96 e6 b4 7e a3 03 b2 06 23 38 8e dd 7c 3b 69 8d ca 84 86 5a b0 3b 21 70 d4 3e 6e a8 9d 23 41 78 9f ed 3a d4 39 09 f2 86 22 8d e1 2d be d1 50 dd 23 d9 57 35 22 54 20 1b 3d 17 51 1d 0f f4 58 13 0b 8a ca eb a2 02 9c df 07 65 a1 12 96 99 9c 31 46 e5 3b 8b 9a 30 10 78 5c 4b dc cd 30 45 7b 69 81 fc 73 d1 17 cc 36 f6 40 5d e9 58 65 9e 32 60 f2 d9 8e b2 8f dd dd 9b aa 0f 0c 15 8e 4a 04 26 7a d4 d5 c2 06 2f ec b5 55 05 30 00 0d d4 5a 12 1a 42 c3 d9 90 91 08 73 58 e8 28 48 27 6a cf cd 53 54 57 02 6f 26 12 ff 34 b9 74 4f f5 94 b5 05 27 e9 65 00 d2 f5 16 68 f0 2c e2 fb ba e2 c2 8f e1 9d a5 79 b6 5e c2 58 0e 15 90 e4 32 f3 ae c2 a3 7e c7 2c fd db 5a 24 ff dc f9 a8 f4 79 d5 a3 29 95 2a 88 58 5f cb a2 b4 3f ef b6 f8 ae 28 1d 66 51 5e 91 41 66 79 0d d4 f7 96 d8 c0 06 e7 a1 6d 05 ac 47 14 6d 63 59 52 a2 90 a7 af 8a 58 8d a2 2e 24 6b 3d de a1 80 60 2c dd 03 41 a0 5c 43 93 00 1d a7 85 d8 74 86 49 c0 5e 6d f1 87 4a 5f 77 58 2c 0e e0 89 75 9b b1 f4 98 31 4f 39 a0 67 79 ce 2c b8 3c a6 e0 e2 b8 82 d7 04 40 4a fb c1 6a c8 24 10 ba ee a6 00 2c c1 83 e2 97 70 4b f7 97 1a 4e 90 30 af b6 c4 81 bb 24 4d cf 82 2e ed f8 17 fc e7 2e 6e 8a 3c 52 64 e9 10 69 82 8a b1 8c 46 b8 f3 72 13 45 ba a2 0c d
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 10 Mar 2025 11:54:44 GMTContent-Type: text/html; charset=utf-8Vary: Accept-EncodingContent-Encoding: gzipX-Cache: MISS from ty8z2-cdnb52-151Transfer-Encoding: chunkedConnection: closeData Raw: 34 64 61 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ed 5d fb 73 1b 45 9e ff f9 ae ea fe 87 3e 91 5b c9 20 8d 24 4b b6 65 c5 76 9d 22 cb 8f 8d 2c 19 49 ce 83 90 55 8d 46 2d 69 f0 68 46 99 19 d9 52 20 55 b0 0f 60 ab c8 b2 1c fb 08 77 ec 71 81 dd 85 5a 6a c3 2e 77 07 2c 10 f6 9f 89 1c e7 a7 fb 17 ee db f3 52 cf 4b 16 81 59 5b 77 28 05 96 7a ba bf dd fd e9 ef ab bf dd d3 bd f2 8f eb e5 7c ed ea 6e 01 75 d4 ae b0 f6 0f 7f bf 62 fd c5 6c 13 7e 23 f8 ac 74 b1 ca 22 ae c3 ca 0a 56 57 43 7b b5 8d 58 26 64 3e 53 79 55 c0 6b d5 a1 a2 e2 2e 2a c8 b2 24 af c4 f5 34 ba b0 c8 76 f1 6a 48 96 1a 92 aa 84 10 27 89 2a 16 81 94 28 f1 62 13 0f a2 a2 d4 92 04 41 3a 0c a1 b8 ad 4e bd d8 01 8f 0f 7b 92 ac 52 05 0f f9 a6 da 59 6d e2 03 9e c3 31 ed 47 14 f1 22 af f2 ac 10 53 38 56 c0 ab c9 28 ea 2b 58 d6 7e b1 0d 48 10 25 ab cd 8a 3a 84 36 eb ed 23 1d 8c 3f 89 2e b0 0a 46 4f c6 c7 69 0d a9 39 44 cf 8f 7f 93 7c 9c 24 48 72 16 3d 91 4a a5 ce db 9f b4 a0 47 59 94 4c f7 06 e8 12 96 9b ac c8 46 51 68 0b 0b 07 58 e5 39 16 95 70 1f 87 a2 a8 63 26 44 51 4e 86 a6 46 51 78 87 e7 64 49 91 5a 2a ba ca 6e 61 3e 1c 45 0a 2b 2a 31 68 39 df 72 d4 d1 65 e5 36 2f 66 51 c2 91 de 63 9b 4d 5e 6c c3 03 34 9f 80 06 90 ff 39 b2 1c 4a 72 33 d6 90 31 bb 9f 45 da 9f 18 49 a1 32 dd 1a 77 a7 93 74 f4 da ac 37 49 88 27 5c d5 93 ae c7 14 fe 26 ce a2 f9 8c ab 66 ed e9 21 e6 db 1d c0 67 21 e1 6c bb c0 8b 38 d6 31 1e a7 e6 6d c5 e9 36 cd fb 8c 44 7a 3e 93 e1 b0 c7 60 58 75 a6 5d 75 5a 78 2d 92 fe f8 80 ac 3d 73 3d a5 fa 9a 74 f7 b5 01 98 02 c7 01 8f ab 52 17 b8 01 48 28 92 c0 37 d1 13 18 d3 6d a4 3b 96 62 94 7e a3 03 b2 06 23 e8 c7 6e 9e 9d 34 47 65 42 43 4d d8 ed 10 d8 6a f7 1b 6a fb 48 10 de a7 bb 0e 75 4e 82 bc 21 09 3e bc c5 36 1a b2 73 24 fb b2 42 84 0a 64 a3 e7 20 aa e2 81 1a 6b 62 4e 92 59 95 97 80 f3 fb a0 2c 64 c2 32 93 33 c6 34 f9 ce a2 26 0c 04 f6 6b 89 b3 19 86 68 67 16 c9 3f 07 7d ce 68 63 0f d4 95 8a 65 ea 29 05 26 9b ed 48 07 d8 d9 bd a9 fa 40 51 61 34 89 c0 44 8f 3a 5a d8 60 b9 fd b6 2c 01 06 a0 81 5a 19 ae c1 35 ec 0d 19 8b 30 83 b9 8e 84 54 a2 f6 9c 3c a5 e9 4a e0 cd 44 e2 9f 26 97 ee c9 ae b2 96 e0 24 dd 0c 40 ba de 02 0d 9e 45 6c 5f 95 1c f8 51 bc 93 59 a0 eb 25 8c 65 53 01 49 26 bd e0 28 3c ee 77 cc d4 bf ad 25 f2 cf 99 4f 93 3e b7 7a 34 a4 52 06 11 eb 2b 59 94 f2 e6 dd 16 db e5 85 61 16 e5 25 11 64 96 55 40 7d 17 f9 06 d6 39 0f ed 48 60 3d a2 68 07 8b 82 14 85 3c 7d 99 c7 72 14 75 21 59 e9 b1 36 05 04 63 e9 1c 08 02 e5 1a 9a 04 a8 9f 16 a2 d3 29 26 01 7b 55 64 87 52 5f b5 59 2c 06 e0 89 75 9b b1 94 cf 98 cf db a0 a7 79 ce 28 b8 ec 53 70 c9 af e0 35 0e 90 52 7e b0 1a 32 08 84 ae 3b 29 00 4b b0 a0 f8 05 dc 52 bd a5 86 e1 04 cc ca 2d 7e e0 2c a9 a5 67 41 97 76 bc 0b fe 73 17 37 79 16 49 a2 30 44 0a 27 63 2c a2 31 ee ac d8 44 91 2e 2f 82 f6 1
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 10 Mar 2025 11:54:47 GMTContent-Type: text/html; charset=utf-8Vary: Accept-EncodingContent-Encoding: gzipX-Cache: MISS from ty8z2-cdnb52-151Transfer-Encoding: chunkedConnection: closeData Raw: 34 64 61 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ed 5d fb 73 1b 45 9e ff f9 ae ea fe 87 3e 91 5b c9 20 8d 9e b6 65 c5 76 9d 22 cb b6 88 2d 79 25 39 0f 42 56 35 1a b5 a4 89 47 33 ca cc c8 96 02 a9 82 7d 00 5b 45 96 e5 d8 47 b8 63 8f 0b ec 2e d4 52 9b ec 72 77 c0 02 61 ff 99 c8 b1 7f ba 7f e1 be 3d 2f f5 3c 24 8b c0 ac ad 3b 94 02 4b 3d dd df ee fe f4 f7 d5 df ee e9 5e fe c7 b5 52 ae 7a 75 27 8f da 6a 47 58 fd 87 bf 5f b6 fe 62 b6 01 bf 11 7c 96 3b 58 65 11 d7 66 65 05 ab 2b 81 dd ea 7a 24 1d 30 9f a9 bc 2a e0 d5 ca 40 51 71 07 e5 65 59 92 97 a3 7a 1a 5d 58 64 3b 78 25 20 4b 75 49 55 02 88 93 44 15 8b 40 4a 94 78 b1 81 fb 61 51 6a 4a 82 20 1d 04 50 d4 56 a7 5e 6c 9f c7 07 5d 49 56 a9 82 07 7c 43 6d af 34 f0 3e cf e1 88 f6 23 8c 78 91 57 79 56 88 28 1c 2b e0 95 78 18 f5 14 2c 6b bf d8 3a 24 88 92 d5 66 45 1d 40 9b f5 f6 91 0e 46 9f 46 17 58 05 a3 a7 a3 a3 b4 ba d4 18 a0 17 46 bf 49 3e 4e 12 24 39 83 9e 4a 26 93 e7 ed 4f 9a d0 a3 0c 8a a7 ba 7d 74 09 cb 0d 56 64 c3 28 b0 89 85 7d ac f2 1c 8b 8a b8 87 03 61 d4 36 13 c2 28 2b 43 53 c3 28 b8 cd 73 b2 a4 48 4d 15 5d 65 37 31 1f 0c 23 85 15 95 08 b4 9c 6f 3a ea e8 b0 72 8b 17 33 28 e6 48 ef b2 8d 06 2f b6 e0 01 4a c4 a0 01 e4 7f 8e 2c 07 92 dc 88 d4 65 cc ee 65 90 f6 27 42 52 a8 4c b7 47 dd 69 c7 1d bd 36 eb 8d 13 e2 31 57 f5 a4 eb 11 85 bf 85 33 28 91 76 d5 ac 3d 3d c0 7c ab 0d f8 cc c7 9c 6d 17 78 11 47 da c6 e3 64 c2 56 9c 6e 53 62 cc 48 a4 12 e9 34 87 3d 06 c3 aa 33 e5 aa d3 c2 6b 81 f4 67 0c c8 da 33 d7 53 aa af 71 77 5f eb 80 29 70 1c f0 b8 2a 75 80 1b 80 84 22 09 7c 03 3d 85 31 dd 46 ba 63 49 46 e9 d5 db 20 6b 30 82 e3 d8 cd b3 93 e6 a8 4c 68 a8 09 bb 1d 02 5b ed e3 86 da 3e 12 84 f7 e9 ae 43 9d 93 20 af 4b c2 18 de 62 eb 75 d9 39 92 3d 59 21 42 05 b2 d1 75 10 55 71 5f 8d 34 30 27 c9 ac ca 4b c0 f9 3d 50 16 32 61 99 c9 19 23 9a 7c 67 50 03 06 02 8f 6b 89 b3 19 86 68 a7 17 c8 3f 07 7d ce 68 63 17 d4 95 8a 65 ea 29 05 26 9b 69 4b fb d8 d9 bd a9 fa 40 51 61 34 89 c0 44 8f 3a 5a 58 67 b9 bd 96 2c 01 06 a0 81 9a 69 ae ce d5 ed 0d 19 89 30 83 b9 b6 84 54 a2 f6 9c 3c a5 e9 4a e0 cd 58 ec 9f 26 97 ee ca ae b2 96 e0 c4 dd 0c 40 ba de 04 0d 9e 41 6c 4f 95 1c f8 51 bc 93 9e a7 eb 25 8c 65 53 01 71 26 35 ef 28 3c ea 77 c4 d4 bf cd 45 f2 cf 99 4f 93 3e b7 7a 34 a4 52 06 11 eb 29 19 94 f4 e6 dd 26 db e1 85 41 06 e5 24 11 64 96 55 40 7d 6f f1 75 ac 73 1e da 96 c0 7a 84 d1 36 16 05 29 0c 79 7a 32 8f e5 30 ea 40 b2 d2 65 6d 0a 08 c6 d2 39 10 04 ca 55 34 09 d0 71 5a 88 4e a7 98 04 ec d5 16 3b 90 7a aa cd 62 31 00 4f a4 d3 88 24 c7 8c 79 c2 06 3d cd 73 46 c1 a5 31 05 17 c7 15 bc c6 01 52 ca 0f 56 02 06 81 c0 75 27 05 60 09 16 14 bf 80 9b aa b7 d4 30 9c 80 59 b9 c9 f7 9d 25 b5 f4 0c e8 d2 b6 77 c1 7f ee e0 06 cf 22 49 14 06 48 e1 64 8c 45 34 c2 9d 15 1b 28 d4 e1 45 d0 1
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 10 Mar 2025 11:54:50 GMTContent-Type: text/html; charset=utf-8Vary: Accept-EncodingX-Cache: MISS from ty8z2-cdnb52-151Transfer-Encoding: chunkedConnection: closeData Raw: 34 66 32 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0d 0a 20 20 20 20 3c 74 69 74 6c 65 3e 53 79 73 74 65 6d 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 2c 6e 6f 66 6f 6c 6c 6f 77 22 20 2f 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 75 73 65 72 2d 73 63 61 6c 61 62 6c 65 3d 6e 6f 22 3e 0d 0a 20 20 20 20 3c 73 74 79 6c 65 3e 0d 0a 20 20 20 20 20 20 20 20 2f 2a 20 42 61 73 65 20 2a 2f 0d 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 33 33 33 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 3a 20 31 34 70 78 20 56 65 72 64 61 6e 61 2c 20 22 48 65 6c 76 65 74 69 63 61 20 4e 65 75 65 22 2c 20 68 65 6c 76 65 74 69 63 61 2c 20 41 72 69 61 6c 2c 20 27 4d 69 63 72 6f 73 6f 66 74 20 59 61 48 65 69 27 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 20 32 30 70 78 20 32 30 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 77 6f 72 64 2d 62 72 65 61 6b 3a 20 62 72 65 61 6b 2d 77 6f 72 64 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 68 31 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 31 30 70 78 20 30 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 38 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 35 30 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 20 33 32 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 68 32 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 34 32 38 38 63 65 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 34 30 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 36 70 78 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 36 70 78 20 30 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 38 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 6f 72 64 65 72 2d 62 6f 74 74 6f 6d 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 65 65 65 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 68 33 2e 73 75 62 68 65 61 64 69 6e 67 20 7b 0d 0a 20 20 20 20 2
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000004D58000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000003E68000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: http://theweb.services/koyo/?Jh-=BEWBr2ugDNg83
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.9xiuzhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.aijiuzhibo.com
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.aikea.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.aituzhibo.com
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.astellia.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.baihuzhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.baixiuzhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.beian.gov.cn/portal/registerSystemInfo?recordcode=688316834524
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.biomedika.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.biomedika.net/binding
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.bizedge.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.blackmind.net
                Source: mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.bluemonk.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.chunjizhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.chunyanzhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.chuxinzhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.cyberpolice.cn
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.dachengzhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.daoguozhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.dayizhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.dfars.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.duoquzhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.feizhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fentaozhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.finesttravel.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.focusedgrowth.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.gmttoken.net/binding
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.guastalla.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.haiyuezhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.happylittle.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.housegallery.net
                Source: mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.huoyazhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jingmeizhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiuyinzhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.kazimierz.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.kraco.net
                Source: mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: http://www.lianlianzhibo.net/38vp/
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.lianlianzhibo.net/template/news/wandoujia/static/css/appsdetail.6f4104a5611f3a6cc38f23add
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.lianlianzhibo.net/template/news/wandoujia/static/css/pcmodule.edd4638c5c3b3039832390269d4
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.lianlianzhibo.net/template/news/wandoujia/static/js/adblock.fe363a40.js
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.lianlianzhibo.net/template/news/wandoujia/static/js/aggregatedentry.fe363a40.js
                Source: mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.lianlianzhibo.net/template/news/wandoujia/static/js/appsdetail.fe363a40.js
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.lianlianzhibo.net/template/news/wandoujia/static/js/bl.js
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.lianlianzhibo.net/template/news/wandoujia/static/js/broadcast.js
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.lianlianzhibo.net/template/news/wandoujia/static/js/common.fe363a40.js
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.lianlianzhibo.net/template/news/wandoujia/static/js/footer.fe363a40.js
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.lianlianzhibo.net/template/news/wandoujia/static/js/footerbar.fe363a40.js
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.lianlianzhibo.net/template/news/wandoujia/static/js/header.fe363a40.js
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.lianlianzhibo.net/template/news/wandoujia/static/js/index.umd.js
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.lianlianzhibo.net/template/news/wandoujia/static/js/js.js
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.lianlianzhibo.net/template/news/wandoujia/static/js/nc.js
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.lianlianzhibo.net/template/news/wandoujia/static/js/pcmodule.fe363a40.js
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.lianlianzhibo.net/template/news/wandoujia/static/js/pullup.js
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.lianlianzhibo.net/template/news/wandoujia/static/js/realNameAuth.js
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.lianlianzhibo.net/template/news/wandoujia/static/js/replyItem.fe363a40.js
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.lianlianzhibo.net/template/news/wandoujia/static/js/tracker.fe363a40.js
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.lianlianzhibo.net/template/news/wandoujia/static/picture/anva-zilv.png
                Source: mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.lianlianzhibo.net/template/news/wandoujia/static/picture/default_avatar.jpg
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.lianlianzhibo.net/template/news/wandoujia/static/picture/qr-4_httpswww.wandoujia.comqr.pn
                Source: mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.lianlianzhibo.net/template/news/wandoujia/static/picture/qr-5_httpswww.wandoujia.comqr.pn
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.lianwuzhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.liguizhibo.com
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.lingyangzhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.litalia.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.luolizhibo.com
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.maituzhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mangguozhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.meblekuchenne.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.medicalink.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mediprotect.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.meijiangzhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.meikazhibo.com
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.meisezhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.miaosuzhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mierzhibo.com
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mijianzhibo.net
                Source: mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.milianzhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mituzhibo.com
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.monum.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozizhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mynorthstar.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.nanyouzhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.nekrasov.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.nenhuazhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.nvdizhibo.com
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.nvdizhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ourdeal.net/binding
                Source: mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pessoas.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pharco.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.projectred.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.qigezhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.qinglaizhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.qinglizhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.refcomp.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.roverclub.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.royalparty.net
                Source: mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.s8zhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.subazhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.taoquzhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.thedrawingroom.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.themediahub.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.theremix.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000006030000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000005140000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: http://www.thinkphp.cn
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tigersystems.net
                Source: mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tumac.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.wangyouzhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.webcruiser.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.westmusic.net/binding
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.wuhaozhibo.com
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.wuwuzhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.wuyuezhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.xiangcaozhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.xianshangzhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.xinglianzhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.xingyuezhibo.net
                Source: mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.xiuchangzhibo.com
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.xixiazhibo.com
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.xunmeizhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.yaomeizhibo.com
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.yechuizhibo.com
                Source: mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.yechunzhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.yingzhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.yinhezhibo.com
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.yiyingzhibo.net/binding
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.yudiezhibo.net
                Source: mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.yueaizhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.yuechengzhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.yueyingzhibo.net/binding
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.yuguozhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.yuhezhibo.com
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.yutongzhibo.com
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.yutongzhibo.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ziah.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3388463854.0000000006B01000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.zkderby.xyz
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3388463854.0000000006B01000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.zkderby.xyz/fxeu/
                Source: mfpmp.exe, 00000004.00000002.3385949623.0000000007A6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org?q=
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://beian.miit.gov.cn/#/Integrated/index
                Source: mfpmp.exe, 00000004.00000002.3385949623.0000000007A6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: mfpmp.exe, 00000004.00000002.3385949623.0000000007A6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: mfpmp.exe, 00000004.00000002.3385949623.0000000007A6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: mfpmp.exe, 00000004.00000002.3384121543.0000000004642000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://dts.gnpge.com
                Source: mfpmp.exe, 00000004.00000002.3385949623.0000000007A6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/?q=
                Source: mfpmp.exe, 00000004.00000002.3385949623.0000000007A6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: mfpmp.exe, 00000004.00000002.3385949623.0000000007A6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabv20
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000004EEA000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000003FFA000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://fburl.com
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000004EEA000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000003FFA000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/css?family=Open
                Source: mfpmp.exe, 00000004.00000002.3385949623.0000000007A6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gemini.google.com/app?q=
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://img.ucdl.pp.uc.cn/upload_files/wdj_web/public/img/favicon.ico
                Source: mfpmp.exe, 00000004.00000002.3381523317.0000000000913000.00000004.00000020.00020000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3381523317.000000000093A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: mfpmp.exe, 00000004.00000002.3381523317.0000000000913000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                Source: mfpmp.exe, 00000004.00000003.1244299430.0000000007A41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srfhttps://login.
                Source: mfpmp.exe, 00000004.00000002.3381523317.0000000000913000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: mfpmp.exe, 00000004.00000002.3381523317.0000000000932000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
                Source: mfpmp.exe, 00000004.00000002.3381523317.0000000000913000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: mfpmp.exe, 00000004.00000002.3381523317.0000000000913000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000004EEA000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000003FFA000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://optimize.google.com
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://push.zhanzhang.baidu.com/push.js
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000004EEA000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000003FFA000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://td.doubleclick.net
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ucan.25pp.com/Wandoujia_wandoujia_qrbinded.apk
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000004EEA000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000003FFA000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://w.ladicdn.com/v2/source/html5shiv.min.js?v=1569310222693
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000004EEA000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000003FFA000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://w.ladicdn.com/v2/source/respond.min.js?v=1569310222693
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://white.anva.org.cn/
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.12377.cn/
                Source: mfpmp.exe, 00000004.00000002.3385949623.0000000007A6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/v20w
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000004EEA000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000003FFA000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.00000000059E8000.00000004.80000000.00040000.00000000.sdmp, BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.00000000053A0000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004AF8000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.00000000044B0000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                Source: mfpmp.exe, 00000004.00000002.3385949623.0000000007A6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000004EEA000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000003FFA000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.googleanalytics.com
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000004EEA000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000003FFA000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.googleoptimize.com
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://zz.bdstatic.com/linksubmit/push.js
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.0000000005856000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.0000000004966000.00000004.10000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3385860727.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://zzlz.gsxt.gov.cn/
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_00264164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00264164
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_00264164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00264164
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_00263F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00263F66
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0025001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_0025001C
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0027CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0027CABC

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.340000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.340000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.3388463854.0000000006A80000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1065063450.0000000002E00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3380912632.0000000000800000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1064547465.0000000000340000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3382955858.0000000000C40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3382873447.0000000000BF0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1065598186.0000000003600000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3383591715.0000000002230000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: This is a third-party compiled AutoIt script.0_2_001F3B3A
                Source: 2rvyZc27tz.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: 2rvyZc27tz.exe, 00000000.00000002.947206616.00000000002A4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_db643a78-0
                Source: 2rvyZc27tz.exe, 00000000.00000002.947206616.00000000002A4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_9679d45d-7
                Source: 2rvyZc27tz.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_3dbfa719-2
                Source: 2rvyZc27tz.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_17dac546-b
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0036CC63 NtClose,2_2_0036CC63
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72B60 NtClose,LdrInitializeThunk,2_2_02F72B60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_02F72DF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F735C0 NtCreateMutant,LdrInitializeThunk,2_2_02F735C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F74340 NtSetContextThread,2_2_02F74340
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F74650 NtSuspendThread,2_2_02F74650
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72AF0 NtWriteFile,2_2_02F72AF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72AD0 NtReadFile,2_2_02F72AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72AB0 NtWaitForSingleObject,2_2_02F72AB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72BF0 NtAllocateVirtualMemory,2_2_02F72BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72BE0 NtQueryValueKey,2_2_02F72BE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72BA0 NtEnumerateValueKey,2_2_02F72BA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72B80 NtQueryInformationFile,2_2_02F72B80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72EE0 NtQueueApcThread,2_2_02F72EE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72EA0 NtAdjustPrivilegesToken,2_2_02F72EA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72E80 NtReadVirtualMemory,2_2_02F72E80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72E30 NtWriteVirtualMemory,2_2_02F72E30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72FE0 NtCreateFile,2_2_02F72FE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72FB0 NtResumeThread,2_2_02F72FB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72FA0 NtQuerySection,2_2_02F72FA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72F90 NtProtectVirtualMemory,2_2_02F72F90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72F60 NtCreateProcessEx,2_2_02F72F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72F30 NtCreateSection,2_2_02F72F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72CF0 NtOpenProcess,2_2_02F72CF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72CC0 NtQueryVirtualMemory,2_2_02F72CC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72CA0 NtQueryInformationToken,2_2_02F72CA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72C70 NtFreeVirtualMemory,2_2_02F72C70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72C60 NtCreateKey,2_2_02F72C60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72C00 NtQueryInformationProcess,2_2_02F72C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72DD0 NtDelayExecution,2_2_02F72DD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72DB0 NtEnumerateKey,2_2_02F72DB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72D30 NtUnmapViewOfSection,2_2_02F72D30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72D10 NtMapViewOfSection,2_2_02F72D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72D00 NtSetInformationFile,2_2_02F72D00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F73090 NtSetValueKey,2_2_02F73090
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F73010 NtOpenDirectoryObject,2_2_02F73010
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F739B0 NtGetContextThread,2_2_02F739B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F73D70 NtOpenThread,2_2_02F73D70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F73D10 NtOpenProcessToken,2_2_02F73D10
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A4340 NtSetContextThread,LdrInitializeThunk,4_2_031A4340
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A4650 NtSuspendThread,LdrInitializeThunk,4_2_031A4650
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A2B60 NtClose,LdrInitializeThunk,4_2_031A2B60
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A2BA0 NtEnumerateValueKey,LdrInitializeThunk,4_2_031A2BA0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A2BF0 NtAllocateVirtualMemory,LdrInitializeThunk,4_2_031A2BF0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A2BE0 NtQueryValueKey,LdrInitializeThunk,4_2_031A2BE0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A2AD0 NtReadFile,LdrInitializeThunk,4_2_031A2AD0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A2AF0 NtWriteFile,LdrInitializeThunk,4_2_031A2AF0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A2F30 NtCreateSection,LdrInitializeThunk,4_2_031A2F30
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A2FB0 NtResumeThread,LdrInitializeThunk,4_2_031A2FB0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A2FE0 NtCreateFile,LdrInitializeThunk,4_2_031A2FE0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A2E80 NtReadVirtualMemory,LdrInitializeThunk,4_2_031A2E80
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A2EE0 NtQueueApcThread,LdrInitializeThunk,4_2_031A2EE0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A2D10 NtMapViewOfSection,LdrInitializeThunk,4_2_031A2D10
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A2D30 NtUnmapViewOfSection,LdrInitializeThunk,4_2_031A2D30
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A2DD0 NtDelayExecution,LdrInitializeThunk,4_2_031A2DD0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A2DF0 NtQuerySystemInformation,LdrInitializeThunk,4_2_031A2DF0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A2C70 NtFreeVirtualMemory,LdrInitializeThunk,4_2_031A2C70
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A2C60 NtCreateKey,LdrInitializeThunk,4_2_031A2C60
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A2CA0 NtQueryInformationToken,LdrInitializeThunk,4_2_031A2CA0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A35C0 NtCreateMutant,LdrInitializeThunk,4_2_031A35C0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A39B0 NtGetContextThread,LdrInitializeThunk,4_2_031A39B0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A2B80 NtQueryInformationFile,4_2_031A2B80
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A2AB0 NtWaitForSingleObject,4_2_031A2AB0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A2F60 NtCreateProcessEx,4_2_031A2F60
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A2F90 NtProtectVirtualMemory,4_2_031A2F90
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A2FA0 NtQuerySection,4_2_031A2FA0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A2E30 NtWriteVirtualMemory,4_2_031A2E30
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A2EA0 NtAdjustPrivilegesToken,4_2_031A2EA0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A2D00 NtSetInformationFile,4_2_031A2D00
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A2DB0 NtEnumerateKey,4_2_031A2DB0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A2C00 NtQueryInformationProcess,4_2_031A2C00
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A2CC0 NtQueryVirtualMemory,4_2_031A2CC0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A2CF0 NtOpenProcess,4_2_031A2CF0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A3010 NtOpenDirectoryObject,4_2_031A3010
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A3090 NtSetValueKey,4_2_031A3090
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A3D10 NtOpenProcessToken,4_2_031A3D10
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A3D70 NtOpenThread,4_2_031A3D70
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_00829480 NtCreateFile,4_2_00829480
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_008295E0 NtReadFile,4_2_008295E0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_008296D0 NtDeleteFile,4_2_008296D0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_00829770 NtClose,4_2_00829770
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_008298D0 NtAllocateVirtualMemory,4_2_008298D0
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0025A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_0025A1EF
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_00248310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00248310
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_002551BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_002551BD
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_001FE6A00_2_001FE6A0
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0021D9750_2_0021D975
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_002121C50_2_002121C5
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_002262D20_2_002262D2
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_002703DA0_2_002703DA
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0022242E0_2_0022242E
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_002125FA0_2_002125FA
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0024E6160_2_0024E616
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_002066E10_2_002066E1
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0022878F0_2_0022878F
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_002088080_2_00208808
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_002268440_2_00226844
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_002708570_2_00270857
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_002588890_2_00258889
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0021CB210_2_0021CB21
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_00226DB60_2_00226DB6
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_00206F9E0_2_00206F9E
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_002030300_2_00203030
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_002131870_2_00213187
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0021F1D90_2_0021F1D9
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_001F12870_2_001F1287
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_002114840_2_00211484
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_002055200_2_00205520
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_002176960_2_00217696
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_002057600_2_00205760
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_002119780_2_00211978
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_00229AB50_2_00229AB5
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_001FFCE00_2_001FFCE0
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0021BDA60_2_0021BDA6
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_00211D900_2_00211D90
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_00277DDB0_2_00277DDB
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_001FDF000_2_001FDF00
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_00203FE00_2_00203FE0
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_00C135F00_2_00C135F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00358B232_2_00358B23
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003428752_2_00342875
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003428802_2_00342880
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003411A02_2_003411A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003432702_2_00343270
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0036F2A32_2_0036F2A3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003502A32_2_003502A3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0035029A2_2_0035029A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003423362_2_00342336
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003423402_2_00342340
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0034E4A32_2_0034E4A3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003424F02_2_003424F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003424E62_2_003424E6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003504C32_2_003504C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00356D232_2_00356D23
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00356D1E2_2_00356D1E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0034E5F32_2_0034E5F3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0034E5E72_2_0034E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003447AF2_2_003447AF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC02C02_2_02FC02C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE02742_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030003E62_2_030003E6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E3F02_2_02F4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFA3522_2_02FFA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030001AA2_2_030001AA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD20002_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF81CC2_2_02FF81CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF41A22_2_02FF41A2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC81582_2_02FC8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDA1182_2_02FDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F301002_2_02F30100
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5C6E02_2_02F5C6E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3C7C02_2_02F3C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F407702_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F647502_2_02F64750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEE4F62_2_02FEE4F6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030005912_2_03000591
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF24462_2_02FF2446
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE44202_2_02FE4420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F405352_2_02F40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA802_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF6BD72_2_02FF6BD7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFAB402_2_02FFAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E8F02_2_02F6E8F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F268B82_2_02F268B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0300A9A62_2_0300A9A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4A8402_2_02F4A840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F428402_2_02F42840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A02_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F569622_2_02F56962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFEEDB2_2_02FFEEDB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F52E902_2_02F52E90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFCE932_2_02FFCE93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40E592_2_02F40E59
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFEE262_2_02FFEE26
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4CFE02_2_02F4CFE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F32FC82_2_02F32FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBEFA02_2_02FBEFA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB4F402_2_02FB4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F60F302_2_02F60F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE2F302_2_02FE2F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F82F282_2_02F82F28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30CF22_2_02F30CF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0CB52_2_02FE0CB5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40C002_2_02F40C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3ADE02_2_02F3ADE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F58DBF2_2_02F58DBF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDCD1F2_2_02FDCD1F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4AD002_2_02F4AD00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE12ED2_2_02FE12ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5B2C02_2_02F5B2C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F452A02_2_02F452A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F8739A2_2_02F8739A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2D34C2_2_02F2D34C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF132D2_2_02FF132D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF70E92_2_02FF70E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFF0E02_2_02FFF0E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEF0CC2_2_02FEF0CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F470C02_2_02F470C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0300B16B2_2_0300B16B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4B1B02_2_02F4B1B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2F1722_2_02F2F172
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F7516C2_2_02F7516C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF16CC2_2_02FF16CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F856302_2_02F85630
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFF7B02_2_02FFF7B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F314602_2_02F31460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFF43F2_2_02FFF43F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030095C32_2_030095C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDD5B02_2_02FDD5B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF75712_2_02FF7571
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEDAC62_2_02FEDAC6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDDAAC2_2_02FDDAAC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F85AA02_2_02F85AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE1AA32_2_02FE1AA3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB3A6C2_2_02FB3A6C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFFA492_2_02FFFA49
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF7A462_2_02FF7A46
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB5BF02_2_02FB5BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F7DBF92_2_02F7DBF9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5FB802_2_02F5FB80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFFB762_2_02FFFB76
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F438E02_2_02F438E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAD8002_2_02FAD800
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F499502_2_02F49950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5B9502_2_02F5B950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD59102_2_02FD5910
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F49EB02_2_02F49EB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F03FD22_2_02F03FD2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F03FD52_2_02F03FD5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFFFB12_2_02FFFFB1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F41F922_2_02F41F92
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFFF092_2_02FFFF09
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFFCF22_2_02FFFCF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB9C322_2_02FB9C32
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5FDC02_2_02F5FDC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF7D732_2_02FF7D73
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF1D5A2_2_02FF1D5A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F43D402_2_02F43D40
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeCode function: 3_2_06ABDF893_2_06ABDF89
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeCode function: 3_2_06ABDF923_2_06ABDF92
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeCode function: 3_2_06ADCF923_2_06ADCF92
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeCode function: 3_2_06AB249E3_2_06AB249E
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeCode function: 3_2_06ABC2E23_2_06ABC2E2
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeCode function: 3_2_06ABC2D63_2_06ABC2D6
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeCode function: 3_2_06AC4A0D3_2_06AC4A0D
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeCode function: 3_2_06AC4A123_2_06AC4A12
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeCode function: 3_2_06AC68123_2_06AC6812
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeCode function: 3_2_06ABE1B23_2_06ABE1B2
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeCode function: 3_2_06ABC1923_2_06ABC192
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeCode function: 3_2_06AC31423_2_06AC3142
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0322A3524_2_0322A352
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_032303E64_2_032303E6
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0317E3F04_2_0317E3F0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_032102744_2_03210274
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031F02C04_2_031F02C0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031601004_2_03160100
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0320A1184_2_0320A118
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031F81584_2_031F8158
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_032301AA4_2_032301AA
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_032281CC4_2_032281CC
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_032020004_2_03202000
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031947504_2_03194750
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031707704_2_03170770
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0316C7C04_2_0316C7C0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0318C6E04_2_0318C6E0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031705354_2_03170535
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_032305914_2_03230591
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_032144204_2_03214420
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_032224464_2_03222446
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0321E4F64_2_0321E4F6
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0322AB404_2_0322AB40
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_03226BD74_2_03226BD7
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0316EA804_2_0316EA80
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031869624_2_03186962
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0323A9A64_2_0323A9A6
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031729A04_2_031729A0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031728404_2_03172840
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0317A8404_2_0317A840
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031568B84_2_031568B8
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0319E8F04_2_0319E8F0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_03212F304_2_03212F30
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_03190F304_2_03190F30
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031B2F284_2_031B2F28
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031E4F404_2_031E4F40
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031EEFA04_2_031EEFA0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_03162FC84_2_03162FC8
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0317CFE04_2_0317CFE0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0322EE264_2_0322EE26
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_03170E594_2_03170E59
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_03182E904_2_03182E90
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0322CE934_2_0322CE93
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0322EEDB4_2_0322EEDB
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0317AD004_2_0317AD00
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0320CD1F4_2_0320CD1F
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_03188DBF4_2_03188DBF
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0316ADE04_2_0316ADE0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_03170C004_2_03170C00
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_03210CB54_2_03210CB5
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_03160CF24_2_03160CF2
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0322132D4_2_0322132D
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0315D34C4_2_0315D34C
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031B739A4_2_031B739A
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031752A04_2_031752A0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_032112ED4_2_032112ED
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0318B2C04_2_0318B2C0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0323B16B4_2_0323B16B
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0315F1724_2_0315F172
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031A516C4_2_031A516C
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0317B1B04_2_0317B1B0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0322F0E04_2_0322F0E0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_032270E94_2_032270E9
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031770C04_2_031770C0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0321F0CC4_2_0321F0CC
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0322F7B04_2_0322F7B0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_032216CC4_2_032216CC
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_032275714_2_03227571
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0320D5B04_2_0320D5B0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0322F43F4_2_0322F43F
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031614604_2_03161460
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0322FB764_2_0322FB76
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0318FB804_2_0318FB80
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031ADBF94_2_031ADBF9
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031E5BF04_2_031E5BF0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_03227A464_2_03227A46
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0322FA494_2_0322FA49
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031E3A6C4_2_031E3A6C
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_03211AA34_2_03211AA3
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0320DAAC4_2_0320DAAC
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031B5AA04_2_031B5AA0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0321DAC64_2_0321DAC6
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_032059104_2_03205910
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031799504_2_03179950
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0318B9504_2_0318B950
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031DD8004_2_031DD800
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031738E04_2_031738E0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0322FF094_2_0322FF09
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_03171F924_2_03171F92
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0322FFB14_2_0322FFB1
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_03179EB04_2_03179EB0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_03227D734_2_03227D73
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_03173D404_2_03173D40
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_03221D5A4_2_03221D5A
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0318FDC04_2_0318FDC0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031E9C324_2_031E9C32
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0322FCF24_2_0322FCF2
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_00811F604_2_00811F60
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0080CDA74_2_0080CDA7
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0080CDB04_2_0080CDB0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0080AFB04_2_0080AFB0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0080CFD04_2_0080CFD0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0080B0F44_2_0080B0F4
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0080B1004_2_0080B100
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_008012BC4_2_008012BC
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_008156304_2_00815630
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0081382B4_2_0081382B
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_008138304_2_00813830
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0082BDB04_2_0082BDB0
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_02EDE3484_2_02EDE348
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_02EE56494_2_02EE5649
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_02EDE7FC4_2_02EDE7FC
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_02EDE4634_2_02EDE463
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_02EDE5CB4_2_02EDE5CB
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_02EE5BB54_2_02EE5BB5
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_02EDD8C84_2_02EDD8C8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02FAEA12 appears 86 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02FBF290 appears 105 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02F75130 appears 58 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02F87E54 appears 111 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02F2B970 appears 280 times
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: String function: 00218900 appears 42 times
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: String function: 001F7DE1 appears 35 times
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: String function: 00210AE3 appears 70 times
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: String function: 031EF290 appears 105 times
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: String function: 0315B970 appears 280 times
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: String function: 031A5130 appears 58 times
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: String function: 031DEA12 appears 86 times
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: String function: 031B7E54 appears 102 times
                Source: 2rvyZc27tz.exe, 00000000.00000003.936454175.0000000003693000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 2rvyZc27tz.exe
                Source: 2rvyZc27tz.exe, 00000000.00000003.934527484.000000000383D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 2rvyZc27tz.exe
                Source: 2rvyZc27tz.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/5@18/13
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0025A06A GetLastError,FormatMessageW,0_2_0025A06A
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_002481CB AdjustTokenPrivileges,CloseHandle,0_2_002481CB
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_002487E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_002487E1
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0025B333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0025B333
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0026EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0026EE0D
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_002683BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_002683BB
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_001F4E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_001F4E89
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeFile created: C:\Users\user\AppData\Local\Temp\autF432.tmpJump to behavior
                Source: 2rvyZc27tz.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: mfpmp.exe, 00000004.00000003.1253350033.000000000098A000.00000004.00000020.00020000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3381523317.00000000009AA000.00000004.00000020.00020000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3381523317.0000000000973000.00000004.00000020.00020000.00000000.sdmp, mfpmp.exe, 00000004.00000003.1253401408.0000000000973000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: 2rvyZc27tz.exeVirustotal: Detection: 50%
                Source: 2rvyZc27tz.exeReversingLabs: Detection: 68%
                Source: unknownProcess created: C:\Users\user\Desktop\2rvyZc27tz.exe "C:\Users\user\Desktop\2rvyZc27tz.exe"
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\2rvyZc27tz.exe"
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeProcess created: C:\Windows\SysWOW64\mfpmp.exe "C:\Windows\SysWOW64\mfpmp.exe"
                Source: C:\Windows\SysWOW64\mfpmp.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\2rvyZc27tz.exe"Jump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeProcess created: C:\Windows\SysWOW64\mfpmp.exe "C:\Windows\SysWOW64\mfpmp.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: mfcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: mfplat.dllJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: ksuser.dllJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: mfperfhelper.dllJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: rtworkq.dllJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: winsqlite3.dllJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                Source: 2rvyZc27tz.exeStatic file information: File size 1175552 > 1048576
                Source: 2rvyZc27tz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: 2rvyZc27tz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: 2rvyZc27tz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: 2rvyZc27tz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: 2rvyZc27tz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: 2rvyZc27tz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: 2rvyZc27tz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: MFPMP.pdb source: svchost.exe, 00000002.00000003.1033683248.0000000000824000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1033669190.000000000081A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1033549396.000000000081B000.00000004.00000020.00020000.00000000.sdmp, BXT55iI64gw1yrBCtj.exe, 00000003.00000003.1142413331.00000000005B8000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: MFPMP.pdbUGP source: svchost.exe, 00000002.00000003.1033683248.0000000000824000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1033669190.000000000081A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1033549396.000000000081B000.00000004.00000020.00020000.00000000.sdmp, BXT55iI64gw1yrBCtj.exe, 00000003.00000003.1142413331.00000000005B8000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: 2rvyZc27tz.exe, 00000000.00000003.934782047.0000000003570000.00000004.00001000.00020000.00000000.sdmp, 2rvyZc27tz.exe, 00000000.00000003.936099785.0000000003710000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.974287872.0000000002B00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1065108482.000000000309E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1065108482.0000000002F00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.976227505.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3383332479.00000000032CE000.00000040.00001000.00020000.00000000.sdmp, mfpmp.exe, 00000004.00000003.1067233430.0000000002F84000.00000004.00000020.00020000.00000000.sdmp, mfpmp.exe, 00000004.00000003.1064817012.0000000002DDB000.00000004.00000020.00020000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3383332479.0000000003130000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: 2rvyZc27tz.exe, 00000000.00000003.934782047.0000000003570000.00000004.00001000.00020000.00000000.sdmp, 2rvyZc27tz.exe, 00000000.00000003.936099785.0000000003710000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.974287872.0000000002B00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1065108482.000000000309E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1065108482.0000000002F00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.976227505.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, mfpmp.exe, mfpmp.exe, 00000004.00000002.3383332479.00000000032CE000.00000040.00001000.00020000.00000000.sdmp, mfpmp.exe, 00000004.00000003.1067233430.0000000002F84000.00000004.00000020.00020000.00000000.sdmp, mfpmp.exe, 00000004.00000003.1064817012.0000000002DDB000.00000004.00000020.00020000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3383332479.0000000003130000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: svchost.pdb source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.000000000464C000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3381523317.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.000000000375C000.00000004.10000000.00040000.00000000.sdmp, firefox.exe, 00000007.00000002.1366222112.000000003B05C000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: svchost.pdbUGP source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3387109585.000000000464C000.00000004.80000000.00040000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3381523317.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, mfpmp.exe, 00000004.00000002.3384121543.000000000375C000.00000004.10000000.00040000.00000000.sdmp, firefox.exe, 00000007.00000002.1366222112.000000003B05C000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: C:\Work\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: BXT55iI64gw1yrBCtj.exe, 00000003.00000000.989201141.000000000012F000.00000002.00000001.01000000.00000004.sdmp
                Source: 2rvyZc27tz.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: 2rvyZc27tz.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: 2rvyZc27tz.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: 2rvyZc27tz.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: 2rvyZc27tz.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_001F4B37 LoadLibraryA,GetProcAddress,0_2_001F4B37
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_001FC4FE push A3001FBAh; retn 001Fh0_2_001FC50D
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_00218945 push ecx; ret 0_2_00218958
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00347141 push ebp; iretd 2_2_00347142
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00356A60 push esp; retf 2_2_00356AA8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00356A63 push esp; retf 2_2_00356AA8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0035AAF1 push ecx; ret 2_2_0035AB05
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0035AAF3 push ecx; ret 2_2_0035AB05
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0034545C push es; iretd 2_2_0034545D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00358496 push ebx; ret 2_2_00358497
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003434F0 push eax; ret 2_2_003434F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00351CCD push ebp; retf 2_2_00351D06
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00357613 push edi; ret 2_2_00357614
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0034AF06 push edi; iretd 2_2_0034AF0D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0034D7C8 push ds; iretd 2_2_0034D81E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F0225F pushad ; ret 2_2_02F027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F027FA pushad ; ret 2_2_02F027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F0283D push eax; iretd 2_2_02F02858
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F309AD push ecx; mov dword ptr [esp], ecx2_2_02F309B6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F01368 push eax; iretd 2_2_02F01369
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeCode function: 3_2_06AB4E30 push ebp; iretd 3_2_06AB4E31
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeCode function: 3_2_06AC87E0 push ecx; ret 3_2_06AC87F4
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeCode function: 3_2_06AC87E2 push ecx; ret 3_2_06AC87F4
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeCode function: 3_2_06AB7F17 push eax; ret 3_2_06AB7F18
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeCode function: 3_2_06AC4760 push esp; retf 3_2_06AC4797
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeCode function: 3_2_06AB656E push edi; retf 3_2_06AB656F
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeCode function: 3_2_06AC3D5E push cs; iretd 3_2_06AC3D68
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeCode function: 3_2_06AB8BF5 push edi; iretd 3_2_06AB8BFC
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeCode function: 3_2_06AC5302 push edi; ret 3_2_06AC5303
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeCode function: 3_2_06ABF9BC push ebp; retf 3_2_06ABF9F5
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeCode function: 3_2_06AB314B push es; iretd 3_2_06AB314C
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_031609AD push ecx; mov dword ptr [esp], ecx4_2_031609B6
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_001F48D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_001F48D7
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_00275376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00275376
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_00213187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00213187
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeAPI/Special instruction interceptor: Address: C13214
                Source: C:\Windows\SysWOW64\mfpmp.exeAPI/Special instruction interceptor: Address: 7FF9B762D324
                Source: C:\Windows\SysWOW64\mfpmp.exeAPI/Special instruction interceptor: Address: 7FF9B762D7E4
                Source: C:\Windows\SysWOW64\mfpmp.exeAPI/Special instruction interceptor: Address: 7FF9B762D944
                Source: C:\Windows\SysWOW64\mfpmp.exeAPI/Special instruction interceptor: Address: 7FF9B762D504
                Source: C:\Windows\SysWOW64\mfpmp.exeAPI/Special instruction interceptor: Address: 7FF9B762D544
                Source: C:\Windows\SysWOW64\mfpmp.exeAPI/Special instruction interceptor: Address: 7FF9B762D1E4
                Source: C:\Windows\SysWOW64\mfpmp.exeAPI/Special instruction interceptor: Address: 7FF9B7630154
                Source: C:\Windows\SysWOW64\mfpmp.exeAPI/Special instruction interceptor: Address: 7FF9B762DA44
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F7096E rdtsc 2_2_02F7096E
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0081FAD1 sldt word ptr [eax]4_2_0081FAD1
                Source: C:\Windows\SysWOW64\mfpmp.exeWindow / User API: threadDelayed 1401Jump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeWindow / User API: threadDelayed 8572Jump to behavior
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeAPI coverage: 4.8 %
                Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.6 %
                Source: C:\Windows\SysWOW64\mfpmp.exeAPI coverage: 2.7 %
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exe TID: 6696Thread sleep time: -80000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exe TID: 6696Thread sleep count: 42 > 30Jump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exe TID: 6696Thread sleep time: -63000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exe TID: 6696Thread sleep count: 44 > 30Jump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exe TID: 6696Thread sleep time: -44000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exe TID: 6616Thread sleep count: 1401 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exe TID: 6616Thread sleep time: -2802000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exe TID: 6616Thread sleep count: 8572 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exe TID: 6616Thread sleep time: -17144000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\mfpmp.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0025445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0025445A
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0025C6D1 FindFirstFileW,FindClose,0_2_0025C6D1
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0025C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0025C75C
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0025EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0025EF95
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0025F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0025F0F2
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0025F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0025F3F3
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_002537EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_002537EF
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_00253B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00253B12
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0025BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0025BCBC
                Source: C:\Windows\SysWOW64\mfpmp.exeCode function: 4_2_0081C880 FindFirstFileW,FindNextFileW,FindClose,4_2_0081C880
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_001F49A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001F49A0
                Source: -3E4-49P9m.4.drBinary or memory string: ms.portal.azure.comVMware20,11696494690
                Source: -3E4-49P9m.4.drBinary or memory string: discord.comVMware20,11696494690f
                Source: -3E4-49P9m.4.drBinary or memory string: AMC password management pageVMware20,11696494690
                Source: -3E4-49P9m.4.drBinary or memory string: outlook.office.comVMware20,11696494690s
                Source: -3E4-49P9m.4.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p
                Source: -3E4-49P9m.4.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690
                Source: -3E4-49P9m.4.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696494690n
                Source: -3E4-49P9m.4.drBinary or memory string: interactivebrokers.comVMware20,11696494690
                Source: -3E4-49P9m.4.drBinary or memory string: netportal.hdfcbank.comVMware20,11696494690
                Source: -3E4-49P9m.4.drBinary or memory string: interactivebrokers.co.inVMware20,11696494690d
                Source: -3E4-49P9m.4.drBinary or memory string: account.microsoft.com/profileVMware20,11696494690u
                Source: -3E4-49P9m.4.drBinary or memory string: outlook.office365.comVMware20,11696494690t
                Source: -3E4-49P9m.4.drBinary or memory string: www.interactivebrokers.comVMware20,11696494690}
                Source: -3E4-49P9m.4.drBinary or memory string: microsoft.visualstudio.comVMware20,11696494690x
                Source: -3E4-49P9m.4.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690^
                Source: -3E4-49P9m.4.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696494690
                Source: mfpmp.exe, 00000004.00000002.3381523317.00000000008F9000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000007.00000002.1368482946.000001E0BB0AC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: -3E4-49P9m.4.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z
                Source: -3E4-49P9m.4.drBinary or memory string: trackpan.utiitsl.comVMware20,11696494690h
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3382676291.00000000005B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll6
                Source: -3E4-49P9m.4.drBinary or memory string: tasks.office.comVMware20,11696494690o
                Source: -3E4-49P9m.4.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696494690~
                Source: -3E4-49P9m.4.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696494690
                Source: -3E4-49P9m.4.drBinary or memory string: dev.azure.comVMware20,11696494690j
                Source: -3E4-49P9m.4.drBinary or memory string: global block list test formVMware20,11696494690
                Source: -3E4-49P9m.4.drBinary or memory string: turbotax.intuit.comVMware20,11696494690t
                Source: -3E4-49P9m.4.drBinary or memory string: bankofamerica.comVMware20,11696494690x
                Source: -3E4-49P9m.4.drBinary or memory string: Canara Transaction PasswordVMware20,11696494690}
                Source: -3E4-49P9m.4.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690
                Source: -3E4-49P9m.4.drBinary or memory string: Interactive Brokers - HKVMware20,11696494690]
                Source: -3E4-49P9m.4.drBinary or memory string: Canara Transaction PasswordVMware20,11696494690x
                Source: -3E4-49P9m.4.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690
                Source: -3E4-49P9m.4.drBinary or memory string: secure.bankofamerica.comVMware20,11696494690|UE
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeAPI call chain: ExitProcess graph end node
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeAPI call chain: ExitProcess graph end node
                Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F7096E rdtsc 2_2_02F7096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00357CB3 LdrLoadDll,2_2_00357CB3
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_00263F09 BlockInput,0_2_00263F09
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_001F3B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_001F3B3A
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_00225A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00225A7C
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_001F4B37 LoadLibraryA,GetProcAddress,0_2_001F4B37
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_00C134E0 mov eax, dword ptr fs:[00000030h]0_2_00C134E0
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_00C13480 mov eax, dword ptr fs:[00000030h]0_2_00C13480
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_00C11E70 mov eax, dword ptr fs:[00000030h]0_2_00C11E70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F402E1 mov eax, dword ptr fs:[00000030h]2_2_02F402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F402E1 mov eax, dword ptr fs:[00000030h]2_2_02F402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F402E1 mov eax, dword ptr fs:[00000030h]2_2_02F402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03008324 mov eax, dword ptr fs:[00000030h]2_2_03008324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03008324 mov ecx, dword ptr fs:[00000030h]2_2_03008324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03008324 mov eax, dword ptr fs:[00000030h]2_2_03008324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03008324 mov eax, dword ptr fs:[00000030h]2_2_03008324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A2C3 mov eax, dword ptr fs:[00000030h]2_2_02F3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A2C3 mov eax, dword ptr fs:[00000030h]2_2_02F3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A2C3 mov eax, dword ptr fs:[00000030h]2_2_02F3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A2C3 mov eax, dword ptr fs:[00000030h]2_2_02F3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A2C3 mov eax, dword ptr fs:[00000030h]2_2_02F3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0300634F mov eax, dword ptr fs:[00000030h]2_2_0300634F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F402A0 mov eax, dword ptr fs:[00000030h]2_2_02F402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F402A0 mov eax, dword ptr fs:[00000030h]2_2_02F402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC62A0 mov eax, dword ptr fs:[00000030h]2_2_02FC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC62A0 mov ecx, dword ptr fs:[00000030h]2_2_02FC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC62A0 mov eax, dword ptr fs:[00000030h]2_2_02FC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC62A0 mov eax, dword ptr fs:[00000030h]2_2_02FC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC62A0 mov eax, dword ptr fs:[00000030h]2_2_02FC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC62A0 mov eax, dword ptr fs:[00000030h]2_2_02FC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E284 mov eax, dword ptr fs:[00000030h]2_2_02F6E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E284 mov eax, dword ptr fs:[00000030h]2_2_02F6E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB0283 mov eax, dword ptr fs:[00000030h]2_2_02FB0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB0283 mov eax, dword ptr fs:[00000030h]2_2_02FB0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB0283 mov eax, dword ptr fs:[00000030h]2_2_02FB0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F34260 mov eax, dword ptr fs:[00000030h]2_2_02F34260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F34260 mov eax, dword ptr fs:[00000030h]2_2_02F34260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F34260 mov eax, dword ptr fs:[00000030h]2_2_02F34260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2826B mov eax, dword ptr fs:[00000030h]2_2_02F2826B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2A250 mov eax, dword ptr fs:[00000030h]2_2_02F2A250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36259 mov eax, dword ptr fs:[00000030h]2_2_02F36259
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEA250 mov eax, dword ptr fs:[00000030h]2_2_02FEA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEA250 mov eax, dword ptr fs:[00000030h]2_2_02FEA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB8243 mov eax, dword ptr fs:[00000030h]2_2_02FB8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB8243 mov ecx, dword ptr fs:[00000030h]2_2_02FB8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2823B mov eax, dword ptr fs:[00000030h]2_2_02F2823B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E3F0 mov eax, dword ptr fs:[00000030h]2_2_02F4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E3F0 mov eax, dword ptr fs:[00000030h]2_2_02F4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E3F0 mov eax, dword ptr fs:[00000030h]2_2_02F4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F663FF mov eax, dword ptr fs:[00000030h]2_2_02F663FF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE3DB mov eax, dword ptr fs:[00000030h]2_2_02FDE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE3DB mov eax, dword ptr fs:[00000030h]2_2_02FDE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE3DB mov ecx, dword ptr fs:[00000030h]2_2_02FDE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE3DB mov eax, dword ptr fs:[00000030h]2_2_02FDE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD43D4 mov eax, dword ptr fs:[00000030h]2_2_02FD43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD43D4 mov eax, dword ptr fs:[00000030h]2_2_02FD43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEC3CD mov eax, dword ptr fs:[00000030h]2_2_02FEC3CD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]2_2_02F3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]2_2_02F3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]2_2_02F3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]2_2_02F3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]2_2_02F3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]2_2_02F3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F383C0 mov eax, dword ptr fs:[00000030h]2_2_02F383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F383C0 mov eax, dword ptr fs:[00000030h]2_2_02F383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F383C0 mov eax, dword ptr fs:[00000030h]2_2_02F383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F383C0 mov eax, dword ptr fs:[00000030h]2_2_02F383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB63C0 mov eax, dword ptr fs:[00000030h]2_2_02FB63C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0300625D mov eax, dword ptr fs:[00000030h]2_2_0300625D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F28397 mov eax, dword ptr fs:[00000030h]2_2_02F28397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F28397 mov eax, dword ptr fs:[00000030h]2_2_02F28397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F28397 mov eax, dword ptr fs:[00000030h]2_2_02F28397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2E388 mov eax, dword ptr fs:[00000030h]2_2_02F2E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2E388 mov eax, dword ptr fs:[00000030h]2_2_02F2E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2E388 mov eax, dword ptr fs:[00000030h]2_2_02F2E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5438F mov eax, dword ptr fs:[00000030h]2_2_02F5438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5438F mov eax, dword ptr fs:[00000030h]2_2_02F5438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD437C mov eax, dword ptr fs:[00000030h]2_2_02FD437C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB035C mov eax, dword ptr fs:[00000030h]2_2_02FB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB035C mov eax, dword ptr fs:[00000030h]2_2_02FB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB035C mov eax, dword ptr fs:[00000030h]2_2_02FB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB035C mov ecx, dword ptr fs:[00000030h]2_2_02FB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB035C mov eax, dword ptr fs:[00000030h]2_2_02FB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB035C mov eax, dword ptr fs:[00000030h]2_2_02FB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFA352 mov eax, dword ptr fs:[00000030h]2_2_02FFA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD8350 mov ecx, dword ptr fs:[00000030h]2_2_02FD8350
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030062D6 mov eax, dword ptr fs:[00000030h]2_2_030062D6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2C310 mov ecx, dword ptr fs:[00000030h]2_2_02F2C310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F50310 mov ecx, dword ptr fs:[00000030h]2_2_02F50310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A30B mov eax, dword ptr fs:[00000030h]2_2_02F6A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A30B mov eax, dword ptr fs:[00000030h]2_2_02F6A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A30B mov eax, dword ptr fs:[00000030h]2_2_02F6A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2C0F0 mov eax, dword ptr fs:[00000030h]2_2_02F2C0F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F720F0 mov ecx, dword ptr fs:[00000030h]2_2_02F720F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2A0E3 mov ecx, dword ptr fs:[00000030h]2_2_02F2A0E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F380E9 mov eax, dword ptr fs:[00000030h]2_2_02F380E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB60E0 mov eax, dword ptr fs:[00000030h]2_2_02FB60E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB20DE mov eax, dword ptr fs:[00000030h]2_2_02FB20DE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF60B8 mov eax, dword ptr fs:[00000030h]2_2_02FF60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF60B8 mov ecx, dword ptr fs:[00000030h]2_2_02FF60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F280A0 mov eax, dword ptr fs:[00000030h]2_2_02F280A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC80A8 mov eax, dword ptr fs:[00000030h]2_2_02FC80A8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004164 mov eax, dword ptr fs:[00000030h]2_2_03004164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004164 mov eax, dword ptr fs:[00000030h]2_2_03004164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3208A mov eax, dword ptr fs:[00000030h]2_2_02F3208A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5C073 mov eax, dword ptr fs:[00000030h]2_2_02F5C073
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F32050 mov eax, dword ptr fs:[00000030h]2_2_02F32050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6050 mov eax, dword ptr fs:[00000030h]2_2_02FB6050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC6030 mov eax, dword ptr fs:[00000030h]2_2_02FC6030
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2A020 mov eax, dword ptr fs:[00000030h]2_2_02F2A020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2C020 mov eax, dword ptr fs:[00000030h]2_2_02F2C020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E016 mov eax, dword ptr fs:[00000030h]2_2_02F4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E016 mov eax, dword ptr fs:[00000030h]2_2_02F4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E016 mov eax, dword ptr fs:[00000030h]2_2_02F4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E016 mov eax, dword ptr fs:[00000030h]2_2_02F4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030061E5 mov eax, dword ptr fs:[00000030h]2_2_030061E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB4000 mov ecx, dword ptr fs:[00000030h]2_2_02FB4000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F601F8 mov eax, dword ptr fs:[00000030h]2_2_02F601F8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE1D0 mov eax, dword ptr fs:[00000030h]2_2_02FAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE1D0 mov eax, dword ptr fs:[00000030h]2_2_02FAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE1D0 mov ecx, dword ptr fs:[00000030h]2_2_02FAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE1D0 mov eax, dword ptr fs:[00000030h]2_2_02FAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE1D0 mov eax, dword ptr fs:[00000030h]2_2_02FAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF61C3 mov eax, dword ptr fs:[00000030h]2_2_02FF61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF61C3 mov eax, dword ptr fs:[00000030h]2_2_02FF61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB019F mov eax, dword ptr fs:[00000030h]2_2_02FB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB019F mov eax, dword ptr fs:[00000030h]2_2_02FB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB019F mov eax, dword ptr fs:[00000030h]2_2_02FB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB019F mov eax, dword ptr fs:[00000030h]2_2_02FB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2A197 mov eax, dword ptr fs:[00000030h]2_2_02F2A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2A197 mov eax, dword ptr fs:[00000030h]2_2_02F2A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2A197 mov eax, dword ptr fs:[00000030h]2_2_02F2A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F70185 mov eax, dword ptr fs:[00000030h]2_2_02F70185
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEC188 mov eax, dword ptr fs:[00000030h]2_2_02FEC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEC188 mov eax, dword ptr fs:[00000030h]2_2_02FEC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD4180 mov eax, dword ptr fs:[00000030h]2_2_02FD4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD4180 mov eax, dword ptr fs:[00000030h]2_2_02FD4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2C156 mov eax, dword ptr fs:[00000030h]2_2_02F2C156
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC8158 mov eax, dword ptr fs:[00000030h]2_2_02FC8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36154 mov eax, dword ptr fs:[00000030h]2_2_02F36154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36154 mov eax, dword ptr fs:[00000030h]2_2_02F36154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC4144 mov eax, dword ptr fs:[00000030h]2_2_02FC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC4144 mov eax, dword ptr fs:[00000030h]2_2_02FC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC4144 mov ecx, dword ptr fs:[00000030h]2_2_02FC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC4144 mov eax, dword ptr fs:[00000030h]2_2_02FC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC4144 mov eax, dword ptr fs:[00000030h]2_2_02FC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F60124 mov eax, dword ptr fs:[00000030h]2_2_02F60124
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDA118 mov ecx, dword ptr fs:[00000030h]2_2_02FDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDA118 mov eax, dword ptr fs:[00000030h]2_2_02FDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDA118 mov eax, dword ptr fs:[00000030h]2_2_02FDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDA118 mov eax, dword ptr fs:[00000030h]2_2_02FDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF0115 mov eax, dword ptr fs:[00000030h]2_2_02FF0115
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE10E mov eax, dword ptr fs:[00000030h]2_2_02FDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE10E mov ecx, dword ptr fs:[00000030h]2_2_02FDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE10E mov eax, dword ptr fs:[00000030h]2_2_02FDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE10E mov eax, dword ptr fs:[00000030h]2_2_02FDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE10E mov ecx, dword ptr fs:[00000030h]2_2_02FDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE10E mov eax, dword ptr fs:[00000030h]2_2_02FDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE10E mov eax, dword ptr fs:[00000030h]2_2_02FDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE10E mov ecx, dword ptr fs:[00000030h]2_2_02FDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE10E mov eax, dword ptr fs:[00000030h]2_2_02FDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE10E mov ecx, dword ptr fs:[00000030h]2_2_02FDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE6F2 mov eax, dword ptr fs:[00000030h]2_2_02FAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE6F2 mov eax, dword ptr fs:[00000030h]2_2_02FAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE6F2 mov eax, dword ptr fs:[00000030h]2_2_02FAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE6F2 mov eax, dword ptr fs:[00000030h]2_2_02FAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB06F1 mov eax, dword ptr fs:[00000030h]2_2_02FB06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB06F1 mov eax, dword ptr fs:[00000030h]2_2_02FB06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A6C7 mov ebx, dword ptr fs:[00000030h]2_2_02F6A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A6C7 mov eax, dword ptr fs:[00000030h]2_2_02F6A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F666B0 mov eax, dword ptr fs:[00000030h]2_2_02F666B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C6A6 mov eax, dword ptr fs:[00000030h]2_2_02F6C6A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F34690 mov eax, dword ptr fs:[00000030h]2_2_02F34690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F34690 mov eax, dword ptr fs:[00000030h]2_2_02F34690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F62674 mov eax, dword ptr fs:[00000030h]2_2_02F62674
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF866E mov eax, dword ptr fs:[00000030h]2_2_02FF866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF866E mov eax, dword ptr fs:[00000030h]2_2_02FF866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A660 mov eax, dword ptr fs:[00000030h]2_2_02F6A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A660 mov eax, dword ptr fs:[00000030h]2_2_02F6A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4C640 mov eax, dword ptr fs:[00000030h]2_2_02F4C640
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E627 mov eax, dword ptr fs:[00000030h]2_2_02F4E627
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F66620 mov eax, dword ptr fs:[00000030h]2_2_02F66620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F68620 mov eax, dword ptr fs:[00000030h]2_2_02F68620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3262C mov eax, dword ptr fs:[00000030h]2_2_02F3262C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72619 mov eax, dword ptr fs:[00000030h]2_2_02F72619
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE609 mov eax, dword ptr fs:[00000030h]2_2_02FAE609
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4260B mov eax, dword ptr fs:[00000030h]2_2_02F4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4260B mov eax, dword ptr fs:[00000030h]2_2_02F4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4260B mov eax, dword ptr fs:[00000030h]2_2_02F4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4260B mov eax, dword ptr fs:[00000030h]2_2_02F4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4260B mov eax, dword ptr fs:[00000030h]2_2_02F4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4260B mov eax, dword ptr fs:[00000030h]2_2_02F4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4260B mov eax, dword ptr fs:[00000030h]2_2_02F4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F347FB mov eax, dword ptr fs:[00000030h]2_2_02F347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F347FB mov eax, dword ptr fs:[00000030h]2_2_02F347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F527ED mov eax, dword ptr fs:[00000030h]2_2_02F527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F527ED mov eax, dword ptr fs:[00000030h]2_2_02F527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F527ED mov eax, dword ptr fs:[00000030h]2_2_02F527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBE7E1 mov eax, dword ptr fs:[00000030h]2_2_02FBE7E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3C7C0 mov eax, dword ptr fs:[00000030h]2_2_02F3C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB07C3 mov eax, dword ptr fs:[00000030h]2_2_02FB07C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F307AF mov eax, dword ptr fs:[00000030h]2_2_02F307AF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE47A0 mov eax, dword ptr fs:[00000030h]2_2_02FE47A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD678E mov eax, dword ptr fs:[00000030h]2_2_02FD678E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38770 mov eax, dword ptr fs:[00000030h]2_2_02F38770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30750 mov eax, dword ptr fs:[00000030h]2_2_02F30750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBE75D mov eax, dword ptr fs:[00000030h]2_2_02FBE75D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72750 mov eax, dword ptr fs:[00000030h]2_2_02F72750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72750 mov eax, dword ptr fs:[00000030h]2_2_02F72750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB4755 mov eax, dword ptr fs:[00000030h]2_2_02FB4755
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6674D mov esi, dword ptr fs:[00000030h]2_2_02F6674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6674D mov eax, dword ptr fs:[00000030h]2_2_02F6674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6674D mov eax, dword ptr fs:[00000030h]2_2_02F6674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6273C mov eax, dword ptr fs:[00000030h]2_2_02F6273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6273C mov ecx, dword ptr fs:[00000030h]2_2_02F6273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6273C mov eax, dword ptr fs:[00000030h]2_2_02F6273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAC730 mov eax, dword ptr fs:[00000030h]2_2_02FAC730
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C720 mov eax, dword ptr fs:[00000030h]2_2_02F6C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C720 mov eax, dword ptr fs:[00000030h]2_2_02F6C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30710 mov eax, dword ptr fs:[00000030h]2_2_02F30710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F60710 mov eax, dword ptr fs:[00000030h]2_2_02F60710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C700 mov eax, dword ptr fs:[00000030h]2_2_02F6C700
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004500 mov eax, dword ptr fs:[00000030h]2_2_03004500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004500 mov eax, dword ptr fs:[00000030h]2_2_03004500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004500 mov eax, dword ptr fs:[00000030h]2_2_03004500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004500 mov eax, dword ptr fs:[00000030h]2_2_03004500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004500 mov eax, dword ptr fs:[00000030h]2_2_03004500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004500 mov eax, dword ptr fs:[00000030h]2_2_03004500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004500 mov eax, dword ptr fs:[00000030h]2_2_03004500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F304E5 mov ecx, dword ptr fs:[00000030h]2_2_02F304E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F644B0 mov ecx, dword ptr fs:[00000030h]2_2_02F644B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBA4B0 mov eax, dword ptr fs:[00000030h]2_2_02FBA4B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F364AB mov eax, dword ptr fs:[00000030h]2_2_02F364AB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEA49A mov eax, dword ptr fs:[00000030h]2_2_02FEA49A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5A470 mov eax, dword ptr fs:[00000030h]2_2_02F5A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5A470 mov eax, dword ptr fs:[00000030h]2_2_02F5A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5A470 mov eax, dword ptr fs:[00000030h]2_2_02F5A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBC460 mov ecx, dword ptr fs:[00000030h]2_2_02FBC460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEA456 mov eax, dword ptr fs:[00000030h]2_2_02FEA456
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2645D mov eax, dword ptr fs:[00000030h]2_2_02F2645D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5245A mov eax, dword ptr fs:[00000030h]2_2_02F5245A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A430 mov eax, dword ptr fs:[00000030h]2_2_02F6A430
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2E420 mov eax, dword ptr fs:[00000030h]2_2_02F2E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2E420 mov eax, dword ptr fs:[00000030h]2_2_02F2E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2E420 mov eax, dword ptr fs:[00000030h]2_2_02F2E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2C427 mov eax, dword ptr fs:[00000030h]2_2_02F2C427
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6420 mov eax, dword ptr fs:[00000030h]2_2_02FB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6420 mov eax, dword ptr fs:[00000030h]2_2_02FB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6420 mov eax, dword ptr fs:[00000030h]2_2_02FB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6420 mov eax, dword ptr fs:[00000030h]2_2_02FB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6420 mov eax, dword ptr fs:[00000030h]2_2_02FB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6420 mov eax, dword ptr fs:[00000030h]2_2_02FB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6420 mov eax, dword ptr fs:[00000030h]2_2_02FB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F68402 mov eax, dword ptr fs:[00000030h]2_2_02F68402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F68402 mov eax, dword ptr fs:[00000030h]2_2_02F68402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F68402 mov eax, dword ptr fs:[00000030h]2_2_02F68402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F325E0 mov eax, dword ptr fs:[00000030h]2_2_02F325E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C5ED mov eax, dword ptr fs:[00000030h]2_2_02F6C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C5ED mov eax, dword ptr fs:[00000030h]2_2_02F6C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F365D0 mov eax, dword ptr fs:[00000030h]2_2_02F365D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A5D0 mov eax, dword ptr fs:[00000030h]2_2_02F6A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A5D0 mov eax, dword ptr fs:[00000030h]2_2_02F6A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E5CF mov eax, dword ptr fs:[00000030h]2_2_02F6E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E5CF mov eax, dword ptr fs:[00000030h]2_2_02F6E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F545B1 mov eax, dword ptr fs:[00000030h]2_2_02F545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F545B1 mov eax, dword ptr fs:[00000030h]2_2_02F545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB05A7 mov eax, dword ptr fs:[00000030h]2_2_02FB05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB05A7 mov eax, dword ptr fs:[00000030h]2_2_02FB05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB05A7 mov eax, dword ptr fs:[00000030h]2_2_02FB05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E59C mov eax, dword ptr fs:[00000030h]2_2_02F6E59C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F32582 mov eax, dword ptr fs:[00000030h]2_2_02F32582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F32582 mov ecx, dword ptr fs:[00000030h]2_2_02F32582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F64588 mov eax, dword ptr fs:[00000030h]2_2_02F64588
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6656A mov eax, dword ptr fs:[00000030h]2_2_02F6656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6656A mov eax, dword ptr fs:[00000030h]2_2_02F6656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6656A mov eax, dword ptr fs:[00000030h]2_2_02F6656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38550 mov eax, dword ptr fs:[00000030h]2_2_02F38550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38550 mov eax, dword ptr fs:[00000030h]2_2_02F38550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40535 mov eax, dword ptr fs:[00000030h]2_2_02F40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40535 mov eax, dword ptr fs:[00000030h]2_2_02F40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40535 mov eax, dword ptr fs:[00000030h]2_2_02F40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40535 mov eax, dword ptr fs:[00000030h]2_2_02F40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40535 mov eax, dword ptr fs:[00000030h]2_2_02F40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40535 mov eax, dword ptr fs:[00000030h]2_2_02F40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E53E mov eax, dword ptr fs:[00000030h]2_2_02F5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E53E mov eax, dword ptr fs:[00000030h]2_2_02F5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E53E mov eax, dword ptr fs:[00000030h]2_2_02F5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E53E mov eax, dword ptr fs:[00000030h]2_2_02F5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E53E mov eax, dword ptr fs:[00000030h]2_2_02F5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC6500 mov eax, dword ptr fs:[00000030h]2_2_02FC6500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004B00 mov eax, dword ptr fs:[00000030h]2_2_03004B00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6AAEE mov eax, dword ptr fs:[00000030h]2_2_02F6AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6AAEE mov eax, dword ptr fs:[00000030h]2_2_02F6AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30AD0 mov eax, dword ptr fs:[00000030h]2_2_02F30AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F64AD0 mov eax, dword ptr fs:[00000030h]2_2_02F64AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F64AD0 mov eax, dword ptr fs:[00000030h]2_2_02F64AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F86ACC mov eax, dword ptr fs:[00000030h]2_2_02F86ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F86ACC mov eax, dword ptr fs:[00000030h]2_2_02F86ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F86ACC mov eax, dword ptr fs:[00000030h]2_2_02F86ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38AA0 mov eax, dword ptr fs:[00000030h]2_2_02F38AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38AA0 mov eax, dword ptr fs:[00000030h]2_2_02F38AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03002B57 mov eax, dword ptr fs:[00000030h]2_2_03002B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03002B57 mov eax, dword ptr fs:[00000030h]2_2_03002B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03002B57 mov eax, dword ptr fs:[00000030h]2_2_03002B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03002B57 mov eax, dword ptr fs:[00000030h]2_2_03002B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F86AA4 mov eax, dword ptr fs:[00000030h]2_2_02F86AA4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F68A90 mov edx, dword ptr fs:[00000030h]2_2_02F68A90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FACA72 mov eax, dword ptr fs:[00000030h]2_2_02FACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FACA72 mov eax, dword ptr fs:[00000030h]2_2_02FACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6CA6F mov eax, dword ptr fs:[00000030h]2_2_02F6CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6CA6F mov eax, dword ptr fs:[00000030h]2_2_02F6CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6CA6F mov eax, dword ptr fs:[00000030h]2_2_02F6CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDEA60 mov eax, dword ptr fs:[00000030h]2_2_02FDEA60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36A50 mov eax, dword ptr fs:[00000030h]2_2_02F36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36A50 mov eax, dword ptr fs:[00000030h]2_2_02F36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36A50 mov eax, dword ptr fs:[00000030h]2_2_02F36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36A50 mov eax, dword ptr fs:[00000030h]2_2_02F36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36A50 mov eax, dword ptr fs:[00000030h]2_2_02F36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36A50 mov eax, dword ptr fs:[00000030h]2_2_02F36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36A50 mov eax, dword ptr fs:[00000030h]2_2_02F36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40A5B mov eax, dword ptr fs:[00000030h]2_2_02F40A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40A5B mov eax, dword ptr fs:[00000030h]2_2_02F40A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F54A35 mov eax, dword ptr fs:[00000030h]2_2_02F54A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F54A35 mov eax, dword ptr fs:[00000030h]2_2_02F54A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6CA38 mov eax, dword ptr fs:[00000030h]2_2_02F6CA38
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6CA24 mov eax, dword ptr fs:[00000030h]2_2_02F6CA24
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5EA2E mov eax, dword ptr fs:[00000030h]2_2_02F5EA2E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBCA11 mov eax, dword ptr fs:[00000030h]2_2_02FBCA11
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38BF0 mov eax, dword ptr fs:[00000030h]2_2_02F38BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38BF0 mov eax, dword ptr fs:[00000030h]2_2_02F38BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38BF0 mov eax, dword ptr fs:[00000030h]2_2_02F38BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5EBFC mov eax, dword ptr fs:[00000030h]2_2_02F5EBFC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBCBF0 mov eax, dword ptr fs:[00000030h]2_2_02FBCBF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDEBD0 mov eax, dword ptr fs:[00000030h]2_2_02FDEBD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F50BCB mov eax, dword ptr fs:[00000030h]2_2_02F50BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F50BCB mov eax, dword ptr fs:[00000030h]2_2_02F50BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F50BCB mov eax, dword ptr fs:[00000030h]2_2_02F50BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30BCD mov eax, dword ptr fs:[00000030h]2_2_02F30BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30BCD mov eax, dword ptr fs:[00000030h]2_2_02F30BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30BCD mov eax, dword ptr fs:[00000030h]2_2_02F30BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40BBE mov eax, dword ptr fs:[00000030h]2_2_02F40BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40BBE mov eax, dword ptr fs:[00000030h]2_2_02F40BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE4BB0 mov eax, dword ptr fs:[00000030h]2_2_02FE4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE4BB0 mov eax, dword ptr fs:[00000030h]2_2_02FE4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004A80 mov eax, dword ptr fs:[00000030h]2_2_03004A80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2CB7E mov eax, dword ptr fs:[00000030h]2_2_02F2CB7E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F28B50 mov eax, dword ptr fs:[00000030h]2_2_02F28B50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDEB50 mov eax, dword ptr fs:[00000030h]2_2_02FDEB50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE4B4B mov eax, dword ptr fs:[00000030h]2_2_02FE4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE4B4B mov eax, dword ptr fs:[00000030h]2_2_02FE4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC6B40 mov eax, dword ptr fs:[00000030h]2_2_02FC6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC6B40 mov eax, dword ptr fs:[00000030h]2_2_02FC6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFAB40 mov eax, dword ptr fs:[00000030h]2_2_02FFAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD8B42 mov eax, dword ptr fs:[00000030h]2_2_02FD8B42
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5EB20 mov eax, dword ptr fs:[00000030h]2_2_02F5EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5EB20 mov eax, dword ptr fs:[00000030h]2_2_02F5EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF8B28 mov eax, dword ptr fs:[00000030h]2_2_02FF8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF8B28 mov eax, dword ptr fs:[00000030h]2_2_02FF8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C8F9 mov eax, dword ptr fs:[00000030h]2_2_02F6C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C8F9 mov eax, dword ptr fs:[00000030h]2_2_02F6C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFA8E4 mov eax, dword ptr fs:[00000030h]2_2_02FFA8E4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E8C0 mov eax, dword ptr fs:[00000030h]2_2_02F5E8C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004940 mov eax, dword ptr fs:[00000030h]2_2_03004940
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBC89D mov eax, dword ptr fs:[00000030h]2_2_02FBC89D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30887 mov eax, dword ptr fs:[00000030h]2_2_02F30887
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBE872 mov eax, dword ptr fs:[00000030h]2_2_02FBE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBE872 mov eax, dword ptr fs:[00000030h]2_2_02FBE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC6870 mov eax, dword ptr fs:[00000030h]2_2_02FC6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC6870 mov eax, dword ptr fs:[00000030h]2_2_02FC6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F60854 mov eax, dword ptr fs:[00000030h]2_2_02F60854
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F34859 mov eax, dword ptr fs:[00000030h]2_2_02F34859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F34859 mov eax, dword ptr fs:[00000030h]2_2_02F34859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F42840 mov ecx, dword ptr fs:[00000030h]2_2_02F42840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F52835 mov eax, dword ptr fs:[00000030h]2_2_02F52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F52835 mov eax, dword ptr fs:[00000030h]2_2_02F52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F52835 mov eax, dword ptr fs:[00000030h]2_2_02F52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F52835 mov ecx, dword ptr fs:[00000030h]2_2_02F52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F52835 mov eax, dword ptr fs:[00000030h]2_2_02F52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F52835 mov eax, dword ptr fs:[00000030h]2_2_02F52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A830 mov eax, dword ptr fs:[00000030h]2_2_02F6A830
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD483A mov eax, dword ptr fs:[00000030h]2_2_02FD483A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD483A mov eax, dword ptr fs:[00000030h]2_2_02FD483A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBC810 mov eax, dword ptr fs:[00000030h]2_2_02FBC810
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F629F9 mov eax, dword ptr fs:[00000030h]2_2_02F629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F629F9 mov eax, dword ptr fs:[00000030h]2_2_02F629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBE9E0 mov eax, dword ptr fs:[00000030h]2_2_02FBE9E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]2_2_02F3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]2_2_02F3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]2_2_02F3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]2_2_02F3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]2_2_02F3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]2_2_02F3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F649D0 mov eax, dword ptr fs:[00000030h]2_2_02F649D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFA9D3 mov eax, dword ptr fs:[00000030h]2_2_02FFA9D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC69C0 mov eax, dword ptr fs:[00000030h]2_2_02FC69C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB89B3 mov esi, dword ptr fs:[00000030h]2_2_02FB89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB89B3 mov eax, dword ptr fs:[00000030h]2_2_02FB89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB89B3 mov eax, dword ptr fs:[00000030h]2_2_02FB89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F309AD mov eax, dword ptr fs:[00000030h]2_2_02F309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F309AD mov eax, dword ptr fs:[00000030h]2_2_02F309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD4978 mov eax, dword ptr fs:[00000030h]2_2_02FD4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD4978 mov eax, dword ptr fs:[00000030h]2_2_02FD4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBC97C mov eax, dword ptr fs:[00000030h]2_2_02FBC97C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F56962 mov eax, dword ptr fs:[00000030h]2_2_02F56962
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_002480A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_002480A9
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0021A124 SetUnhandledExceptionFilter,0_2_0021A124
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0021A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0021A155

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtSetInformationThread: Direct from: 0x77D62B4CJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtCreateKey: Direct from: 0x77D62C6CJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtReadVirtualMemory: Direct from: 0x77D62E8CJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtQueryAttributesFile: Direct from: 0x77D62E6CJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtQuerySystemInformation: Direct from: 0x77D648CCJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtQueryVolumeInformationFile: Direct from: 0x77D62F2CJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtAllocateVirtualMemory: Direct from: 0x77D648ECJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtOpenSection: Direct from: 0x77D62E0CJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtDeviceIoControlFile: Direct from: 0x77D62AECJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtQuerySystemInformation: Direct from: 0x77D62DFCJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtReadFile: Direct from: 0x77D62ADCJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtDelayExecution: Direct from: 0x77D62DDCJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtQueryInformationProcess: Direct from: 0x77D62C26Jump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtResumeThread: Direct from: 0x77D62FBCJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtWriteVirtualMemory: Direct from: 0x77D6490CJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtCreateUserProcess: Direct from: 0x77D6371CJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtClose: Direct from: 0x77D62B6C
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtAllocateVirtualMemory: Direct from: 0x77D63C9CJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtSetInformationProcess: Direct from: 0x77D62C5CJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtNotifyChangeKey: Direct from: 0x77D63C2CJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtProtectVirtualMemory: Direct from: 0x77D62F9CJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtSetInformationThread: Direct from: 0x77D563F9Jump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtWriteVirtualMemory: Direct from: 0x77D62E3CJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtCreateMutant: Direct from: 0x77D635CCJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtResumeThread: Direct from: 0x77D636ACJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtMapViewOfSection: Direct from: 0x77D62D1CJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtProtectVirtualMemory: Direct from: 0x77D57B2EJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtAllocateVirtualMemory: Direct from: 0x77D62BFCJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtAllocateVirtualMemory: Direct from: 0x77D62BECJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtQueryInformationToken: Direct from: 0x77D62CACJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtCreateFile: Direct from: 0x77D62FECJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtOpenFile: Direct from: 0x77D62DCCJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtTerminateThread: Direct from: 0x77D62FCCJump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeNtOpenKeyEx: Direct from: 0x77D62B9CJump to behavior
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\mfpmp.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: NULL target: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: NULL target: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeThread register set: target process: 5472Jump to behavior
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 41E008Jump to behavior
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_002487B1 LogonUserW,0_2_002487B1
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_001F3B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_001F3B3A
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_001F48D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_001F48D7
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_00254C27 mouse_event,0_2_00254C27
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\2rvyZc27tz.exe"Jump to behavior
                Source: C:\Program Files (x86)\CONhFffIAOcNWbYmeeuIhaBAnutfYuosdaSkjehMDiFdMEKHaVvYsgEyYWHGxAW\BXT55iI64gw1yrBCtj.exeProcess created: C:\Windows\SysWOW64\mfpmp.exe "C:\Windows\SysWOW64\mfpmp.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_00247CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00247CAF
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0024874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_0024874B
                Source: 2rvyZc27tz.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3383148668.0000000000BF1000.00000002.00000001.00040000.00000000.sdmp, BXT55iI64gw1yrBCtj.exe, 00000003.00000000.989459557.0000000000BF0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
                Source: 2rvyZc27tz.exe, BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3383148668.0000000000BF1000.00000002.00000001.00040000.00000000.sdmp, BXT55iI64gw1yrBCtj.exe, 00000003.00000000.989459557.0000000000BF0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3383148668.0000000000BF1000.00000002.00000001.00040000.00000000.sdmp, BXT55iI64gw1yrBCtj.exe, 00000003.00000000.989459557.0000000000BF0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: BXT55iI64gw1yrBCtj.exe, 00000003.00000002.3383148668.0000000000BF1000.00000002.00000001.00040000.00000000.sdmp, BXT55iI64gw1yrBCtj.exe, 00000003.00000000.989459557.0000000000BF0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_0021862B cpuid 0_2_0021862B
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_00224E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00224E87
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_00231E06 GetUserNameW,0_2_00231E06
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_00223F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00223F3A
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_001F49A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001F49A0

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.340000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.340000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.3388463854.0000000006A80000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1065063450.0000000002E00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3380912632.0000000000800000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1064547465.0000000000340000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3382955858.0000000000C40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3382873447.0000000000BF0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1065598186.0000000003600000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3383591715.0000000002230000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\mfpmp.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\mfpmp.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
                Source: 2rvyZc27tz.exeBinary or memory string: WIN_81
                Source: 2rvyZc27tz.exeBinary or memory string: WIN_XP
                Source: 2rvyZc27tz.exeBinary or memory string: WIN_XPe
                Source: 2rvyZc27tz.exeBinary or memory string: WIN_VISTA
                Source: 2rvyZc27tz.exeBinary or memory string: WIN_7
                Source: 2rvyZc27tz.exeBinary or memory string: WIN_8
                Source: 2rvyZc27tz.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.340000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.340000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.3388463854.0000000006A80000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1065063450.0000000002E00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3380912632.0000000000800000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1064547465.0000000000340000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3382955858.0000000000C40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3382873447.0000000000BF0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1065598186.0000000003600000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3383591715.0000000002230000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_00266283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00266283
                Source: C:\Users\user\Desktop\2rvyZc27tz.exeCode function: 0_2_00266747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00266747
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                2
                Native API
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                4
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault AccountsScheduled Task/Job2
                Valid Accounts
                1
                Abuse Elevation Control Mechanism
                1
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                1
                Abuse Elevation Control Mechanism
                Security Account Manager2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
                Valid Accounts
                3
                Obfuscated Files or Information
                NTDS116
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                4
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
                Access Token Manipulation
                1
                DLL Side-Loading
                LSA Secrets151
                Security Software Discovery
                SSH3
                Clipboard Data
                Fallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts312
                Process Injection
                2
                Valid Accounts
                Cached Domain Credentials3
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items3
                Virtualization/Sandbox Evasion
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                Access Token Manipulation
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt312
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1633523 Sample: 2rvyZc27tz.exe Startdate: 10/03/2025 Architecture: WINDOWS Score: 100 31 www.zkderby.xyz 2->31 33 www.uarsg.xyz 2->33 35 18 other IPs or domains 2->35 39 Suricata IDS alerts for network traffic 2->39 41 Antivirus detection for URL or domain 2->41 43 Antivirus / Scanner detection for submitted sample 2->43 47 4 other signatures 2->47 10 2rvyZc27tz.exe 4 2->10         started        signatures3 45 Performs DNS queries to domains with low reputation 33->45 process4 signatures5 57 Binary is likely a compiled AutoIt script file 10->57 59 Writes to foreign memory regions 10->59 61 Maps a DLL or memory area into another process 10->61 63 Switches to a custom stack to bypass stack traces 10->63 13 svchost.exe 10->13         started        process6 signatures7 65 Maps a DLL or memory area into another process 13->65 16 BXT55iI64gw1yrBCtj.exe 13->16 injected process8 dnsIp9 25 an05-prod-x.cdn-ng.net 43.251.56.161, 59299, 59300, 59301 WSN-TW-NET-ASWorldstarNetworkTW Taiwan; Republic of China (ROC) 16->25 27 www.gnlokn.info 47.83.1.90, 59273, 59274, 59275 VODANETInternationalIP-BackboneofVodafoneDE United States 16->27 29 11 other IPs or domains 16->29 37 Found direct / indirect Syscall (likely to bypass EDR) 16->37 20 mfpmp.exe 13 16->20         started        signatures10 process11 signatures12 49 Tries to steal Mail credentials (via file / registry access) 20->49 51 Tries to harvest and steal browser information (history, passwords, etc) 20->51 53 Modifies the context of a thread in another process (thread injection) 20->53 55 2 other signatures 20->55 23 firefox.exe 20->23         started        process13

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.