Windows Analysis Report
RFQ 3100185 MAHAD.exe

Overview

General Information

Sample name: RFQ 3100185 MAHAD.exe
Analysis ID: 1560112
MD5: 73a3c01e5d5023e800f52569958185ab
SHA1: f2c3103491b9a8e46264d47939bbd4c53cbc149f
SHA256: ce1748d51da0ccc300e4287b95cd7b8e975c30bb482896de396cc47d7097f0c7
Tags: exeuser-TeamDreier
Infos:

Detection

FormBook
Score: 84
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evaded block containing many API calls
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

AV Detection

barindex
Source: RFQ 3100185 MAHAD.exe ReversingLabs: Detection: 65%
Source: Yara match File source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000001.00000002.1936259878.0000000003160000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1935867535.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Submited Sample Integrated Neural Analysis Model: Matched 100.0% probability
Source: RFQ 3100185 MAHAD.exe Joe Sandbox ML: detected
Source: RFQ 3100185 MAHAD.exe Static PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: Binary string: wntdll.pdbUGP source: RFQ 3100185 MAHAD.exe, 00000000.00000003.1748999494.0000000003A20000.00000004.00001000.00020000.00000000.sdmp, RFQ 3100185 MAHAD.exe, 00000000.00000003.1760874803.0000000003C10000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1936299744.000000000349E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1936299744.0000000003300000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1897017776.0000000002F00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1899368792.0000000003100000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: wntdll.pdb source: RFQ 3100185 MAHAD.exe, 00000000.00000003.1748999494.0000000003A20000.00000004.00001000.00020000.00000000.sdmp, RFQ 3100185 MAHAD.exe, 00000000.00000003.1760874803.0000000003C10000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000002.1936299744.000000000349E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1936299744.0000000003300000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1897017776.0000000002F00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1899368792.0000000003100000.00000004.00000020.00020000.00000000.sdmp
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004B6CA9 GetFileAttributesW,FindFirstFileW,FindClose, 0_2_004B6CA9
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004B60DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose, 0_2_004B60DD
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004B63F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose, 0_2_004B63F9
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004BEB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, 0_2_004BEB60
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004BF56F FindFirstFileW,FindClose, 0_2_004BF56F
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004BF5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, 0_2_004BF5FA
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004C1B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 0_2_004C1B2F
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004C1C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 0_2_004C1C8A
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004C1F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, 0_2_004C1F94
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004C4EB5 InternetReadFile,InternetQueryDataAvailable,InternetReadFile, 0_2_004C4EB5
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004C6B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard, 0_2_004C6B0C
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004C6D07 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard, 0_2_004C6D07
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004C6B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard, 0_2_004C6B0C
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004B2B37 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState, 0_2_004B2B37
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004DF7FF DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, 0_2_004DF7FF

E-Banking Fraud

barindex
Source: Yara match File source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000001.00000002.1936259878.0000000003160000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1935867535.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY

System Summary

barindex
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: This is a third-party compiled AutoIt script. 0_2_00473D19
Source: RFQ 3100185 MAHAD.exe String found in binary or memory: This is a third-party compiled AutoIt script.
Source: RFQ 3100185 MAHAD.exe, 00000000.00000002.1761633022.000000000051E000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: This is a third-party compiled AutoIt script. memstr_1ce3d03a-0
Source: RFQ 3100185 MAHAD.exe, 00000000.00000002.1761633022.000000000051E000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: JSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer memstr_af7bac69-b
Source: RFQ 3100185 MAHAD.exe String found in binary or memory: This is a third-party compiled AutoIt script. memstr_e1d5b8cc-6
Source: RFQ 3100185 MAHAD.exe String found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer memstr_1d3515a7-1
Source: initial sample Static PE information: Filename: RFQ 3100185 MAHAD.exe
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0042CA93 NtClose, 1_2_0042CA93
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372B60 NtClose,LdrInitializeThunk, 1_2_03372B60
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372DF0 NtQuerySystemInformation,LdrInitializeThunk, 1_2_03372DF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033735C0 NtCreateMutant,LdrInitializeThunk, 1_2_033735C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03374340 NtSetContextThread, 1_2_03374340
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03374650 NtSuspendThread, 1_2_03374650
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372BA0 NtEnumerateValueKey, 1_2_03372BA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372B80 NtQueryInformationFile, 1_2_03372B80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372BF0 NtAllocateVirtualMemory, 1_2_03372BF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372BE0 NtQueryValueKey, 1_2_03372BE0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372AB0 NtWaitForSingleObject, 1_2_03372AB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372AF0 NtWriteFile, 1_2_03372AF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372AD0 NtReadFile, 1_2_03372AD0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372F30 NtCreateSection, 1_2_03372F30
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372F60 NtCreateProcessEx, 1_2_03372F60
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372FB0 NtResumeThread, 1_2_03372FB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372FA0 NtQuerySection, 1_2_03372FA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372F90 NtProtectVirtualMemory, 1_2_03372F90
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372FE0 NtCreateFile, 1_2_03372FE0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372E30 NtWriteVirtualMemory, 1_2_03372E30
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372EA0 NtAdjustPrivilegesToken, 1_2_03372EA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372E80 NtReadVirtualMemory, 1_2_03372E80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372EE0 NtQueueApcThread, 1_2_03372EE0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372D30 NtUnmapViewOfSection, 1_2_03372D30
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372D10 NtMapViewOfSection, 1_2_03372D10
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372D00 NtSetInformationFile, 1_2_03372D00
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372DB0 NtEnumerateKey, 1_2_03372DB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372DD0 NtDelayExecution, 1_2_03372DD0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372C00 NtQueryInformationProcess, 1_2_03372C00
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372C70 NtFreeVirtualMemory, 1_2_03372C70
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372C60 NtCreateKey, 1_2_03372C60
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372CA0 NtQueryInformationToken, 1_2_03372CA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372CF0 NtOpenProcess, 1_2_03372CF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372CC0 NtQueryVirtualMemory, 1_2_03372CC0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03373010 NtOpenDirectoryObject, 1_2_03373010
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03373090 NtSetValueKey, 1_2_03373090
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033739B0 NtGetContextThread, 1_2_033739B0
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004B6606: CreateFileW,DeviceIoControl,CloseHandle, 0_2_004B6606
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004AACC5 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock, 0_2_004AACC5
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004B79D3 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState, 0_2_004B79D3
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_0049B043 0_2_0049B043
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_00483200 0_2_00483200
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_00483B70 0_2_00483B70
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004A410F 0_2_004A410F
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004902A4 0_2_004902A4
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_0047E3E3 0_2_0047E3E3
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004A038E 0_2_004A038E
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004A467F 0_2_004A467F
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004906D9 0_2_004906D9
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004DAACE 0_2_004DAACE
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004A4BEF 0_2_004A4BEF
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_0049CCC1 0_2_0049CCC1
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_0047AF50 0_2_0047AF50
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_00476F07 0_2_00476F07
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_0048B11F 0_2_0048B11F
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_0049D1B9 0_2_0049D1B9
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004D31BC 0_2_004D31BC
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004A724D 0_2_004A724D
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_0049123A 0_2_0049123A
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004B13CA 0_2_004B13CA
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004793F0 0_2_004793F0
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_0048F563 0_2_0048F563
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004796C0 0_2_004796C0
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004BB6CC 0_2_004BB6CC
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004DF7FF 0_2_004DF7FF
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004777B0 0_2_004777B0
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004A79C9 0_2_004A79C9
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_0048FA57 0_2_0048FA57
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_00479B60 0_2_00479B60
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_00477D19 0_2_00477D19
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_0048FE6F 0_2_0048FE6F
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_00499ED0 0_2_00499ED0
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_00477FA3 0_2_00477FA3
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_01109260 0_2_01109260
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00401ACB 1_2_00401ACB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0042F0B3 1_2_0042F0B3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_004101D3 1_2_004101D3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_004032F0 1_2_004032F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00402A90 1_2_00402A90
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0040E3D3 1_2_0040E3D3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_004103F3 1_2_004103F3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00416B8E 1_2_00416B8E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00416B93 1_2_00416B93
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00401C40 1_2_00401C40
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00401C3A 1_2_00401C3A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0040E51C 1_2_0040E51C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0040E523 1_2_0040E523
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00402E49 1_2_00402E49
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00402E50 1_2_00402E50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00402F19 1_2_00402F19
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00402720 1_2_00402720
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033FA352 1_2_033FA352
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_034003E6 1_2_034003E6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0334E3F0 1_2_0334E3F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033E0274 1_2_033E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033C02C0 1_2_033C02C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033DA118 1_2_033DA118
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03330100 1_2_03330100
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033C8158 1_2_033C8158
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033F41A2 1_2_033F41A2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_034001AA 1_2_034001AA
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033F81CC 1_2_033F81CC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033D2000 1_2_033D2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03340770 1_2_03340770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03364750 1_2_03364750
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333C7C0 1_2_0333C7C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0335C6E0 1_2_0335C6E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03340535 1_2_03340535
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03400591 1_2_03400591
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033E4420 1_2_033E4420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033F2446 1_2_033F2446
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033EE4F6 1_2_033EE4F6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033FAB40 1_2_033FAB40
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033F6BD7 1_2_033F6BD7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333EA80 1_2_0333EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03356962 1_2_03356962
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033429A0 1_2_033429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0340A9A6 1_2_0340A9A6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0334A840 1_2_0334A840
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03342840 1_2_03342840
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033268B8 1_2_033268B8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336E8F0 1_2_0336E8F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03360F30 1_2_03360F30
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033E2F30 1_2_033E2F30
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03382F28 1_2_03382F28
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B4F40 1_2_033B4F40
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033BEFA0 1_2_033BEFA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03332FC8 1_2_03332FC8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033FEE26 1_2_033FEE26
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03340E59 1_2_03340E59
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03352E90 1_2_03352E90
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033FCE93 1_2_033FCE93
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033FEEDB 1_2_033FEEDB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033DCD1F 1_2_033DCD1F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0334AD00 1_2_0334AD00
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03358DBF 1_2_03358DBF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333ADE0 1_2_0333ADE0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03340C00 1_2_03340C00
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033E0CB5 1_2_033E0CB5
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03330CF2 1_2_03330CF2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033F132D 1_2_033F132D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0332D34C 1_2_0332D34C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0338739A 1_2_0338739A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033452A0 1_2_033452A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033E12ED 1_2_033E12ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0335B2C0 1_2_0335B2C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0340B16B 1_2_0340B16B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0332F172 1_2_0332F172
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0337516C 1_2_0337516C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0334B1B0 1_2_0334B1B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033F70E9 1_2_033F70E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033FF0E0 1_2_033FF0E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033EF0CC 1_2_033EF0CC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033470C0 1_2_033470C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033FF7B0 1_2_033FF7B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03385630 1_2_03385630
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033F16CC 1_2_033F16CC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_034095C3 1_2_034095C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033DD5B0 1_2_033DD5B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033FF43F 1_2_033FF43F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03331460 1_2_03331460
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033FFB76 1_2_033FFB76
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0335FB80 1_2_0335FB80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B5BF0 1_2_033B5BF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0337DBF9 1_2_0337DBF9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B3A6C 1_2_033B3A6C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033FFA49 1_2_033FFA49
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033F7A46 1_2_033F7A46
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033DDAAC 1_2_033DDAAC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03385AA0 1_2_03385AA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033E1AA3 1_2_033E1AA3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033EDAC6 1_2_033EDAC6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033D5910 1_2_033D5910
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03349950 1_2_03349950
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0335B950 1_2_0335B950
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033AD800 1_2_033AD800
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033FFF09 1_2_033FFF09
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033FFFB1 1_2_033FFFB1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03341F92 1_2_03341F92
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03349EB0 1_2_03349EB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: String function: 0332B970 appears 226 times
Source: C:\Windows\SysWOW64\svchost.exe Code function: String function: 033BF290 appears 98 times
Source: C:\Windows\SysWOW64\svchost.exe Code function: String function: 03375130 appears 56 times
Source: C:\Windows\SysWOW64\svchost.exe Code function: String function: 033AEA12 appears 81 times
Source: C:\Windows\SysWOW64\svchost.exe Code function: String function: 03387E54 appears 101 times
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: String function: 0048EC2F appears 68 times
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: String function: 00496AC0 appears 42 times
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: String function: 0049F8A0 appears 35 times
Source: RFQ 3100185 MAHAD.exe, 00000000.00000003.1760874803.0000000003D3D000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenamentdll.dllj% vs RFQ 3100185 MAHAD.exe
Source: RFQ 3100185 MAHAD.exe, 00000000.00000003.1751733255.0000000003B93000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenamentdll.dllj% vs RFQ 3100185 MAHAD.exe
Source: RFQ 3100185 MAHAD.exe Static PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: classification engine Classification label: mal84.troj.evad.winEXE@3/2@0/0
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004BCE7A GetLastError,FormatMessageW, 0_2_004BCE7A
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004AAB84 AdjustTokenPrivileges,CloseHandle, 0_2_004AAB84
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004AB134 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError, 0_2_004AB134
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004BE1FD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode, 0_2_004BE1FD
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004B6532 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,__wsplitpath,_wcscat,CloseHandle, 0_2_004B6532
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004CC18C CoInitializeSecurity,_memset,_memset,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket, 0_2_004CC18C
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_0047406B CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource, 0_2_0047406B
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe File created: C:\Users\user\AppData\Local\Temp\autE378.tmp Jump to behavior
Source: RFQ 3100185 MAHAD.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: RFQ 3100185 MAHAD.exe ReversingLabs: Detection: 65%
Source: unknown Process created: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe "C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe"
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Process created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe"
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Process created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe" Jump to behavior
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Section loaded: wsock32.dll Jump to behavior
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Section loaded: ntmarta.dll Jump to behavior
Source: RFQ 3100185 MAHAD.exe Static file information: File size 1216512 > 1048576
Source: RFQ 3100185 MAHAD.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: RFQ 3100185 MAHAD.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: RFQ 3100185 MAHAD.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: RFQ 3100185 MAHAD.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: RFQ 3100185 MAHAD.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: RFQ 3100185 MAHAD.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: RFQ 3100185 MAHAD.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: wntdll.pdbUGP source: RFQ 3100185 MAHAD.exe, 00000000.00000003.1748999494.0000000003A20000.00000004.00001000.00020000.00000000.sdmp, RFQ 3100185 MAHAD.exe, 00000000.00000003.1760874803.0000000003C10000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1936299744.000000000349E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1936299744.0000000003300000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1897017776.0000000002F00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1899368792.0000000003100000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: wntdll.pdb source: RFQ 3100185 MAHAD.exe, 00000000.00000003.1748999494.0000000003A20000.00000004.00001000.00020000.00000000.sdmp, RFQ 3100185 MAHAD.exe, 00000000.00000003.1760874803.0000000003C10000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000002.1936299744.000000000349E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1936299744.0000000003300000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1897017776.0000000002F00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1899368792.0000000003100000.00000004.00000020.00020000.00000000.sdmp
Source: RFQ 3100185 MAHAD.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: RFQ 3100185 MAHAD.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: RFQ 3100185 MAHAD.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: RFQ 3100185 MAHAD.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: RFQ 3100185 MAHAD.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_0048E01E LoadLibraryA,GetProcAddress, 0_2_0048E01E
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_0049C09E push esi; ret 0_2_0049C0A0
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_0049C187 push edi; ret 0_2_0049C189
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004DC8BC push esi; ret 0_2_004DC8BE
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_00496B05 push ecx; ret 0_2_00496B18
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004BB2B1 push FFFFFF8Bh; iretd 0_2_004BB2B3
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_0049BDAA push edi; ret 0_2_0049BDAC
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_0049BEC3 push esi; ret 0_2_0049BEC5
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_01109509 push ebp; ret 0_2_01109519
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00402055 push edx; iretd 1_2_00402056
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_004018A1 push edx; iretd 1_2_004018A2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0040218B push ebp; iretd 1_2_00402192
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0040D9B6 push FFFFFFEBh; iretd 1_2_0040D9BF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0041F9B8 push 13D671DEh; iretd 1_2_0041F9BD
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0041AA30 push edx; retf 1_2_0041AA31
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_004192F1 push edx; ret 1_2_004192F2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00424281 push ds; retf 1_2_00424287
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00425433 push edi; ret 1_2_00425483
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00423D54 push 00000063h; retf 1_2_00423D83
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00403570 push eax; ret 1_2_00403572
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00414E8B pushfd ; iretd 1_2_00414E91
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0040A7C3 push edi; ret 1_2_0040A7F9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0040D7CA push ecx; ret 1_2_0040D7CF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0330225F pushad ; ret 1_2_033027F9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033027FA pushad ; ret 1_2_033027F9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033309AD push ecx; mov dword ptr [esp], ecx 1_2_033309B6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0330283D push eax; iretd 1_2_03302858
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004D8111 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, 0_2_004D8111
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_0048EB42 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, 0_2_0048EB42
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_0049123A __initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, 0_2_0049123A
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe API/Special instruction interceptor: Address: 1108E84
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0337096E rdtsc 1_2_0337096E
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Evaded block: after key decision
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Evasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe API coverage: 4.6 %
Source: C:\Windows\SysWOW64\svchost.exe API coverage: 0.7 %
Source: C:\Windows\SysWOW64\svchost.exe TID: 7300 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004B6CA9 GetFileAttributesW,FindFirstFileW,FindClose, 0_2_004B6CA9
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004B60DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose, 0_2_004B60DD
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004B63F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose, 0_2_004B63F9
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004BEB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, 0_2_004BEB60
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004BF56F FindFirstFileW,FindClose, 0_2_004BF56F
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004BF5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, 0_2_004BF5FA
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004C1B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 0_2_004C1B2F
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004C1C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 0_2_004C1C8A
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004C1F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, 0_2_004C1F94
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_0048DDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo, 0_2_0048DDC0
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe API call chain: ExitProcess graph end node
Source: C:\Windows\SysWOW64\svchost.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0337096E rdtsc 1_2_0337096E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_00417B23 LdrLoadDll, 1_2_00417B23
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004C6AAF BlockInput, 0_2_004C6AAF
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_00473D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW, 0_2_00473D19
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004A3920 LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,IsDebuggerPresent,OutputDebugStringW, 0_2_004A3920
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_0048E01E LoadLibraryA,GetProcAddress, 0_2_0048E01E
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_01109150 mov eax, dword ptr fs:[00000030h] 0_2_01109150
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_011090F0 mov eax, dword ptr fs:[00000030h] 0_2_011090F0
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_01107AA0 mov eax, dword ptr fs:[00000030h] 0_2_01107AA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0340634F mov eax, dword ptr fs:[00000030h] 1_2_0340634F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0332C310 mov ecx, dword ptr fs:[00000030h] 1_2_0332C310
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03350310 mov ecx, dword ptr fs:[00000030h] 1_2_03350310
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336A30B mov eax, dword ptr fs:[00000030h] 1_2_0336A30B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336A30B mov eax, dword ptr fs:[00000030h] 1_2_0336A30B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336A30B mov eax, dword ptr fs:[00000030h] 1_2_0336A30B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033D437C mov eax, dword ptr fs:[00000030h] 1_2_033D437C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03408324 mov eax, dword ptr fs:[00000030h] 1_2_03408324
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03408324 mov ecx, dword ptr fs:[00000030h] 1_2_03408324
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03408324 mov eax, dword ptr fs:[00000030h] 1_2_03408324
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03408324 mov eax, dword ptr fs:[00000030h] 1_2_03408324
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B035C mov eax, dword ptr fs:[00000030h] 1_2_033B035C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B035C mov eax, dword ptr fs:[00000030h] 1_2_033B035C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B035C mov eax, dword ptr fs:[00000030h] 1_2_033B035C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B035C mov ecx, dword ptr fs:[00000030h] 1_2_033B035C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B035C mov eax, dword ptr fs:[00000030h] 1_2_033B035C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B035C mov eax, dword ptr fs:[00000030h] 1_2_033B035C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033FA352 mov eax, dword ptr fs:[00000030h] 1_2_033FA352
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033D8350 mov ecx, dword ptr fs:[00000030h] 1_2_033D8350
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B2349 mov eax, dword ptr fs:[00000030h] 1_2_033B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B2349 mov eax, dword ptr fs:[00000030h] 1_2_033B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B2349 mov eax, dword ptr fs:[00000030h] 1_2_033B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B2349 mov eax, dword ptr fs:[00000030h] 1_2_033B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B2349 mov eax, dword ptr fs:[00000030h] 1_2_033B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B2349 mov eax, dword ptr fs:[00000030h] 1_2_033B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B2349 mov eax, dword ptr fs:[00000030h] 1_2_033B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B2349 mov eax, dword ptr fs:[00000030h] 1_2_033B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B2349 mov eax, dword ptr fs:[00000030h] 1_2_033B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B2349 mov eax, dword ptr fs:[00000030h] 1_2_033B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B2349 mov eax, dword ptr fs:[00000030h] 1_2_033B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B2349 mov eax, dword ptr fs:[00000030h] 1_2_033B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B2349 mov eax, dword ptr fs:[00000030h] 1_2_033B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B2349 mov eax, dword ptr fs:[00000030h] 1_2_033B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B2349 mov eax, dword ptr fs:[00000030h] 1_2_033B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03328397 mov eax, dword ptr fs:[00000030h] 1_2_03328397
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03328397 mov eax, dword ptr fs:[00000030h] 1_2_03328397
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03328397 mov eax, dword ptr fs:[00000030h] 1_2_03328397
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0332E388 mov eax, dword ptr fs:[00000030h] 1_2_0332E388
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0332E388 mov eax, dword ptr fs:[00000030h] 1_2_0332E388
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0332E388 mov eax, dword ptr fs:[00000030h] 1_2_0332E388
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0335438F mov eax, dword ptr fs:[00000030h] 1_2_0335438F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0335438F mov eax, dword ptr fs:[00000030h] 1_2_0335438F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0334E3F0 mov eax, dword ptr fs:[00000030h] 1_2_0334E3F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0334E3F0 mov eax, dword ptr fs:[00000030h] 1_2_0334E3F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0334E3F0 mov eax, dword ptr fs:[00000030h] 1_2_0334E3F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033663FF mov eax, dword ptr fs:[00000030h] 1_2_033663FF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033403E9 mov eax, dword ptr fs:[00000030h] 1_2_033403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033403E9 mov eax, dword ptr fs:[00000030h] 1_2_033403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033403E9 mov eax, dword ptr fs:[00000030h] 1_2_033403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033403E9 mov eax, dword ptr fs:[00000030h] 1_2_033403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033403E9 mov eax, dword ptr fs:[00000030h] 1_2_033403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033403E9 mov eax, dword ptr fs:[00000030h] 1_2_033403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033403E9 mov eax, dword ptr fs:[00000030h] 1_2_033403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033403E9 mov eax, dword ptr fs:[00000030h] 1_2_033403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033DE3DB mov eax, dword ptr fs:[00000030h] 1_2_033DE3DB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033DE3DB mov eax, dword ptr fs:[00000030h] 1_2_033DE3DB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033DE3DB mov ecx, dword ptr fs:[00000030h] 1_2_033DE3DB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033DE3DB mov eax, dword ptr fs:[00000030h] 1_2_033DE3DB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033D43D4 mov eax, dword ptr fs:[00000030h] 1_2_033D43D4
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033D43D4 mov eax, dword ptr fs:[00000030h] 1_2_033D43D4
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033EC3CD mov eax, dword ptr fs:[00000030h] 1_2_033EC3CD
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333A3C0 mov eax, dword ptr fs:[00000030h] 1_2_0333A3C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333A3C0 mov eax, dword ptr fs:[00000030h] 1_2_0333A3C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333A3C0 mov eax, dword ptr fs:[00000030h] 1_2_0333A3C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333A3C0 mov eax, dword ptr fs:[00000030h] 1_2_0333A3C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333A3C0 mov eax, dword ptr fs:[00000030h] 1_2_0333A3C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333A3C0 mov eax, dword ptr fs:[00000030h] 1_2_0333A3C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033383C0 mov eax, dword ptr fs:[00000030h] 1_2_033383C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033383C0 mov eax, dword ptr fs:[00000030h] 1_2_033383C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033383C0 mov eax, dword ptr fs:[00000030h] 1_2_033383C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033383C0 mov eax, dword ptr fs:[00000030h] 1_2_033383C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B63C0 mov eax, dword ptr fs:[00000030h] 1_2_033B63C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0332823B mov eax, dword ptr fs:[00000030h] 1_2_0332823B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0340625D mov eax, dword ptr fs:[00000030h] 1_2_0340625D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033E0274 mov eax, dword ptr fs:[00000030h] 1_2_033E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033E0274 mov eax, dword ptr fs:[00000030h] 1_2_033E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033E0274 mov eax, dword ptr fs:[00000030h] 1_2_033E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033E0274 mov eax, dword ptr fs:[00000030h] 1_2_033E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033E0274 mov eax, dword ptr fs:[00000030h] 1_2_033E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033E0274 mov eax, dword ptr fs:[00000030h] 1_2_033E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033E0274 mov eax, dword ptr fs:[00000030h] 1_2_033E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033E0274 mov eax, dword ptr fs:[00000030h] 1_2_033E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033E0274 mov eax, dword ptr fs:[00000030h] 1_2_033E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033E0274 mov eax, dword ptr fs:[00000030h] 1_2_033E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033E0274 mov eax, dword ptr fs:[00000030h] 1_2_033E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033E0274 mov eax, dword ptr fs:[00000030h] 1_2_033E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03334260 mov eax, dword ptr fs:[00000030h] 1_2_03334260
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03334260 mov eax, dword ptr fs:[00000030h] 1_2_03334260
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03334260 mov eax, dword ptr fs:[00000030h] 1_2_03334260
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0332826B mov eax, dword ptr fs:[00000030h] 1_2_0332826B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0332A250 mov eax, dword ptr fs:[00000030h] 1_2_0332A250
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03336259 mov eax, dword ptr fs:[00000030h] 1_2_03336259
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033EA250 mov eax, dword ptr fs:[00000030h] 1_2_033EA250
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033EA250 mov eax, dword ptr fs:[00000030h] 1_2_033EA250
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B8243 mov eax, dword ptr fs:[00000030h] 1_2_033B8243
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B8243 mov ecx, dword ptr fs:[00000030h] 1_2_033B8243
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033402A0 mov eax, dword ptr fs:[00000030h] 1_2_033402A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033402A0 mov eax, dword ptr fs:[00000030h] 1_2_033402A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_034062D6 mov eax, dword ptr fs:[00000030h] 1_2_034062D6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033C62A0 mov eax, dword ptr fs:[00000030h] 1_2_033C62A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033C62A0 mov ecx, dword ptr fs:[00000030h] 1_2_033C62A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033C62A0 mov eax, dword ptr fs:[00000030h] 1_2_033C62A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033C62A0 mov eax, dword ptr fs:[00000030h] 1_2_033C62A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033C62A0 mov eax, dword ptr fs:[00000030h] 1_2_033C62A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033C62A0 mov eax, dword ptr fs:[00000030h] 1_2_033C62A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336E284 mov eax, dword ptr fs:[00000030h] 1_2_0336E284
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336E284 mov eax, dword ptr fs:[00000030h] 1_2_0336E284
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B0283 mov eax, dword ptr fs:[00000030h] 1_2_033B0283
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B0283 mov eax, dword ptr fs:[00000030h] 1_2_033B0283
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B0283 mov eax, dword ptr fs:[00000030h] 1_2_033B0283
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033402E1 mov eax, dword ptr fs:[00000030h] 1_2_033402E1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033402E1 mov eax, dword ptr fs:[00000030h] 1_2_033402E1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033402E1 mov eax, dword ptr fs:[00000030h] 1_2_033402E1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333A2C3 mov eax, dword ptr fs:[00000030h] 1_2_0333A2C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333A2C3 mov eax, dword ptr fs:[00000030h] 1_2_0333A2C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333A2C3 mov eax, dword ptr fs:[00000030h] 1_2_0333A2C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333A2C3 mov eax, dword ptr fs:[00000030h] 1_2_0333A2C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333A2C3 mov eax, dword ptr fs:[00000030h] 1_2_0333A2C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03360124 mov eax, dword ptr fs:[00000030h] 1_2_03360124
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03404164 mov eax, dword ptr fs:[00000030h] 1_2_03404164
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03404164 mov eax, dword ptr fs:[00000030h] 1_2_03404164
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033DA118 mov ecx, dword ptr fs:[00000030h] 1_2_033DA118
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033DA118 mov eax, dword ptr fs:[00000030h] 1_2_033DA118
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033DA118 mov eax, dword ptr fs:[00000030h] 1_2_033DA118
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033DA118 mov eax, dword ptr fs:[00000030h] 1_2_033DA118
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033F0115 mov eax, dword ptr fs:[00000030h] 1_2_033F0115
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033DE10E mov eax, dword ptr fs:[00000030h] 1_2_033DE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033DE10E mov ecx, dword ptr fs:[00000030h] 1_2_033DE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033DE10E mov eax, dword ptr fs:[00000030h] 1_2_033DE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033DE10E mov eax, dword ptr fs:[00000030h] 1_2_033DE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033DE10E mov ecx, dword ptr fs:[00000030h] 1_2_033DE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033DE10E mov eax, dword ptr fs:[00000030h] 1_2_033DE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033DE10E mov eax, dword ptr fs:[00000030h] 1_2_033DE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033DE10E mov ecx, dword ptr fs:[00000030h] 1_2_033DE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033DE10E mov eax, dword ptr fs:[00000030h] 1_2_033DE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033DE10E mov ecx, dword ptr fs:[00000030h] 1_2_033DE10E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0332C156 mov eax, dword ptr fs:[00000030h] 1_2_0332C156
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033C8158 mov eax, dword ptr fs:[00000030h] 1_2_033C8158
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03336154 mov eax, dword ptr fs:[00000030h] 1_2_03336154
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03336154 mov eax, dword ptr fs:[00000030h] 1_2_03336154
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033C4144 mov eax, dword ptr fs:[00000030h] 1_2_033C4144
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033C4144 mov eax, dword ptr fs:[00000030h] 1_2_033C4144
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033C4144 mov ecx, dword ptr fs:[00000030h] 1_2_033C4144
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033C4144 mov eax, dword ptr fs:[00000030h] 1_2_033C4144
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033C4144 mov eax, dword ptr fs:[00000030h] 1_2_033C4144
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B019F mov eax, dword ptr fs:[00000030h] 1_2_033B019F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B019F mov eax, dword ptr fs:[00000030h] 1_2_033B019F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B019F mov eax, dword ptr fs:[00000030h] 1_2_033B019F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B019F mov eax, dword ptr fs:[00000030h] 1_2_033B019F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0332A197 mov eax, dword ptr fs:[00000030h] 1_2_0332A197
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0332A197 mov eax, dword ptr fs:[00000030h] 1_2_0332A197
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0332A197 mov eax, dword ptr fs:[00000030h] 1_2_0332A197
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_034061E5 mov eax, dword ptr fs:[00000030h] 1_2_034061E5
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03370185 mov eax, dword ptr fs:[00000030h] 1_2_03370185
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033EC188 mov eax, dword ptr fs:[00000030h] 1_2_033EC188
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033EC188 mov eax, dword ptr fs:[00000030h] 1_2_033EC188
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033D4180 mov eax, dword ptr fs:[00000030h] 1_2_033D4180
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033D4180 mov eax, dword ptr fs:[00000030h] 1_2_033D4180
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033601F8 mov eax, dword ptr fs:[00000030h] 1_2_033601F8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033AE1D0 mov eax, dword ptr fs:[00000030h] 1_2_033AE1D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033AE1D0 mov eax, dword ptr fs:[00000030h] 1_2_033AE1D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033AE1D0 mov ecx, dword ptr fs:[00000030h] 1_2_033AE1D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033AE1D0 mov eax, dword ptr fs:[00000030h] 1_2_033AE1D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033AE1D0 mov eax, dword ptr fs:[00000030h] 1_2_033AE1D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033F61C3 mov eax, dword ptr fs:[00000030h] 1_2_033F61C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033F61C3 mov eax, dword ptr fs:[00000030h] 1_2_033F61C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033C6030 mov eax, dword ptr fs:[00000030h] 1_2_033C6030
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0332A020 mov eax, dword ptr fs:[00000030h] 1_2_0332A020
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0332C020 mov eax, dword ptr fs:[00000030h] 1_2_0332C020
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0334E016 mov eax, dword ptr fs:[00000030h] 1_2_0334E016
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0334E016 mov eax, dword ptr fs:[00000030h] 1_2_0334E016
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0334E016 mov eax, dword ptr fs:[00000030h] 1_2_0334E016
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0334E016 mov eax, dword ptr fs:[00000030h] 1_2_0334E016
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B4000 mov ecx, dword ptr fs:[00000030h] 1_2_033B4000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033D2000 mov eax, dword ptr fs:[00000030h] 1_2_033D2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033D2000 mov eax, dword ptr fs:[00000030h] 1_2_033D2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033D2000 mov eax, dword ptr fs:[00000030h] 1_2_033D2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033D2000 mov eax, dword ptr fs:[00000030h] 1_2_033D2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033D2000 mov eax, dword ptr fs:[00000030h] 1_2_033D2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033D2000 mov eax, dword ptr fs:[00000030h] 1_2_033D2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033D2000 mov eax, dword ptr fs:[00000030h] 1_2_033D2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033D2000 mov eax, dword ptr fs:[00000030h] 1_2_033D2000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0335C073 mov eax, dword ptr fs:[00000030h] 1_2_0335C073
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03332050 mov eax, dword ptr fs:[00000030h] 1_2_03332050
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B6050 mov eax, dword ptr fs:[00000030h] 1_2_033B6050
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033F60B8 mov eax, dword ptr fs:[00000030h] 1_2_033F60B8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033F60B8 mov ecx, dword ptr fs:[00000030h] 1_2_033F60B8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033280A0 mov eax, dword ptr fs:[00000030h] 1_2_033280A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033C80A8 mov eax, dword ptr fs:[00000030h] 1_2_033C80A8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333208A mov eax, dword ptr fs:[00000030h] 1_2_0333208A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0332C0F0 mov eax, dword ptr fs:[00000030h] 1_2_0332C0F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033720F0 mov ecx, dword ptr fs:[00000030h] 1_2_033720F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0332A0E3 mov ecx, dword ptr fs:[00000030h] 1_2_0332A0E3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033380E9 mov eax, dword ptr fs:[00000030h] 1_2_033380E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B60E0 mov eax, dword ptr fs:[00000030h] 1_2_033B60E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B20DE mov eax, dword ptr fs:[00000030h] 1_2_033B20DE
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336273C mov eax, dword ptr fs:[00000030h] 1_2_0336273C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336273C mov ecx, dword ptr fs:[00000030h] 1_2_0336273C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336273C mov eax, dword ptr fs:[00000030h] 1_2_0336273C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033AC730 mov eax, dword ptr fs:[00000030h] 1_2_033AC730
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336C720 mov eax, dword ptr fs:[00000030h] 1_2_0336C720
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336C720 mov eax, dword ptr fs:[00000030h] 1_2_0336C720
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03330710 mov eax, dword ptr fs:[00000030h] 1_2_03330710
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03360710 mov eax, dword ptr fs:[00000030h] 1_2_03360710
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336C700 mov eax, dword ptr fs:[00000030h] 1_2_0336C700
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03338770 mov eax, dword ptr fs:[00000030h] 1_2_03338770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03340770 mov eax, dword ptr fs:[00000030h] 1_2_03340770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03340770 mov eax, dword ptr fs:[00000030h] 1_2_03340770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03340770 mov eax, dword ptr fs:[00000030h] 1_2_03340770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03340770 mov eax, dword ptr fs:[00000030h] 1_2_03340770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03340770 mov eax, dword ptr fs:[00000030h] 1_2_03340770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03340770 mov eax, dword ptr fs:[00000030h] 1_2_03340770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03340770 mov eax, dword ptr fs:[00000030h] 1_2_03340770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03340770 mov eax, dword ptr fs:[00000030h] 1_2_03340770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03340770 mov eax, dword ptr fs:[00000030h] 1_2_03340770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03340770 mov eax, dword ptr fs:[00000030h] 1_2_03340770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03340770 mov eax, dword ptr fs:[00000030h] 1_2_03340770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03340770 mov eax, dword ptr fs:[00000030h] 1_2_03340770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03330750 mov eax, dword ptr fs:[00000030h] 1_2_03330750
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033BE75D mov eax, dword ptr fs:[00000030h] 1_2_033BE75D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372750 mov eax, dword ptr fs:[00000030h] 1_2_03372750
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372750 mov eax, dword ptr fs:[00000030h] 1_2_03372750
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B4755 mov eax, dword ptr fs:[00000030h] 1_2_033B4755
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336674D mov esi, dword ptr fs:[00000030h] 1_2_0336674D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336674D mov eax, dword ptr fs:[00000030h] 1_2_0336674D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336674D mov eax, dword ptr fs:[00000030h] 1_2_0336674D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033307AF mov eax, dword ptr fs:[00000030h] 1_2_033307AF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033E47A0 mov eax, dword ptr fs:[00000030h] 1_2_033E47A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033D678E mov eax, dword ptr fs:[00000030h] 1_2_033D678E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033347FB mov eax, dword ptr fs:[00000030h] 1_2_033347FB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033347FB mov eax, dword ptr fs:[00000030h] 1_2_033347FB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033527ED mov eax, dword ptr fs:[00000030h] 1_2_033527ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033527ED mov eax, dword ptr fs:[00000030h] 1_2_033527ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033527ED mov eax, dword ptr fs:[00000030h] 1_2_033527ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033BE7E1 mov eax, dword ptr fs:[00000030h] 1_2_033BE7E1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333C7C0 mov eax, dword ptr fs:[00000030h] 1_2_0333C7C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B07C3 mov eax, dword ptr fs:[00000030h] 1_2_033B07C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0334E627 mov eax, dword ptr fs:[00000030h] 1_2_0334E627
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03366620 mov eax, dword ptr fs:[00000030h] 1_2_03366620
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03368620 mov eax, dword ptr fs:[00000030h] 1_2_03368620
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333262C mov eax, dword ptr fs:[00000030h] 1_2_0333262C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03372619 mov eax, dword ptr fs:[00000030h] 1_2_03372619
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033AE609 mov eax, dword ptr fs:[00000030h] 1_2_033AE609
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0334260B mov eax, dword ptr fs:[00000030h] 1_2_0334260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0334260B mov eax, dword ptr fs:[00000030h] 1_2_0334260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0334260B mov eax, dword ptr fs:[00000030h] 1_2_0334260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0334260B mov eax, dword ptr fs:[00000030h] 1_2_0334260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0334260B mov eax, dword ptr fs:[00000030h] 1_2_0334260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0334260B mov eax, dword ptr fs:[00000030h] 1_2_0334260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0334260B mov eax, dword ptr fs:[00000030h] 1_2_0334260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03362674 mov eax, dword ptr fs:[00000030h] 1_2_03362674
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033F866E mov eax, dword ptr fs:[00000030h] 1_2_033F866E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033F866E mov eax, dword ptr fs:[00000030h] 1_2_033F866E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336A660 mov eax, dword ptr fs:[00000030h] 1_2_0336A660
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336A660 mov eax, dword ptr fs:[00000030h] 1_2_0336A660
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0334C640 mov eax, dword ptr fs:[00000030h] 1_2_0334C640
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033666B0 mov eax, dword ptr fs:[00000030h] 1_2_033666B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336C6A6 mov eax, dword ptr fs:[00000030h] 1_2_0336C6A6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03334690 mov eax, dword ptr fs:[00000030h] 1_2_03334690
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03334690 mov eax, dword ptr fs:[00000030h] 1_2_03334690
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033AE6F2 mov eax, dword ptr fs:[00000030h] 1_2_033AE6F2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033AE6F2 mov eax, dword ptr fs:[00000030h] 1_2_033AE6F2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033AE6F2 mov eax, dword ptr fs:[00000030h] 1_2_033AE6F2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033AE6F2 mov eax, dword ptr fs:[00000030h] 1_2_033AE6F2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B06F1 mov eax, dword ptr fs:[00000030h] 1_2_033B06F1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B06F1 mov eax, dword ptr fs:[00000030h] 1_2_033B06F1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336A6C7 mov ebx, dword ptr fs:[00000030h] 1_2_0336A6C7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336A6C7 mov eax, dword ptr fs:[00000030h] 1_2_0336A6C7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03340535 mov eax, dword ptr fs:[00000030h] 1_2_03340535
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03340535 mov eax, dword ptr fs:[00000030h] 1_2_03340535
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03340535 mov eax, dword ptr fs:[00000030h] 1_2_03340535
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03340535 mov eax, dword ptr fs:[00000030h] 1_2_03340535
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03340535 mov eax, dword ptr fs:[00000030h] 1_2_03340535
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03340535 mov eax, dword ptr fs:[00000030h] 1_2_03340535
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0335E53E mov eax, dword ptr fs:[00000030h] 1_2_0335E53E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0335E53E mov eax, dword ptr fs:[00000030h] 1_2_0335E53E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0335E53E mov eax, dword ptr fs:[00000030h] 1_2_0335E53E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0335E53E mov eax, dword ptr fs:[00000030h] 1_2_0335E53E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0335E53E mov eax, dword ptr fs:[00000030h] 1_2_0335E53E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033C6500 mov eax, dword ptr fs:[00000030h] 1_2_033C6500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03404500 mov eax, dword ptr fs:[00000030h] 1_2_03404500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03404500 mov eax, dword ptr fs:[00000030h] 1_2_03404500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03404500 mov eax, dword ptr fs:[00000030h] 1_2_03404500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03404500 mov eax, dword ptr fs:[00000030h] 1_2_03404500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03404500 mov eax, dword ptr fs:[00000030h] 1_2_03404500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03404500 mov eax, dword ptr fs:[00000030h] 1_2_03404500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03404500 mov eax, dword ptr fs:[00000030h] 1_2_03404500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336656A mov eax, dword ptr fs:[00000030h] 1_2_0336656A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336656A mov eax, dword ptr fs:[00000030h] 1_2_0336656A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336656A mov eax, dword ptr fs:[00000030h] 1_2_0336656A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03338550 mov eax, dword ptr fs:[00000030h] 1_2_03338550
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03338550 mov eax, dword ptr fs:[00000030h] 1_2_03338550
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033545B1 mov eax, dword ptr fs:[00000030h] 1_2_033545B1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033545B1 mov eax, dword ptr fs:[00000030h] 1_2_033545B1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B05A7 mov eax, dword ptr fs:[00000030h] 1_2_033B05A7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B05A7 mov eax, dword ptr fs:[00000030h] 1_2_033B05A7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B05A7 mov eax, dword ptr fs:[00000030h] 1_2_033B05A7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336E59C mov eax, dword ptr fs:[00000030h] 1_2_0336E59C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03332582 mov eax, dword ptr fs:[00000030h] 1_2_03332582
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03332582 mov ecx, dword ptr fs:[00000030h] 1_2_03332582
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03364588 mov eax, dword ptr fs:[00000030h] 1_2_03364588
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0335E5E7 mov eax, dword ptr fs:[00000030h] 1_2_0335E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0335E5E7 mov eax, dword ptr fs:[00000030h] 1_2_0335E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0335E5E7 mov eax, dword ptr fs:[00000030h] 1_2_0335E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0335E5E7 mov eax, dword ptr fs:[00000030h] 1_2_0335E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0335E5E7 mov eax, dword ptr fs:[00000030h] 1_2_0335E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0335E5E7 mov eax, dword ptr fs:[00000030h] 1_2_0335E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0335E5E7 mov eax, dword ptr fs:[00000030h] 1_2_0335E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0335E5E7 mov eax, dword ptr fs:[00000030h] 1_2_0335E5E7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033325E0 mov eax, dword ptr fs:[00000030h] 1_2_033325E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336C5ED mov eax, dword ptr fs:[00000030h] 1_2_0336C5ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336C5ED mov eax, dword ptr fs:[00000030h] 1_2_0336C5ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033365D0 mov eax, dword ptr fs:[00000030h] 1_2_033365D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336A5D0 mov eax, dword ptr fs:[00000030h] 1_2_0336A5D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336A5D0 mov eax, dword ptr fs:[00000030h] 1_2_0336A5D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336E5CF mov eax, dword ptr fs:[00000030h] 1_2_0336E5CF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336E5CF mov eax, dword ptr fs:[00000030h] 1_2_0336E5CF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336A430 mov eax, dword ptr fs:[00000030h] 1_2_0336A430
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0332E420 mov eax, dword ptr fs:[00000030h] 1_2_0332E420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0332E420 mov eax, dword ptr fs:[00000030h] 1_2_0332E420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0332E420 mov eax, dword ptr fs:[00000030h] 1_2_0332E420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0332C427 mov eax, dword ptr fs:[00000030h] 1_2_0332C427
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B6420 mov eax, dword ptr fs:[00000030h] 1_2_033B6420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B6420 mov eax, dword ptr fs:[00000030h] 1_2_033B6420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B6420 mov eax, dword ptr fs:[00000030h] 1_2_033B6420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B6420 mov eax, dword ptr fs:[00000030h] 1_2_033B6420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B6420 mov eax, dword ptr fs:[00000030h] 1_2_033B6420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B6420 mov eax, dword ptr fs:[00000030h] 1_2_033B6420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B6420 mov eax, dword ptr fs:[00000030h] 1_2_033B6420
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03368402 mov eax, dword ptr fs:[00000030h] 1_2_03368402
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03368402 mov eax, dword ptr fs:[00000030h] 1_2_03368402
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03368402 mov eax, dword ptr fs:[00000030h] 1_2_03368402
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0335A470 mov eax, dword ptr fs:[00000030h] 1_2_0335A470
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0335A470 mov eax, dword ptr fs:[00000030h] 1_2_0335A470
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0335A470 mov eax, dword ptr fs:[00000030h] 1_2_0335A470
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033BC460 mov ecx, dword ptr fs:[00000030h] 1_2_033BC460
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033EA456 mov eax, dword ptr fs:[00000030h] 1_2_033EA456
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0332645D mov eax, dword ptr fs:[00000030h] 1_2_0332645D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0335245A mov eax, dword ptr fs:[00000030h] 1_2_0335245A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336E443 mov eax, dword ptr fs:[00000030h] 1_2_0336E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336E443 mov eax, dword ptr fs:[00000030h] 1_2_0336E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336E443 mov eax, dword ptr fs:[00000030h] 1_2_0336E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336E443 mov eax, dword ptr fs:[00000030h] 1_2_0336E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336E443 mov eax, dword ptr fs:[00000030h] 1_2_0336E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336E443 mov eax, dword ptr fs:[00000030h] 1_2_0336E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336E443 mov eax, dword ptr fs:[00000030h] 1_2_0336E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336E443 mov eax, dword ptr fs:[00000030h] 1_2_0336E443
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033644B0 mov ecx, dword ptr fs:[00000030h] 1_2_033644B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033BA4B0 mov eax, dword ptr fs:[00000030h] 1_2_033BA4B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033364AB mov eax, dword ptr fs:[00000030h] 1_2_033364AB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033EA49A mov eax, dword ptr fs:[00000030h] 1_2_033EA49A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033304E5 mov ecx, dword ptr fs:[00000030h] 1_2_033304E5
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0335EB20 mov eax, dword ptr fs:[00000030h] 1_2_0335EB20
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0335EB20 mov eax, dword ptr fs:[00000030h] 1_2_0335EB20
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033F8B28 mov eax, dword ptr fs:[00000030h] 1_2_033F8B28
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033F8B28 mov eax, dword ptr fs:[00000030h] 1_2_033F8B28
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03402B57 mov eax, dword ptr fs:[00000030h] 1_2_03402B57
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03402B57 mov eax, dword ptr fs:[00000030h] 1_2_03402B57
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03402B57 mov eax, dword ptr fs:[00000030h] 1_2_03402B57
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03402B57 mov eax, dword ptr fs:[00000030h] 1_2_03402B57
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033AEB1D mov eax, dword ptr fs:[00000030h] 1_2_033AEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033AEB1D mov eax, dword ptr fs:[00000030h] 1_2_033AEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033AEB1D mov eax, dword ptr fs:[00000030h] 1_2_033AEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033AEB1D mov eax, dword ptr fs:[00000030h] 1_2_033AEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033AEB1D mov eax, dword ptr fs:[00000030h] 1_2_033AEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033AEB1D mov eax, dword ptr fs:[00000030h] 1_2_033AEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033AEB1D mov eax, dword ptr fs:[00000030h] 1_2_033AEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033AEB1D mov eax, dword ptr fs:[00000030h] 1_2_033AEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033AEB1D mov eax, dword ptr fs:[00000030h] 1_2_033AEB1D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03404B00 mov eax, dword ptr fs:[00000030h] 1_2_03404B00
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0332CB7E mov eax, dword ptr fs:[00000030h] 1_2_0332CB7E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03328B50 mov eax, dword ptr fs:[00000030h] 1_2_03328B50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033DEB50 mov eax, dword ptr fs:[00000030h] 1_2_033DEB50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033E4B4B mov eax, dword ptr fs:[00000030h] 1_2_033E4B4B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033E4B4B mov eax, dword ptr fs:[00000030h] 1_2_033E4B4B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033C6B40 mov eax, dword ptr fs:[00000030h] 1_2_033C6B40
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033C6B40 mov eax, dword ptr fs:[00000030h] 1_2_033C6B40
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033FAB40 mov eax, dword ptr fs:[00000030h] 1_2_033FAB40
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033D8B42 mov eax, dword ptr fs:[00000030h] 1_2_033D8B42
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03340BBE mov eax, dword ptr fs:[00000030h] 1_2_03340BBE
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03340BBE mov eax, dword ptr fs:[00000030h] 1_2_03340BBE
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033E4BB0 mov eax, dword ptr fs:[00000030h] 1_2_033E4BB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033E4BB0 mov eax, dword ptr fs:[00000030h] 1_2_033E4BB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03338BF0 mov eax, dword ptr fs:[00000030h] 1_2_03338BF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03338BF0 mov eax, dword ptr fs:[00000030h] 1_2_03338BF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03338BF0 mov eax, dword ptr fs:[00000030h] 1_2_03338BF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0335EBFC mov eax, dword ptr fs:[00000030h] 1_2_0335EBFC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033BCBF0 mov eax, dword ptr fs:[00000030h] 1_2_033BCBF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033DEBD0 mov eax, dword ptr fs:[00000030h] 1_2_033DEBD0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03350BCB mov eax, dword ptr fs:[00000030h] 1_2_03350BCB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03350BCB mov eax, dword ptr fs:[00000030h] 1_2_03350BCB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03350BCB mov eax, dword ptr fs:[00000030h] 1_2_03350BCB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03330BCD mov eax, dword ptr fs:[00000030h] 1_2_03330BCD
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03330BCD mov eax, dword ptr fs:[00000030h] 1_2_03330BCD
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03330BCD mov eax, dword ptr fs:[00000030h] 1_2_03330BCD
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03354A35 mov eax, dword ptr fs:[00000030h] 1_2_03354A35
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03354A35 mov eax, dword ptr fs:[00000030h] 1_2_03354A35
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336CA38 mov eax, dword ptr fs:[00000030h] 1_2_0336CA38
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336CA24 mov eax, dword ptr fs:[00000030h] 1_2_0336CA24
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0335EA2E mov eax, dword ptr fs:[00000030h] 1_2_0335EA2E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033BCA11 mov eax, dword ptr fs:[00000030h] 1_2_033BCA11
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033ACA72 mov eax, dword ptr fs:[00000030h] 1_2_033ACA72
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033ACA72 mov eax, dword ptr fs:[00000030h] 1_2_033ACA72
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336CA6F mov eax, dword ptr fs:[00000030h] 1_2_0336CA6F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336CA6F mov eax, dword ptr fs:[00000030h] 1_2_0336CA6F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336CA6F mov eax, dword ptr fs:[00000030h] 1_2_0336CA6F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033DEA60 mov eax, dword ptr fs:[00000030h] 1_2_033DEA60
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03336A50 mov eax, dword ptr fs:[00000030h] 1_2_03336A50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03336A50 mov eax, dword ptr fs:[00000030h] 1_2_03336A50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03336A50 mov eax, dword ptr fs:[00000030h] 1_2_03336A50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03336A50 mov eax, dword ptr fs:[00000030h] 1_2_03336A50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03336A50 mov eax, dword ptr fs:[00000030h] 1_2_03336A50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03336A50 mov eax, dword ptr fs:[00000030h] 1_2_03336A50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03336A50 mov eax, dword ptr fs:[00000030h] 1_2_03336A50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03340A5B mov eax, dword ptr fs:[00000030h] 1_2_03340A5B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03340A5B mov eax, dword ptr fs:[00000030h] 1_2_03340A5B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03338AA0 mov eax, dword ptr fs:[00000030h] 1_2_03338AA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03338AA0 mov eax, dword ptr fs:[00000030h] 1_2_03338AA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03386AA4 mov eax, dword ptr fs:[00000030h] 1_2_03386AA4
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03368A90 mov edx, dword ptr fs:[00000030h] 1_2_03368A90
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333EA80 mov eax, dword ptr fs:[00000030h] 1_2_0333EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333EA80 mov eax, dword ptr fs:[00000030h] 1_2_0333EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333EA80 mov eax, dword ptr fs:[00000030h] 1_2_0333EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333EA80 mov eax, dword ptr fs:[00000030h] 1_2_0333EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333EA80 mov eax, dword ptr fs:[00000030h] 1_2_0333EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333EA80 mov eax, dword ptr fs:[00000030h] 1_2_0333EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333EA80 mov eax, dword ptr fs:[00000030h] 1_2_0333EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333EA80 mov eax, dword ptr fs:[00000030h] 1_2_0333EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333EA80 mov eax, dword ptr fs:[00000030h] 1_2_0333EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03404A80 mov eax, dword ptr fs:[00000030h] 1_2_03404A80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336AAEE mov eax, dword ptr fs:[00000030h] 1_2_0336AAEE
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336AAEE mov eax, dword ptr fs:[00000030h] 1_2_0336AAEE
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03330AD0 mov eax, dword ptr fs:[00000030h] 1_2_03330AD0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03364AD0 mov eax, dword ptr fs:[00000030h] 1_2_03364AD0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03364AD0 mov eax, dword ptr fs:[00000030h] 1_2_03364AD0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03386ACC mov eax, dword ptr fs:[00000030h] 1_2_03386ACC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03386ACC mov eax, dword ptr fs:[00000030h] 1_2_03386ACC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03386ACC mov eax, dword ptr fs:[00000030h] 1_2_03386ACC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03404940 mov eax, dword ptr fs:[00000030h] 1_2_03404940
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B892A mov eax, dword ptr fs:[00000030h] 1_2_033B892A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033C892B mov eax, dword ptr fs:[00000030h] 1_2_033C892B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033BC912 mov eax, dword ptr fs:[00000030h] 1_2_033BC912
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03328918 mov eax, dword ptr fs:[00000030h] 1_2_03328918
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03328918 mov eax, dword ptr fs:[00000030h] 1_2_03328918
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033AE908 mov eax, dword ptr fs:[00000030h] 1_2_033AE908
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033AE908 mov eax, dword ptr fs:[00000030h] 1_2_033AE908
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033D4978 mov eax, dword ptr fs:[00000030h] 1_2_033D4978
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033D4978 mov eax, dword ptr fs:[00000030h] 1_2_033D4978
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033BC97C mov eax, dword ptr fs:[00000030h] 1_2_033BC97C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03356962 mov eax, dword ptr fs:[00000030h] 1_2_03356962
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03356962 mov eax, dword ptr fs:[00000030h] 1_2_03356962
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03356962 mov eax, dword ptr fs:[00000030h] 1_2_03356962
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0337096E mov eax, dword ptr fs:[00000030h] 1_2_0337096E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0337096E mov edx, dword ptr fs:[00000030h] 1_2_0337096E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0337096E mov eax, dword ptr fs:[00000030h] 1_2_0337096E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B0946 mov eax, dword ptr fs:[00000030h] 1_2_033B0946
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B89B3 mov esi, dword ptr fs:[00000030h] 1_2_033B89B3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B89B3 mov eax, dword ptr fs:[00000030h] 1_2_033B89B3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033B89B3 mov eax, dword ptr fs:[00000030h] 1_2_033B89B3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033429A0 mov eax, dword ptr fs:[00000030h] 1_2_033429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033429A0 mov eax, dword ptr fs:[00000030h] 1_2_033429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033429A0 mov eax, dword ptr fs:[00000030h] 1_2_033429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033429A0 mov eax, dword ptr fs:[00000030h] 1_2_033429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033429A0 mov eax, dword ptr fs:[00000030h] 1_2_033429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033429A0 mov eax, dword ptr fs:[00000030h] 1_2_033429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033429A0 mov eax, dword ptr fs:[00000030h] 1_2_033429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033429A0 mov eax, dword ptr fs:[00000030h] 1_2_033429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033429A0 mov eax, dword ptr fs:[00000030h] 1_2_033429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033429A0 mov eax, dword ptr fs:[00000030h] 1_2_033429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033429A0 mov eax, dword ptr fs:[00000030h] 1_2_033429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033429A0 mov eax, dword ptr fs:[00000030h] 1_2_033429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033429A0 mov eax, dword ptr fs:[00000030h] 1_2_033429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033309AD mov eax, dword ptr fs:[00000030h] 1_2_033309AD
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033309AD mov eax, dword ptr fs:[00000030h] 1_2_033309AD
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033629F9 mov eax, dword ptr fs:[00000030h] 1_2_033629F9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033629F9 mov eax, dword ptr fs:[00000030h] 1_2_033629F9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033BE9E0 mov eax, dword ptr fs:[00000030h] 1_2_033BE9E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333A9D0 mov eax, dword ptr fs:[00000030h] 1_2_0333A9D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333A9D0 mov eax, dword ptr fs:[00000030h] 1_2_0333A9D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333A9D0 mov eax, dword ptr fs:[00000030h] 1_2_0333A9D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333A9D0 mov eax, dword ptr fs:[00000030h] 1_2_0333A9D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333A9D0 mov eax, dword ptr fs:[00000030h] 1_2_0333A9D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0333A9D0 mov eax, dword ptr fs:[00000030h] 1_2_0333A9D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033649D0 mov eax, dword ptr fs:[00000030h] 1_2_033649D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033FA9D3 mov eax, dword ptr fs:[00000030h] 1_2_033FA9D3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033C69C0 mov eax, dword ptr fs:[00000030h] 1_2_033C69C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03352835 mov eax, dword ptr fs:[00000030h] 1_2_03352835
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03352835 mov eax, dword ptr fs:[00000030h] 1_2_03352835
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03352835 mov eax, dword ptr fs:[00000030h] 1_2_03352835
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03352835 mov ecx, dword ptr fs:[00000030h] 1_2_03352835
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03352835 mov eax, dword ptr fs:[00000030h] 1_2_03352835
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03352835 mov eax, dword ptr fs:[00000030h] 1_2_03352835
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0336A830 mov eax, dword ptr fs:[00000030h] 1_2_0336A830
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033D483A mov eax, dword ptr fs:[00000030h] 1_2_033D483A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033D483A mov eax, dword ptr fs:[00000030h] 1_2_033D483A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033BC810 mov eax, dword ptr fs:[00000030h] 1_2_033BC810
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_033BE872 mov eax, dword ptr fs:[00000030h] 1_2_033BE872
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004AA66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity, 0_2_004AA66C
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_00498189 SetUnhandledExceptionFilter, 0_2_00498189
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004981AC SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_004981AC

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Section loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 281E008 Jump to behavior
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004AB106 LogonUserW, 0_2_004AB106
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_00473D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW, 0_2_00473D19
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004B411C SendInput,keybd_event, 0_2_004B411C
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004B74E7 mouse_event, 0_2_004B74E7
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Process created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe" Jump to behavior
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004AA66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity, 0_2_004AA66C
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004B71FA AllocateAndInitializeSid,CheckTokenMembership,FreeSid, 0_2_004B71FA
Source: RFQ 3100185 MAHAD.exe Binary or memory string: Shell_TrayWnd
Source: RFQ 3100185 MAHAD.exe Binary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndTHISREMOVEblankinfoquestionstopwarning
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004965C4 cpuid 0_2_004965C4
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004C091D GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,__wsplitpath,_wcscat,_wcscat,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,_wcscpy,SetCurrentDirectoryW, 0_2_004C091D
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004EB340 GetUserNameW, 0_2_004EB340
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004A1E8E __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte, 0_2_004A1E8E
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_0048DDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo, 0_2_0048DDC0

Stealing of Sensitive Information

barindex
Source: Yara match File source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000001.00000002.1936259878.0000000003160000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1935867535.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: RFQ 3100185 MAHAD.exe Binary or memory string: WIN_81
Source: RFQ 3100185 MAHAD.exe Binary or memory string: WIN_XP
Source: RFQ 3100185 MAHAD.exe Binary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 12, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubytep
Source: RFQ 3100185 MAHAD.exe Binary or memory string: WIN_XPe
Source: RFQ 3100185 MAHAD.exe Binary or memory string: WIN_VISTA
Source: RFQ 3100185 MAHAD.exe Binary or memory string: WIN_7
Source: RFQ 3100185 MAHAD.exe Binary or memory string: WIN_8

Remote Access Functionality

barindex
Source: Yara match File source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000001.00000002.1936259878.0000000003160000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1935867535.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004C8C4F socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket, 0_2_004C8C4F
Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe Code function: 0_2_004C923B socket,WSAGetLastError,bind,WSAGetLastError,closesocket, 0_2_004C923B
No contacted IP infos