Windows Analysis Report
Certificate 1045-20-11.exe

Overview

General Information

Sample name: Certificate 1045-20-11.exe
Analysis ID: 1560129
MD5: 374bfa99caf54477156253c18125cdc8
SHA1: b252c1316f4d9b91e79f64c51365cf65981f64d1
SHA256: f605d6db615c055fc80141bf79ab3f541303cf082244b352352bbd982a7aca50
Tags: exeuser-cocaman
Infos:

Detection

FormBook
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evaded block containing many API calls
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

AV Detection

barindex
Source: http://www.rssnewscast.com/fo8o/?SHqP-p=x3jV/ECx7FuzXOI+5yB0DB/+zmAHn47HyCIVaqWvGMMqpfz0YC5wLsL1wYxwFH1KuInYTmXKqKNNujOvwtdNuo48jXK1aHHk/BJwdjwjaHe/B0IWhwIR9Wc=&0xilO=7vZpwBG Avira URL Cloud: Label: malware
Source: http://www.goldenjade-travel.com/fo8o/?0xilO=7vZpwBG&SHqP-p=LFKqyrcu7g1NCa8bLlrIs+M38ZMJrQSprIMLtaWgKJ9bBKQr4dsnyMPFpMQjJLGR7ieyxupOSpv1HbfUaMaF2zMIkigvi6pIX6i8MuAeXHNrENDnI2WJi/4= Avira URL Cloud: Label: malware
Source: http://www.goldenjade-travel.com/fo8o/ Avira URL Cloud: Label: malware
Source: http://www.rssnewscast.com/fo8o/ Avira URL Cloud: Label: malware
Source: http://www.elettrosistemista.zip/fo8o/?0xilO=7vZpwBG&SHqP-p=bO1UBvtoHFNUmlWB4HLJpEjmeTUqQxU1qF418M7UHpKKa2cgLZsmM/SsbGGojtls67Xc6OgTo57aJm1+bsxMLzFMa6Onx1WMpNg/TOHpJ+sdeDHYknqJlyE= Avira URL Cloud: Label: malware
Source: http://www.elettrosistemista.zip/fo8o/ Avira URL Cloud: Label: malware
Source: Certificate 1045-20-11.exe ReversingLabs: Detection: 28%
Source: Yara match File source: 1.2.svchost.exe.2520000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.svchost.exe.2520000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000003.00000002.4165331791.0000000002D00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1868757997.0000000002520000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1870531753.0000000002F90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.4165463340.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.4165026551.0000000000750000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.4168934011.0000000004AD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1871626103.0000000003800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.4166827472.0000000002450000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
Source: Submited Sample Integrated Neural Analysis Model: Matched 100.0% probability
Source: Certificate 1045-20-11.exe Joe Sandbox ML: detected
Source: Certificate 1045-20-11.exe Static PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: FGcoivYXQsEMNANuoDkk.exe, 00000002.00000002.4165025398.000000000017E000.00000002.00000001.01000000.00000004.sdmp, FGcoivYXQsEMNANuoDkk.exe, 00000007.00000002.4165156204.000000000017E000.00000002.00000001.01000000.00000004.sdmp
Source: Binary string: wntdll.pdbUGP source: Certificate 1045-20-11.exe, 00000000.00000003.1715042860.0000000003430000.00000004.00001000.00020000.00000000.sdmp, Certificate 1045-20-11.exe, 00000000.00000003.1719350842.0000000003620000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1871034857.0000000003100000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1778975404.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1871034857.000000000329E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1780442944.0000000002F00000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000003.00000003.1871465604.000000000312E000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000003.00000002.4167728564.000000000347E000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000003.00000002.4167728564.00000000032E0000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000003.00000003.1868746207.0000000002F34000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: wntdll.pdb source: Certificate 1045-20-11.exe, 00000000.00000003.1715042860.0000000003430000.00000004.00001000.00020000.00000000.sdmp, Certificate 1045-20-11.exe, 00000000.00000003.1719350842.0000000003620000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000002.1871034857.0000000003100000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1778975404.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1871034857.000000000329E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1780442944.0000000002F00000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, netbtugc.exe, 00000003.00000003.1871465604.000000000312E000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000003.00000002.4167728564.000000000347E000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000003.00000002.4167728564.00000000032E0000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000003.00000003.1868746207.0000000002F34000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: netbtugc.pdb source: svchost.exe, 00000001.00000002.1869223621.0000000002A00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1837507725.0000000002A1A000.00000004.00000020.00020000.00000000.sdmp, FGcoivYXQsEMNANuoDkk.exe, 00000002.00000002.4165898672.00000000008D8000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: svchost.pdb source: netbtugc.exe, 00000003.00000002.4168533677.000000000390C000.00000004.10000000.00040000.00000000.sdmp, netbtugc.exe, 00000003.00000002.4165640004.0000000002E3E000.00000004.00000020.00020000.00000000.sdmp, FGcoivYXQsEMNANuoDkk.exe, 00000007.00000002.4167257692.000000000269C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2165142022.00000000051EC000.00000004.80000000.00040000.00000000.sdmp
Source: Binary string: svchost.pdbUGP source: netbtugc.exe, 00000003.00000002.4168533677.000000000390C000.00000004.10000000.00040000.00000000.sdmp, netbtugc.exe, 00000003.00000002.4165640004.0000000002E3E000.00000004.00000020.00020000.00000000.sdmp, FGcoivYXQsEMNANuoDkk.exe, 00000007.00000002.4167257692.000000000269C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2165142022.00000000051EC000.00000004.80000000.00040000.00000000.sdmp
Source: Binary string: netbtugc.pdbGCTL source: svchost.exe, 00000001.00000002.1869223621.0000000002A00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1837507725.0000000002A1A000.00000004.00000020.00020000.00000000.sdmp, FGcoivYXQsEMNANuoDkk.exe, 00000002.00000002.4165898672.00000000008D8000.00000004.00000020.00020000.00000000.sdmp
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00886CA9 GetFileAttributesW,FindFirstFileW,FindClose, 0_2_00886CA9
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_008860DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose, 0_2_008860DD
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_008863F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose, 0_2_008863F9
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0088EB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, 0_2_0088EB60
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0088F5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, 0_2_0088F5FA
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0088F56F FindFirstFileW,FindClose, 0_2_0088F56F
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00891B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 0_2_00891B2F
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00891C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 0_2_00891C8A
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00891F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, 0_2_00891F94
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0076BAB0 FindFirstFileW,FindNextFileW,FindClose, 3_2_0076BAB0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 4x nop then xor eax, eax 3_2_00759480
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 4x nop then pop edi 3_2_0075DD45
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 4x nop then mov ebx, 00000004h 3_2_02FD053E

Networking

barindex
Source: Network traffic Suricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49736 -> 154.215.72.110:80
Source: Network traffic Suricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49762 -> 116.50.37.244:80
Source: Network traffic Suricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49816 -> 85.159.66.93:80
Source: Network traffic Suricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49983 -> 91.195.240.94:80
Source: Network traffic Suricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:50026 -> 217.196.55.202:80
Source: Network traffic Suricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:50022 -> 195.110.124.133:80
Source: Network traffic Suricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:50018 -> 66.29.149.46:80
Source: DNS query: www.joyesi.xyz
Source: Joe Sandbox View IP Address: 91.195.240.94 91.195.240.94
Source: Joe Sandbox View IP Address: 154.215.72.110 154.215.72.110
Source: Joe Sandbox View IP Address: 195.110.124.133 195.110.124.133
Source: Joe Sandbox View ASN Name: REGISTER-ASIT REGISTER-ASIT
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00894EB5 InternetReadFile,InternetQueryDataAvailable,InternetReadFile, 0_2_00894EB5
Source: global traffic HTTP traffic detected: GET /fo8o/?0xilO=7vZpwBG&SHqP-p=IhZyPQIGe6uK3zPwzgZotr9BPg6ZX3xlW2eS79Xk6ut4afzj0LiRBEeFtQixSzG192fRs1GD25A478p7nOOn1bCAV966J7ZkoXS5ptBuz2edhBZoh3xN24c= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.3xfootball.comConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
Source: global traffic HTTP traffic detected: GET /fo8o/?0xilO=7vZpwBG&SHqP-p=LFKqyrcu7g1NCa8bLlrIs+M38ZMJrQSprIMLtaWgKJ9bBKQr4dsnyMPFpMQjJLGR7ieyxupOSpv1HbfUaMaF2zMIkigvi6pIX6i8MuAeXHNrENDnI2WJi/4= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.goldenjade-travel.comConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
Source: global traffic HTTP traffic detected: GET /fo8o/?0xilO=7vZpwBG&SHqP-p=qL3nKp+YSjoaTomnOzyxpXPFUBhLgkHGMW8DXsDTZ4AADrD7Wpn1i04piMS1+AOWgCBMohpgbh6Cuut9PSzjKFgJSPFkq5dbaCOx4WcoETVBbNsEZyvIPzk= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.magmadokum.comConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
Source: global traffic HTTP traffic detected: GET /fo8o/?SHqP-p=x3jV/ECx7FuzXOI+5yB0DB/+zmAHn47HyCIVaqWvGMMqpfz0YC5wLsL1wYxwFH1KuInYTmXKqKNNujOvwtdNuo48jXK1aHHk/BJwdjwjaHe/B0IWhwIR9Wc=&0xilO=7vZpwBG HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.rssnewscast.comConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
Source: global traffic HTTP traffic detected: GET /fo8o/?SHqP-p=vefd0teQh+kbruh+h6aX8PBfjiL7oFyRDgCUoL90YCYLczV+Hcc/TcCCUPfrz9W5FQiF6ivoXpNecnmrfO5hd7w81ULHWk02cFWPIOqV4u3afmCGnKNzdpU=&0xilO=7vZpwBG HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.techchains.infoConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
Source: global traffic HTTP traffic detected: GET /fo8o/?0xilO=7vZpwBG&SHqP-p=bO1UBvtoHFNUmlWB4HLJpEjmeTUqQxU1qF418M7UHpKKa2cgLZsmM/SsbGGojtls67Xc6OgTo57aJm1+bsxMLzFMa6Onx1WMpNg/TOHpJ+sdeDHYknqJlyE= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.elettrosistemista.zipConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
Source: global traffic HTTP traffic detected: GET /fo8o/?SHqP-p=mxnR+iHPFb8HZiaGfeL/C2cRfJ+ne5kRPLEBGwFodGelSqoCQiBwPqu0WU7djgVoJgj4cKk6Pp6Q/yIaSghKfBV1+IPAGotTT7HDcUO7JjOgJKpj6i9KOMs=&0xilO=7vZpwBG HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.empowermedeco.comConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
Source: global traffic DNS traffic detected: DNS query: www.3xfootball.com
Source: global traffic DNS traffic detected: DNS query: www.kasegitai.tokyo
Source: global traffic DNS traffic detected: DNS query: www.goldenjade-travel.com
Source: global traffic DNS traffic detected: DNS query: www.antonio-vivaldi.mobi
Source: global traffic DNS traffic detected: DNS query: www.magmadokum.com
Source: global traffic DNS traffic detected: DNS query: www.rssnewscast.com
Source: global traffic DNS traffic detected: DNS query: www.liangyuen528.com
Source: global traffic DNS traffic detected: DNS query: www.techchains.info
Source: global traffic DNS traffic detected: DNS query: www.elettrosistemista.zip
Source: global traffic DNS traffic detected: DNS query: www.donnavariedades.com
Source: global traffic DNS traffic detected: DNS query: www.660danm.top
Source: global traffic DNS traffic detected: DNS query: www.empowermedeco.com
Source: global traffic DNS traffic detected: DNS query: www.joyesi.xyz
Source: global traffic DNS traffic detected: DNS query: www.k9vyp11no3.cfd
Source: global traffic DNS traffic detected: DNS query: www.shenzhoucui.com
Source: unknown HTTP traffic detected: POST /fo8o/ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enAccept-Encoding: gzip, deflate, brHost: www.goldenjade-travel.comOrigin: http://www.goldenjade-travel.comCache-Control: no-cacheConnection: closeContent-Type: application/x-www-form-urlencodedContent-Length: 203Referer: http://www.goldenjade-travel.com/fo8o/User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)Data Raw: 53 48 71 50 2d 70 3d 47 48 69 4b 78 65 34 51 36 56 68 4b 4b 65 73 4d 4c 77 6e 74 6b 63 45 31 2b 61 49 63 6f 52 36 64 71 4d 45 4c 35 73 65 2f 4a 2f 34 67 4d 70 64 73 71 50 73 32 2f 73 43 39 6a 37 30 39 63 4b 2f 45 2f 7a 69 79 36 4e 4a 44 48 74 37 63 4b 6f 54 4e 62 4e 2f 53 68 78 59 46 6f 58 49 44 71 59 6f 55 62 37 2b 37 47 5a 56 62 57 32 55 47 43 63 58 30 4a 68 4c 59 6e 5a 50 58 32 76 76 30 79 6f 5a 4c 72 4e 6b 43 44 61 4f 77 5a 50 65 6f 6b 33 6c 4c 70 2b 36 45 49 54 62 77 66 66 66 57 47 32 62 66 4f 64 4c 4e 69 4b 4e 35 6c 6e 6e 59 57 6a 72 30 50 55 51 69 66 77 72 76 4a 78 5a 5a 4d 4e 6d 50 57 67 3d 3d Data Ascii: SHqP-p=GHiKxe4Q6VhKKesMLwntkcE1+aIcoR6dqMEL5se/J/4gMpdsqPs2/sC9j709cK/E/ziy6NJDHt7cKoTNbN/ShxYFoXIDqYoUb7+7GZVbW2UGCcX0JhLYnZPX2vv0yoZLrNkCDaOwZPeok3lLp+6EITbwfffWG2bfOdLNiKN5lnnYWjr0PUQifwrvJxZZMNmPWg==
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Thu, 21 Nov 2024 11:53:31 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=us-asciiServer: Microsoft-HTTPAPI/2.0Date: Thu, 21 Nov 2024 11:53:56 GMTConnection: closeContent-Length: 315Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=us-asciiServer: Microsoft-HTTPAPI/2.0Date: Thu, 21 Nov 2024 11:53:59 GMTConnection: closeContent-Length: 315Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=us-asciiServer: Microsoft-HTTPAPI/2.0Date: Thu, 21 Nov 2024 11:54:04 GMTConnection: closeContent-Length: 315Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 21 Nov 2024 11:55:58 GMTServer: ApacheContent-Length: 493Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 3e 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 64 69 76 3e 0a 3c 61 20 63 6c 61 73 73 3d 22 6d 65 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 73 2f 70 6f 70 75 6c 61 72 2f 3f 67 72 69 64 5f 74 79 70 65 3d 6c 69 73 74 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 3c 2f 61 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 20 2d 2d 3e 0a 20 20 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body><!-- partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a><!-- partial --> </body></html>
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 21 Nov 2024 11:56:01 GMTServer: ApacheContent-Length: 493Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 3e 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 64 69 76 3e 0a 3c 61 20 63 6c 61 73 73 3d 22 6d 65 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 73 2f 70 6f 70 75 6c 61 72 2f 3f 67 72 69 64 5f 74 79 70 65 3d 6c 69 73 74 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 3c 2f 61 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 20 2d 2d 3e 0a 20 20 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body><!-- partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a><!-- partial --> </body></html>
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 21 Nov 2024 11:56:03 GMTServer: ApacheContent-Length: 493Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 3e 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 64 69 76 3e 0a 3c 61 20 63 6c 61 73 73 3d 22 6d 65 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 73 2f 70 6f 70 75 6c 61 72 2f 3f 67 72 69 64 5f 74 79 70 65 3d 6c 69 73 74 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 3c 2f 61 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 20 2d 2d 3e 0a 20 20 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body><!-- partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a><!-- partial --> </body></html>
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 21 Nov 2024 11:56:06 GMTServer: ApacheContent-Length: 493Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 3e 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 64 69 76 3e 0a 3c 61 20 63 6c 61 73 73 3d 22 6d 65 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 73 2f 70 6f 70 75 6c 61 72 2f 3f 67 72 69 64 5f 74 79 70 65 3d 6c 69 73 74 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 3c 2f 61 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 20 2d 2d 3e 0a 20 20 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body><!-- partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a><!-- partial --> </body></html>
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 21 Nov 2024 11:56:13 GMTServer: ApacheContent-Length: 203Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 66 6f 38 6f 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /fo8o/ was not found on this server.</p></body></html>
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 21 Nov 2024 11:56:15 GMTServer: ApacheContent-Length: 203Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 66 6f 38 6f 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /fo8o/ was not found on this server.</p></body></html>
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 21 Nov 2024 11:56:18 GMTServer: ApacheContent-Length: 203Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 66 6f 38 6f 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /fo8o/ was not found on this server.</p></body></html>
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 21 Nov 2024 11:56:21 GMTServer: ApacheContent-Length: 203Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 66 6f 38 6f 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /fo8o/ was not found on this server.</p></body></html>
Source: FGcoivYXQsEMNANuoDkk.exe, 00000007.00000002.4168934011.0000000004B2D000.00000040.80000000.00040000.00000000.sdmp String found in binary or memory: http://www.empowermedeco.com
Source: FGcoivYXQsEMNANuoDkk.exe, 00000007.00000002.4168934011.0000000004B2D000.00000040.80000000.00040000.00000000.sdmp String found in binary or memory: http://www.empowermedeco.com/fo8o/
Source: netbtugc.exe, 00000003.00000003.2061534883.0000000007ACD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ac.ecosia.org/autocomplete?q=
Source: netbtugc.exe, 00000003.00000003.2061534883.0000000007ACD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
Source: netbtugc.exe, 00000003.00000003.2061534883.0000000007ACD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
Source: netbtugc.exe, 00000003.00000003.2061534883.0000000007ACD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
Source: netbtugc.exe, 00000003.00000002.4168533677.00000000047F2000.00000004.10000000.00040000.00000000.sdmp, FGcoivYXQsEMNANuoDkk.exe, 00000007.00000002.4167257692.0000000003582000.00000004.00000001.00040000.00000000.sdmp String found in binary or memory: https://codepen.io/uzcho_/pen/eYdmdXw.css
Source: netbtugc.exe, 00000003.00000002.4168533677.00000000047F2000.00000004.10000000.00040000.00000000.sdmp, FGcoivYXQsEMNANuoDkk.exe, 00000007.00000002.4167257692.0000000003582000.00000004.00000001.00040000.00000000.sdmp String found in binary or memory: https://codepen.io/uzcho_/pens/popular/?grid_type=list
Source: netbtugc.exe, 00000003.00000003.2061534883.0000000007ACD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/ac/?q=
Source: netbtugc.exe, 00000003.00000003.2061534883.0000000007ACD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/chrome_newtab
Source: netbtugc.exe, 00000003.00000003.2061534883.0000000007ACD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
Source: netbtugc.exe, 00000003.00000002.4165640004.0000000002E87000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000003.00000002.4165640004.0000000002E5B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
Source: netbtugc.exe, 00000003.00000002.4165640004.0000000002E87000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
Source: netbtugc.exe, 00000003.00000002.4165640004.0000000002E5B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
Source: netbtugc.exe, 00000003.00000002.4165640004.0000000002E87000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033LMEM
Source: netbtugc.exe, 00000003.00000002.4165640004.0000000002E5B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
Source: netbtugc.exe, 00000003.00000002.4165640004.0000000002E87000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
Source: netbtugc.exe, 00000003.00000002.4165640004.0000000002E5B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
Source: netbtugc.exe, 00000003.00000003.2055053349.0000000007AAE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
Source: netbtugc.exe, 00000003.00000003.2061534883.0000000007ACD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.ecosia.org/newtab/
Source: netbtugc.exe, 00000003.00000002.4168533677.0000000004E3A000.00000004.10000000.00040000.00000000.sdmp, FGcoivYXQsEMNANuoDkk.exe, 00000007.00000002.4167257692.0000000003BCA000.00000004.00000001.00040000.00000000.sdmp String found in binary or memory: https://www.empowermedeco.com/fo8o/?SHqP-p=mxnR
Source: netbtugc.exe, 00000003.00000003.2061534883.0000000007ACD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
Source: netbtugc.exe, 00000003.00000002.4168533677.00000000044CE000.00000004.10000000.00040000.00000000.sdmp, netbtugc.exe, 00000003.00000002.4170196597.0000000006210000.00000004.00000800.00020000.00000000.sdmp, FGcoivYXQsEMNANuoDkk.exe, 00000007.00000002.4167257692.000000000325E000.00000004.00000001.00040000.00000000.sdmp String found in binary or memory: https://www.name.com/domain/renew/rssnewscast.com?utm_source=Sedo_parked_page&utm_medium=button&utm_
Source: FGcoivYXQsEMNANuoDkk.exe, 00000007.00000002.4167257692.000000000325E000.00000004.00000001.00040000.00000000.sdmp String found in binary or memory: https://www.sedo.com/services/parking.php3
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00896B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard, 0_2_00896B0C
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00896D07 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard, 0_2_00896D07
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00896B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard, 0_2_00896B0C
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00882B37 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState, 0_2_00882B37
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_008AF7FF DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, 0_2_008AF7FF

E-Banking Fraud

barindex
Source: Yara match File source: 1.2.svchost.exe.2520000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.svchost.exe.2520000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000003.00000002.4165331791.0000000002D00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1868757997.0000000002520000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1870531753.0000000002F90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.4165463340.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.4165026551.0000000000750000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.4168934011.0000000004AD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1871626103.0000000003800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.4166827472.0000000002450000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY

System Summary

barindex
Source: 1.2.svchost.exe.2520000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: 1.2.svchost.exe.2520000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: 00000003.00000002.4165331791.0000000002D00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: 00000001.00000002.1868757997.0000000002520000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: 00000001.00000002.1870531753.0000000002F90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: 00000003.00000002.4165463340.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: 00000003.00000002.4165026551.0000000000750000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: 00000007.00000002.4168934011.0000000004AD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: 00000001.00000002.1871626103.0000000003800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: 00000002.00000002.4166827472.0000000002450000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: This is a third-party compiled AutoIt script. 0_2_00843D19
Source: Certificate 1045-20-11.exe String found in binary or memory: This is a third-party compiled AutoIt script.
Source: Certificate 1045-20-11.exe, 00000000.00000000.1695638056.00000000008EE000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: This is a third-party compiled AutoIt script. memstr_0f78d20b-c
Source: Certificate 1045-20-11.exe, 00000000.00000000.1695638056.00000000008EE000.00000002.00000001.01000000.00000003.sdmp String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer memstr_914c5d2e-2
Source: Certificate 1045-20-11.exe String found in binary or memory: This is a third-party compiled AutoIt script. memstr_fbb73f25-5
Source: Certificate 1045-20-11.exe String found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer memstr_538fefa8-a
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0254B363 NtClose, 1_2_0254B363
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_02521D09 NtProtectVirtualMemory, 1_2_02521D09
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031735C0 NtCreateMutant,LdrInitializeThunk, 1_2_031735C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172B60 NtClose,LdrInitializeThunk, 1_2_03172B60
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172DF0 NtQuerySystemInformation,LdrInitializeThunk, 1_2_03172DF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172C70 NtFreeVirtualMemory,LdrInitializeThunk, 1_2_03172C70
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03174340 NtSetContextThread, 1_2_03174340
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03173010 NtOpenDirectoryObject, 1_2_03173010
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03173090 NtSetValueKey, 1_2_03173090
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03174650 NtSuspendThread, 1_2_03174650
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172B80 NtQueryInformationFile, 1_2_03172B80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172BA0 NtEnumerateValueKey, 1_2_03172BA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172BF0 NtAllocateVirtualMemory, 1_2_03172BF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172BE0 NtQueryValueKey, 1_2_03172BE0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172AB0 NtWaitForSingleObject, 1_2_03172AB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172AD0 NtReadFile, 1_2_03172AD0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172AF0 NtWriteFile, 1_2_03172AF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031739B0 NtGetContextThread, 1_2_031739B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172F30 NtCreateSection, 1_2_03172F30
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172F60 NtCreateProcessEx, 1_2_03172F60
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172F90 NtProtectVirtualMemory, 1_2_03172F90
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172FB0 NtResumeThread, 1_2_03172FB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172FA0 NtQuerySection, 1_2_03172FA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172FE0 NtCreateFile, 1_2_03172FE0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172E30 NtWriteVirtualMemory, 1_2_03172E30
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172E80 NtReadVirtualMemory, 1_2_03172E80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172EA0 NtAdjustPrivilegesToken, 1_2_03172EA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172EE0 NtQueueApcThread, 1_2_03172EE0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172D10 NtMapViewOfSection, 1_2_03172D10
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03173D10 NtOpenProcessToken, 1_2_03173D10
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172D00 NtSetInformationFile, 1_2_03172D00
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172D30 NtUnmapViewOfSection, 1_2_03172D30
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03173D70 NtOpenThread, 1_2_03173D70
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172DB0 NtEnumerateKey, 1_2_03172DB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172DD0 NtDelayExecution, 1_2_03172DD0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172C00 NtQueryInformationProcess, 1_2_03172C00
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172C60 NtCreateKey, 1_2_03172C60
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172CA0 NtQueryInformationToken, 1_2_03172CA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172CC0 NtQueryVirtualMemory, 1_2_03172CC0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172CF0 NtOpenProcess, 1_2_03172CF0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03354340 NtSetContextThread,LdrInitializeThunk, 3_2_03354340
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03354650 NtSuspendThread,LdrInitializeThunk, 3_2_03354650
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03352B60 NtClose,LdrInitializeThunk, 3_2_03352B60
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03352BA0 NtEnumerateValueKey,LdrInitializeThunk, 3_2_03352BA0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03352BF0 NtAllocateVirtualMemory,LdrInitializeThunk, 3_2_03352BF0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03352BE0 NtQueryValueKey,LdrInitializeThunk, 3_2_03352BE0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03352AF0 NtWriteFile,LdrInitializeThunk, 3_2_03352AF0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03352AD0 NtReadFile,LdrInitializeThunk, 3_2_03352AD0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03352F30 NtCreateSection,LdrInitializeThunk, 3_2_03352F30
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03352FB0 NtResumeThread,LdrInitializeThunk, 3_2_03352FB0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03352FE0 NtCreateFile,LdrInitializeThunk, 3_2_03352FE0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03352E80 NtReadVirtualMemory,LdrInitializeThunk, 3_2_03352E80
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03352EE0 NtQueueApcThread,LdrInitializeThunk, 3_2_03352EE0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03352D30 NtUnmapViewOfSection,LdrInitializeThunk, 3_2_03352D30
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03352D10 NtMapViewOfSection,LdrInitializeThunk, 3_2_03352D10
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03352DF0 NtQuerySystemInformation,LdrInitializeThunk, 3_2_03352DF0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03352DD0 NtDelayExecution,LdrInitializeThunk, 3_2_03352DD0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03352C70 NtFreeVirtualMemory,LdrInitializeThunk, 3_2_03352C70
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03352C60 NtCreateKey,LdrInitializeThunk, 3_2_03352C60
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03352CA0 NtQueryInformationToken,LdrInitializeThunk, 3_2_03352CA0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033535C0 NtCreateMutant,LdrInitializeThunk, 3_2_033535C0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033539B0 NtGetContextThread,LdrInitializeThunk, 3_2_033539B0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03352B80 NtQueryInformationFile, 3_2_03352B80
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03352AB0 NtWaitForSingleObject, 3_2_03352AB0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03352F60 NtCreateProcessEx, 3_2_03352F60
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03352FA0 NtQuerySection, 3_2_03352FA0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03352F90 NtProtectVirtualMemory, 3_2_03352F90
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03352E30 NtWriteVirtualMemory, 3_2_03352E30
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03352EA0 NtAdjustPrivilegesToken, 3_2_03352EA0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03352D00 NtSetInformationFile, 3_2_03352D00
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03352DB0 NtEnumerateKey, 3_2_03352DB0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03352C00 NtQueryInformationProcess, 3_2_03352C00
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03352CF0 NtOpenProcess, 3_2_03352CF0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03352CC0 NtQueryVirtualMemory, 3_2_03352CC0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03353010 NtOpenDirectoryObject, 3_2_03353010
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03353090 NtSetValueKey, 3_2_03353090
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03353D10 NtOpenProcessToken, 3_2_03353D10
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03353D70 NtOpenThread, 3_2_03353D70
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_00777920 NtCreateFile, 3_2_00777920
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_00777A70 NtReadFile, 3_2_00777A70
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_00777B50 NtDeleteFile, 3_2_00777B50
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_00777BE0 NtClose, 3_2_00777BE0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_00777D30 NtAllocateVirtualMemory, 3_2_00777D30
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00886685: CreateFileW,DeviceIoControl,CloseHandle, 0_2_00886685
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0087ACC5 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock, 0_2_0087ACC5
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_008879D3 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState, 0_2_008879D3
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0086B043 0_2_0086B043
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00853200 0_2_00853200
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00853B70 0_2_00853B70
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0087410F 0_2_0087410F
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_008602A4 0_2_008602A4
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0087038E 0_2_0087038E
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0084E3B0 0_2_0084E3B0
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_008606D9 0_2_008606D9
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0087467F 0_2_0087467F
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_008AAACE 0_2_008AAACE
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00874BEF 0_2_00874BEF
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0086CCC1 0_2_0086CCC1
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00846F07 0_2_00846F07
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0084AF50 0_2_0084AF50
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_008A31BC 0_2_008A31BC
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0086D1B9 0_2_0086D1B9
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0085B11F 0_2_0085B11F
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0086123A 0_2_0086123A
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0087724D 0_2_0087724D
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_008813CA 0_2_008813CA
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_008493F0 0_2_008493F0
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0085F563 0_2_0085F563
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_008496C0 0_2_008496C0
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0088B6CC 0_2_0088B6CC
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_008477B0 0_2_008477B0
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_008AF7FF 0_2_008AF7FF
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_008779C9 0_2_008779C9
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0085FA57 0_2_0085FA57
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00849B60 0_2_00849B60
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00847D19 0_2_00847D19
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00869ED0 0_2_00869ED0
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0085FE6F 0_2_0085FE6F
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00847FA3 0_2_00847FA3
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00EB1188 0_2_00EB1188
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_02521290 1_2_02521290
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_02536873 1_2_02536873
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_02536871 1_2_02536871
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_025228A0 1_2_025228A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_02530173 1_2_02530173
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_02521110 1_2_02521110
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0252E1F3 1_2_0252E1F3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_02522698 1_2_02522698
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0252268A 1_2_0252268A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_025226A0 1_2_025226A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0252FF53 1_2_0252FF53
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0254D753 1_2_0254D753
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0252FF4A 1_2_0252FF4A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_02523500 1_2_02523500
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031F132D 1_2_031F132D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031FA352 1_2_031FA352
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312D34C 1_2_0312D34C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0318739A 1_2_0318739A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_032003E6 1_2_032003E6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0314E3F0 1_2_0314E3F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E0274 1_2_031E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031452A0 1_2_031452A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0315B2C0 1_2_0315B2C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031C02C0 1_2_031C02C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0315D2F0 1_2_0315D2F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E12ED 1_2_031E12ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031DA118 1_2_031DA118
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03130100 1_2_03130100
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031C8158 1_2_031C8158
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0320B16B 1_2_0320B16B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F172 1_2_0312F172
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0317516C 1_2_0317516C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_032001AA 1_2_032001AA
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0314B1B0 1_2_0314B1B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031F81CC 1_2_031F81CC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031EF0CC 1_2_031EF0CC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031470C0 1_2_031470C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031F70E9 1_2_031F70E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031FF0E0 1_2_031FF0E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03164750 1_2_03164750
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03140770 1_2_03140770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031FF7B0 1_2_031FF7B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0313C7C0 1_2_0313C7C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031F16CC 1_2_031F16CC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0315C6E0 1_2_0315C6E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03140535 1_2_03140535
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031F7571 1_2_031F7571
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031DD5B0 1_2_031DD5B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03200591 1_2_03200591
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031FF43F 1_2_031FF43F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031F2446 1_2_031F2446
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03131460 1_2_03131460
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031EE4F6 1_2_031EE4F6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031FAB40 1_2_031FAB40
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031FFB76 1_2_031FFB76
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0315FB80 1_2_0315FB80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031F6BD7 1_2_031F6BD7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B5BF0 1_2_031B5BF0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0317DBF9 1_2_0317DBF9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031FFA49 1_2_031FFA49
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031F7A46 1_2_031F7A46
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B3A6C 1_2_031B3A6C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0313EA80 1_2_0313EA80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031DDAAC 1_2_031DDAAC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03185AA0 1_2_03185AA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031EDAC6 1_2_031EDAC6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03149950 1_2_03149950
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0315B950 1_2_0315B950
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03156962 1_2_03156962
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0320A9A6 1_2_0320A9A6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031429A0 1_2_031429A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031AD800 1_2_031AD800
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03142840 1_2_03142840
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0314A840 1_2_0314A840
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031268B8 1_2_031268B8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0316E8F0 1_2_0316E8F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031438E0 1_2_031438E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031FFF09 1_2_031FFF09
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03160F30 1_2_03160F30
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03182F28 1_2_03182F28
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B4F40 1_2_031B4F40
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03141F92 1_2_03141F92
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031FFFB1 1_2_031FFFB1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031BEFA0 1_2_031BEFA0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03132FC8 1_2_03132FC8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031FEE26 1_2_031FEE26
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03140E59 1_2_03140E59
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03152E90 1_2_03152E90
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031FCE93 1_2_031FCE93
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03149EB0 1_2_03149EB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031FEEDB 1_2_031FEEDB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0314AD00 1_2_0314AD00
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031F1D5A 1_2_031F1D5A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03143D40 1_2_03143D40
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031F7D73 1_2_031F7D73
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03158DBF 1_2_03158DBF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0315FDC0 1_2_0315FDC0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0313ADE0 1_2_0313ADE0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03140C00 1_2_03140C00
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B9C32 1_2_031B9C32
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E0CB5 1_2_031E0CB5
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03130CF2 1_2_03130CF2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031FFCF2 1_2_031FFCF2
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033DA352 3_2_033DA352
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0332E3F0 3_2_0332E3F0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033E03E6 3_2_033E03E6
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033C0274 3_2_033C0274
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033A02C0 3_2_033A02C0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033BA118 3_2_033BA118
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03310100 3_2_03310100
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033A8158 3_2_033A8158
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033E01AA 3_2_033E01AA
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033D41A2 3_2_033D41A2
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033D81CC 3_2_033D81CC
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033B2000 3_2_033B2000
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03320770 3_2_03320770
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03344750 3_2_03344750
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0331C7C0 3_2_0331C7C0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0333C6E0 3_2_0333C6E0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03320535 3_2_03320535
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033E0591 3_2_033E0591
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033C4420 3_2_033C4420
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033D2446 3_2_033D2446
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033CE4F6 3_2_033CE4F6
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033DAB40 3_2_033DAB40
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033D6BD7 3_2_033D6BD7
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0331EA80 3_2_0331EA80
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03336962 3_2_03336962
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033229A0 3_2_033229A0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033EA9A6 3_2_033EA9A6
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03322840 3_2_03322840
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0332A840 3_2_0332A840
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033068B8 3_2_033068B8
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0334E8F0 3_2_0334E8F0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03340F30 3_2_03340F30
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033C2F30 3_2_033C2F30
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03362F28 3_2_03362F28
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03394F40 3_2_03394F40
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0339EFA0 3_2_0339EFA0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03312FC8 3_2_03312FC8
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033DEE26 3_2_033DEE26
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03320E59 3_2_03320E59
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03332E90 3_2_03332E90
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033DCE93 3_2_033DCE93
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033DEEDB 3_2_033DEEDB
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033BCD1F 3_2_033BCD1F
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0332AD00 3_2_0332AD00
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03338DBF 3_2_03338DBF
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0331ADE0 3_2_0331ADE0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03320C00 3_2_03320C00
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033C0CB5 3_2_033C0CB5
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03310CF2 3_2_03310CF2
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033D132D 3_2_033D132D
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0330D34C 3_2_0330D34C
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0336739A 3_2_0336739A
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033252A0 3_2_033252A0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0333D2F0 3_2_0333D2F0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033C12ED 3_2_033C12ED
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0333B2C0 3_2_0333B2C0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0330F172 3_2_0330F172
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033EB16B 3_2_033EB16B
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0335516C 3_2_0335516C
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0332B1B0 3_2_0332B1B0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033D70E9 3_2_033D70E9
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033DF0E0 3_2_033DF0E0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033CF0CC 3_2_033CF0CC
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033270C0 3_2_033270C0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033DF7B0 3_2_033DF7B0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03365630 3_2_03365630
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033D16CC 3_2_033D16CC
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033D7571 3_2_033D7571
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033BD5B0 3_2_033BD5B0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033E95C3 3_2_033E95C3
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033DF43F 3_2_033DF43F
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03311460 3_2_03311460
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033DFB76 3_2_033DFB76
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0333FB80 3_2_0333FB80
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03395BF0 3_2_03395BF0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0335DBF9 3_2_0335DBF9
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03393A6C 3_2_03393A6C
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033DFA49 3_2_033DFA49
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033D7A46 3_2_033D7A46
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03365AA0 3_2_03365AA0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033BDAAC 3_2_033BDAAC
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033C1AA3 3_2_033C1AA3
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033CDAC6 3_2_033CDAC6
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033B5910 3_2_033B5910
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03329950 3_2_03329950
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0333B950 3_2_0333B950
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0338D800 3_2_0338D800
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033238E0 3_2_033238E0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033DFF09 3_2_033DFF09
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033DFFB1 3_2_033DFFB1
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03321F92 3_2_03321F92
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_032E3FD5 3_2_032E3FD5
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_032E3FD2 3_2_032E3FD2
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03329EB0 3_2_03329EB0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033D7D73 3_2_033D7D73
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033D1D5A 3_2_033D1D5A
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03323D40 3_2_03323D40
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0333FDC0 3_2_0333FDC0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_03399C32 3_2_03399C32
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033DFCF2 3_2_033DFCF2
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_007615E0 3_2_007615E0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0075C7D0 3_2_0075C7D0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0075C7C7 3_2_0075C7C7
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0075C9F0 3_2_0075C9F0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0075AA70 3_2_0075AA70
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_007630F0 3_2_007630F0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_007630EE 3_2_007630EE
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_00779FD0 3_2_00779FD0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_02FDA0AF 3_2_02FDA0AF
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_02FDB8B4 3_2_02FDB8B4
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_02FDB9D6 3_2_02FDB9D6
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_02FDADD8 3_2_02FDADD8
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_02FDBD6C 3_2_02FDBD6C
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: String function: 0085EC2F appears 68 times
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: String function: 0086F8A0 appears 35 times
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: String function: 00866AC0 appears 42 times
Source: C:\Windows\SysWOW64\svchost.exe Code function: String function: 03187E54 appears 93 times
Source: C:\Windows\SysWOW64\svchost.exe Code function: String function: 0312B970 appears 250 times
Source: C:\Windows\SysWOW64\svchost.exe Code function: String function: 03175130 appears 36 times
Source: C:\Windows\SysWOW64\svchost.exe Code function: String function: 031BF290 appears 103 times
Source: C:\Windows\SysWOW64\svchost.exe Code function: String function: 031AEA12 appears 86 times
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: String function: 0330B970 appears 262 times
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: String function: 0338EA12 appears 85 times
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: String function: 03355130 appears 58 times
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: String function: 03367E54 appears 107 times
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: String function: 0339F290 appears 103 times
Source: Certificate 1045-20-11.exe, 00000000.00000003.1714213013.0000000003553000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenamentdll.dllj% vs Certificate 1045-20-11.exe
Source: Certificate 1045-20-11.exe, 00000000.00000003.1714425888.00000000036FD000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenamentdll.dllj% vs Certificate 1045-20-11.exe
Source: Certificate 1045-20-11.exe Static PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: 1.2.svchost.exe.2520000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: 1.2.svchost.exe.2520000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: 00000003.00000002.4165331791.0000000002D00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: 00000001.00000002.1868757997.0000000002520000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: 00000001.00000002.1870531753.0000000002F90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: 00000003.00000002.4165463340.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: 00000003.00000002.4165026551.0000000000750000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: 00000007.00000002.4168934011.0000000004AD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: 00000001.00000002.1871626103.0000000003800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: 00000002.00000002.4166827472.0000000002450000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
Source: classification engine Classification label: mal100.troj.spyw.evad.winEXE@7/3@16/7
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0088CE7A GetLastError,FormatMessageW, 0_2_0088CE7A
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0087AB84 AdjustTokenPrivileges,CloseHandle, 0_2_0087AB84
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0087B134 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError, 0_2_0087B134
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0088E1FD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode, 0_2_0088E1FD
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00886532 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,__wsplitpath,_wcscat,CloseHandle, 0_2_00886532
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0089C18C CoInitializeSecurity,_memset,_memset,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket, 0_2_0089C18C
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0084406B CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource, 0_2_0084406B
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe File created: C:\Users\user\AppData\Local\Temp\aut5DA7.tmp Jump to behavior
Source: Certificate 1045-20-11.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Program Files\Mozilla Firefox\firefox.exe File read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini Jump to behavior
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: netbtugc.exe, 00000003.00000002.4165640004.0000000002EC1000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000003.00000003.2055763353.0000000002EC1000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
Source: Certificate 1045-20-11.exe ReversingLabs: Detection: 28%
Source: unknown Process created: C:\Users\user\Desktop\Certificate 1045-20-11.exe "C:\Users\user\Desktop\Certificate 1045-20-11.exe"
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Process created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Certificate 1045-20-11.exe"
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe Process created: C:\Windows\SysWOW64\netbtugc.exe "C:\Windows\SysWOW64\netbtugc.exe"
Source: C:\Windows\SysWOW64\netbtugc.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Process created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Certificate 1045-20-11.exe" Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe Process created: C:\Windows\SysWOW64\netbtugc.exe "C:\Windows\SysWOW64\netbtugc.exe" Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe" Jump to behavior
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Section loaded: wsock32.dll Jump to behavior
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Section loaded: ieframe.dll Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Section loaded: netapi32.dll Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Section loaded: version.dll Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Section loaded: wkscli.dll Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Section loaded: secur32.dll Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Section loaded: mlang.dll Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Section loaded: winsqlite3.dll Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Section loaded: vaultcli.dll Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32 Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Key opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\ Jump to behavior
Source: Certificate 1045-20-11.exe Static file information: File size 1196032 > 1048576
Source: Certificate 1045-20-11.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: Certificate 1045-20-11.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: Certificate 1045-20-11.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: Certificate 1045-20-11.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Certificate 1045-20-11.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: Certificate 1045-20-11.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: Certificate 1045-20-11.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: FGcoivYXQsEMNANuoDkk.exe, 00000002.00000002.4165025398.000000000017E000.00000002.00000001.01000000.00000004.sdmp, FGcoivYXQsEMNANuoDkk.exe, 00000007.00000002.4165156204.000000000017E000.00000002.00000001.01000000.00000004.sdmp
Source: Binary string: wntdll.pdbUGP source: Certificate 1045-20-11.exe, 00000000.00000003.1715042860.0000000003430000.00000004.00001000.00020000.00000000.sdmp, Certificate 1045-20-11.exe, 00000000.00000003.1719350842.0000000003620000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1871034857.0000000003100000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1778975404.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1871034857.000000000329E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1780442944.0000000002F00000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000003.00000003.1871465604.000000000312E000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000003.00000002.4167728564.000000000347E000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000003.00000002.4167728564.00000000032E0000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000003.00000003.1868746207.0000000002F34000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: wntdll.pdb source: Certificate 1045-20-11.exe, 00000000.00000003.1715042860.0000000003430000.00000004.00001000.00020000.00000000.sdmp, Certificate 1045-20-11.exe, 00000000.00000003.1719350842.0000000003620000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000002.1871034857.0000000003100000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1778975404.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1871034857.000000000329E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1780442944.0000000002F00000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, netbtugc.exe, 00000003.00000003.1871465604.000000000312E000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000003.00000002.4167728564.000000000347E000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000003.00000002.4167728564.00000000032E0000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000003.00000003.1868746207.0000000002F34000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: netbtugc.pdb source: svchost.exe, 00000001.00000002.1869223621.0000000002A00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1837507725.0000000002A1A000.00000004.00000020.00020000.00000000.sdmp, FGcoivYXQsEMNANuoDkk.exe, 00000002.00000002.4165898672.00000000008D8000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: svchost.pdb source: netbtugc.exe, 00000003.00000002.4168533677.000000000390C000.00000004.10000000.00040000.00000000.sdmp, netbtugc.exe, 00000003.00000002.4165640004.0000000002E3E000.00000004.00000020.00020000.00000000.sdmp, FGcoivYXQsEMNANuoDkk.exe, 00000007.00000002.4167257692.000000000269C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2165142022.00000000051EC000.00000004.80000000.00040000.00000000.sdmp
Source: Binary string: svchost.pdbUGP source: netbtugc.exe, 00000003.00000002.4168533677.000000000390C000.00000004.10000000.00040000.00000000.sdmp, netbtugc.exe, 00000003.00000002.4165640004.0000000002E3E000.00000004.00000020.00020000.00000000.sdmp, FGcoivYXQsEMNANuoDkk.exe, 00000007.00000002.4167257692.000000000269C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2165142022.00000000051EC000.00000004.80000000.00040000.00000000.sdmp
Source: Binary string: netbtugc.pdbGCTL source: svchost.exe, 00000001.00000002.1869223621.0000000002A00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1837507725.0000000002A1A000.00000004.00000020.00020000.00000000.sdmp, FGcoivYXQsEMNANuoDkk.exe, 00000002.00000002.4165898672.00000000008D8000.00000004.00000020.00020000.00000000.sdmp
Source: Certificate 1045-20-11.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: Certificate 1045-20-11.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: Certificate 1045-20-11.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: Certificate 1045-20-11.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: Certificate 1045-20-11.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0085E01E LoadLibraryA,GetProcAddress, 0_2_0085E01E
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0086C09E push esi; ret 0_2_0086C0A0
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0086C187 push edi; ret 0_2_0086C189
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_008AC8BC push esi; ret 0_2_008AC8BE
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00866B05 push ecx; ret 0_2_00866B18
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0088B2B1 push FFFFFF8Bh; iretd 0_2_0088B2B3
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0086BDAA push edi; ret 0_2_0086BDAC
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0086BEC3 push esi; ret 0_2_0086BEC5
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0253E2BA push 00000038h; iretd 1_2_0253E2BE
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_025248A9 push esp; ret 1_2_025248AA
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_025217E5 push ebp; retf 003Fh 1_2_025217E6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_02523780 push eax; ret 1_2_02523782
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_025347A2 push es; iretd 1_2_025347AA
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0253A436 push ebx; iretd 1_2_0253A600
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_02538C92 pushad ; retf 1_2_02538C93
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0253A5D9 push ebx; iretd 1_2_0253A600
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031309AD push ecx; mov dword ptr [esp], ecx 1_2_031309B6
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_032E225F pushad ; ret 3_2_032E27F9
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_032E27FA pushad ; ret 3_2_032E27F9
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_033109AD push ecx; mov dword ptr [esp], ecx 3_2_033109B6
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_032E283D push eax; iretd 3_2_032E2858
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_032E1368 push eax; iretd 3_2_032E1369
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_00770CE1 pushfd ; retf 3_2_00770D0B
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_00762238 pushad ; iretd 3_2_00762239
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0076AB37 push 00000038h; iretd 3_2_0076AB3B
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_00766CB3 push ebx; iretd 3_2_00766E7D
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_00766E56 push ebx; iretd 3_2_00766E7D
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_00751126 push esp; ret 3_2_00751127
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0076D1B0 push es; ret 3_2_0076D1D0
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0076550F pushad ; retf 3_2_00765510
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0076FEF5 push FFFFFFBAh; ret 3_2_0076FEF7
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0075FFA0 push esi; iretd 3_2_0075FFA5
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_008A8111 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, 0_2_008A8111
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0085EB42 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, 0_2_0085EB42
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0086123A __initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, 0_2_0086123A
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe API/Special instruction interceptor: Address: EB0DAC
Source: C:\Windows\SysWOW64\netbtugc.exe API/Special instruction interceptor: Address: 7FFE2220D324
Source: C:\Windows\SysWOW64\netbtugc.exe API/Special instruction interceptor: Address: 7FFE2220D7E4
Source: C:\Windows\SysWOW64\netbtugc.exe API/Special instruction interceptor: Address: 7FFE2220D944
Source: C:\Windows\SysWOW64\netbtugc.exe API/Special instruction interceptor: Address: 7FFE2220D504
Source: C:\Windows\SysWOW64\netbtugc.exe API/Special instruction interceptor: Address: 7FFE2220D544
Source: C:\Windows\SysWOW64\netbtugc.exe API/Special instruction interceptor: Address: 7FFE2220D1E4
Source: C:\Windows\SysWOW64\netbtugc.exe API/Special instruction interceptor: Address: 7FFE22210154
Source: C:\Windows\SysWOW64\netbtugc.exe API/Special instruction interceptor: Address: 7FFE2220DA44
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031AD1C0 rdtsc 1_2_031AD1C0
Source: C:\Windows\SysWOW64\netbtugc.exe Window / User API: threadDelayed 3279 Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Window / User API: threadDelayed 6694 Jump to behavior
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Evaded block: after key decision
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Evasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe API coverage: 4.6 %
Source: C:\Windows\SysWOW64\svchost.exe API coverage: 0.8 %
Source: C:\Windows\SysWOW64\netbtugc.exe API coverage: 2.7 %
Source: C:\Windows\SysWOW64\netbtugc.exe TID: 3704 Thread sleep count: 3279 > 30 Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe TID: 3704 Thread sleep time: -6558000s >= -30000s Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe TID: 3704 Thread sleep count: 6694 > 30 Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe TID: 3704 Thread sleep time: -13388000s >= -30000s Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe TID: 1344 Thread sleep time: -65000s >= -30000s Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe TID: 1344 Thread sleep count: 34 > 30 Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe TID: 1344 Thread sleep time: -34000s >= -30000s Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Last function: Thread delayed
Source: C:\Windows\SysWOW64\netbtugc.exe Last function: Thread delayed
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00886CA9 GetFileAttributesW,FindFirstFileW,FindClose, 0_2_00886CA9
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_008860DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose, 0_2_008860DD
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_008863F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose, 0_2_008863F9
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0088EB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, 0_2_0088EB60
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0088F5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, 0_2_0088F5FA
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0088F56F FindFirstFileW,FindClose, 0_2_0088F56F
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00891B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 0_2_00891B2F
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00891C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, 0_2_00891C8A
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00891F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, 0_2_00891F94
Source: C:\Windows\SysWOW64\netbtugc.exe Code function: 3_2_0076BAB0 FindFirstFileW,FindNextFileW,FindClose, 3_2_0076BAB0
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0085DDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo, 0_2_0085DDC0
Source: netbtugc.exe, 00000003.00000002.4165640004.0000000002E3E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllr
Source: firefox.exe, 00000008.00000002.2168495086.000001CC0512B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll3
Source: FGcoivYXQsEMNANuoDkk.exe, 00000007.00000002.4166318731.0000000000870000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllH
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe API call chain: ExitProcess graph end node
Source: C:\Windows\SysWOW64\svchost.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031AD1C0 rdtsc 1_2_031AD1C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_02537823 LdrLoadDll, 1_2_02537823
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00896AAF BlockInput, 0_2_00896AAF
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00843D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW, 0_2_00843D19
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00873920 LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,IsDebuggerPresent,OutputDebugStringW, 0_2_00873920
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0085E01E LoadLibraryA,GetProcAddress, 0_2_0085E01E
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00EB1078 mov eax, dword ptr fs:[00000030h] 0_2_00EB1078
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00EB1018 mov eax, dword ptr fs:[00000030h] 0_2_00EB1018
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00EAF9C8 mov eax, dword ptr fs:[00000030h] 0_2_00EAF9C8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312C310 mov ecx, dword ptr fs:[00000030h] 1_2_0312C310
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03150310 mov ecx, dword ptr fs:[00000030h] 1_2_03150310
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B930B mov eax, dword ptr fs:[00000030h] 1_2_031B930B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B930B mov eax, dword ptr fs:[00000030h] 1_2_031B930B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B930B mov eax, dword ptr fs:[00000030h] 1_2_031B930B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0316A30B mov eax, dword ptr fs:[00000030h] 1_2_0316A30B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0316A30B mov eax, dword ptr fs:[00000030h] 1_2_0316A30B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0316A30B mov eax, dword ptr fs:[00000030h] 1_2_0316A30B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03127330 mov eax, dword ptr fs:[00000030h] 1_2_03127330
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031F132D mov eax, dword ptr fs:[00000030h] 1_2_031F132D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031F132D mov eax, dword ptr fs:[00000030h] 1_2_031F132D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0315F32A mov eax, dword ptr fs:[00000030h] 1_2_0315F32A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03129353 mov eax, dword ptr fs:[00000030h] 1_2_03129353
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03129353 mov eax, dword ptr fs:[00000030h] 1_2_03129353
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B035C mov eax, dword ptr fs:[00000030h] 1_2_031B035C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B035C mov eax, dword ptr fs:[00000030h] 1_2_031B035C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B035C mov eax, dword ptr fs:[00000030h] 1_2_031B035C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B035C mov ecx, dword ptr fs:[00000030h] 1_2_031B035C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B035C mov eax, dword ptr fs:[00000030h] 1_2_031B035C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B035C mov eax, dword ptr fs:[00000030h] 1_2_031B035C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031FA352 mov eax, dword ptr fs:[00000030h] 1_2_031FA352
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B2349 mov eax, dword ptr fs:[00000030h] 1_2_031B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B2349 mov eax, dword ptr fs:[00000030h] 1_2_031B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B2349 mov eax, dword ptr fs:[00000030h] 1_2_031B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B2349 mov eax, dword ptr fs:[00000030h] 1_2_031B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B2349 mov eax, dword ptr fs:[00000030h] 1_2_031B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B2349 mov eax, dword ptr fs:[00000030h] 1_2_031B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B2349 mov eax, dword ptr fs:[00000030h] 1_2_031B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B2349 mov eax, dword ptr fs:[00000030h] 1_2_031B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B2349 mov eax, dword ptr fs:[00000030h] 1_2_031B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B2349 mov eax, dword ptr fs:[00000030h] 1_2_031B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B2349 mov eax, dword ptr fs:[00000030h] 1_2_031B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B2349 mov eax, dword ptr fs:[00000030h] 1_2_031B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B2349 mov eax, dword ptr fs:[00000030h] 1_2_031B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B2349 mov eax, dword ptr fs:[00000030h] 1_2_031B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B2349 mov eax, dword ptr fs:[00000030h] 1_2_031B2349
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312D34C mov eax, dword ptr fs:[00000030h] 1_2_0312D34C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312D34C mov eax, dword ptr fs:[00000030h] 1_2_0312D34C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03205341 mov eax, dword ptr fs:[00000030h] 1_2_03205341
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031D437C mov eax, dword ptr fs:[00000030h] 1_2_031D437C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03137370 mov eax, dword ptr fs:[00000030h] 1_2_03137370
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03137370 mov eax, dword ptr fs:[00000030h] 1_2_03137370
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03137370 mov eax, dword ptr fs:[00000030h] 1_2_03137370
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031EF367 mov eax, dword ptr fs:[00000030h] 1_2_031EF367
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0318739A mov eax, dword ptr fs:[00000030h] 1_2_0318739A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0318739A mov eax, dword ptr fs:[00000030h] 1_2_0318739A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03128397 mov eax, dword ptr fs:[00000030h] 1_2_03128397
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03128397 mov eax, dword ptr fs:[00000030h] 1_2_03128397
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03128397 mov eax, dword ptr fs:[00000030h] 1_2_03128397
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312E388 mov eax, dword ptr fs:[00000030h] 1_2_0312E388
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312E388 mov eax, dword ptr fs:[00000030h] 1_2_0312E388
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312E388 mov eax, dword ptr fs:[00000030h] 1_2_0312E388
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0315438F mov eax, dword ptr fs:[00000030h] 1_2_0315438F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0315438F mov eax, dword ptr fs:[00000030h] 1_2_0315438F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031533A5 mov eax, dword ptr fs:[00000030h] 1_2_031533A5
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031633A0 mov eax, dword ptr fs:[00000030h] 1_2_031633A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031633A0 mov eax, dword ptr fs:[00000030h] 1_2_031633A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0320539D mov eax, dword ptr fs:[00000030h] 1_2_0320539D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031EB3D0 mov ecx, dword ptr fs:[00000030h] 1_2_031EB3D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031EC3CD mov eax, dword ptr fs:[00000030h] 1_2_031EC3CD
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0313A3C0 mov eax, dword ptr fs:[00000030h] 1_2_0313A3C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0313A3C0 mov eax, dword ptr fs:[00000030h] 1_2_0313A3C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0313A3C0 mov eax, dword ptr fs:[00000030h] 1_2_0313A3C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0313A3C0 mov eax, dword ptr fs:[00000030h] 1_2_0313A3C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0313A3C0 mov eax, dword ptr fs:[00000030h] 1_2_0313A3C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0313A3C0 mov eax, dword ptr fs:[00000030h] 1_2_0313A3C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031383C0 mov eax, dword ptr fs:[00000030h] 1_2_031383C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031383C0 mov eax, dword ptr fs:[00000030h] 1_2_031383C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031383C0 mov eax, dword ptr fs:[00000030h] 1_2_031383C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031383C0 mov eax, dword ptr fs:[00000030h] 1_2_031383C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B63C0 mov eax, dword ptr fs:[00000030h] 1_2_031B63C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_032053FC mov eax, dword ptr fs:[00000030h] 1_2_032053FC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0314E3F0 mov eax, dword ptr fs:[00000030h] 1_2_0314E3F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0314E3F0 mov eax, dword ptr fs:[00000030h] 1_2_0314E3F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0314E3F0 mov eax, dword ptr fs:[00000030h] 1_2_0314E3F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031663FF mov eax, dword ptr fs:[00000030h] 1_2_031663FF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031EF3E6 mov eax, dword ptr fs:[00000030h] 1_2_031EF3E6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031403E9 mov eax, dword ptr fs:[00000030h] 1_2_031403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031403E9 mov eax, dword ptr fs:[00000030h] 1_2_031403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031403E9 mov eax, dword ptr fs:[00000030h] 1_2_031403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031403E9 mov eax, dword ptr fs:[00000030h] 1_2_031403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031403E9 mov eax, dword ptr fs:[00000030h] 1_2_031403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031403E9 mov eax, dword ptr fs:[00000030h] 1_2_031403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031403E9 mov eax, dword ptr fs:[00000030h] 1_2_031403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031403E9 mov eax, dword ptr fs:[00000030h] 1_2_031403E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03205227 mov eax, dword ptr fs:[00000030h] 1_2_03205227
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03167208 mov eax, dword ptr fs:[00000030h] 1_2_03167208
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03167208 mov eax, dword ptr fs:[00000030h] 1_2_03167208
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312823B mov eax, dword ptr fs:[00000030h] 1_2_0312823B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312A250 mov eax, dword ptr fs:[00000030h] 1_2_0312A250
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031EB256 mov eax, dword ptr fs:[00000030h] 1_2_031EB256
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031EB256 mov eax, dword ptr fs:[00000030h] 1_2_031EB256
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03136259 mov eax, dword ptr fs:[00000030h] 1_2_03136259
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03129240 mov eax, dword ptr fs:[00000030h] 1_2_03129240
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03129240 mov eax, dword ptr fs:[00000030h] 1_2_03129240
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B8243 mov eax, dword ptr fs:[00000030h] 1_2_031B8243
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B8243 mov ecx, dword ptr fs:[00000030h] 1_2_031B8243
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0316724D mov eax, dword ptr fs:[00000030h] 1_2_0316724D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03159274 mov eax, dword ptr fs:[00000030h] 1_2_03159274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03171270 mov eax, dword ptr fs:[00000030h] 1_2_03171270
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03171270 mov eax, dword ptr fs:[00000030h] 1_2_03171270
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E0274 mov eax, dword ptr fs:[00000030h] 1_2_031E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E0274 mov eax, dword ptr fs:[00000030h] 1_2_031E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E0274 mov eax, dword ptr fs:[00000030h] 1_2_031E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E0274 mov eax, dword ptr fs:[00000030h] 1_2_031E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E0274 mov eax, dword ptr fs:[00000030h] 1_2_031E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E0274 mov eax, dword ptr fs:[00000030h] 1_2_031E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E0274 mov eax, dword ptr fs:[00000030h] 1_2_031E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E0274 mov eax, dword ptr fs:[00000030h] 1_2_031E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E0274 mov eax, dword ptr fs:[00000030h] 1_2_031E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E0274 mov eax, dword ptr fs:[00000030h] 1_2_031E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E0274 mov eax, dword ptr fs:[00000030h] 1_2_031E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E0274 mov eax, dword ptr fs:[00000030h] 1_2_031E0274
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03134260 mov eax, dword ptr fs:[00000030h] 1_2_03134260
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03134260 mov eax, dword ptr fs:[00000030h] 1_2_03134260
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03134260 mov eax, dword ptr fs:[00000030h] 1_2_03134260
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031FD26B mov eax, dword ptr fs:[00000030h] 1_2_031FD26B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031FD26B mov eax, dword ptr fs:[00000030h] 1_2_031FD26B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312826B mov eax, dword ptr fs:[00000030h] 1_2_0312826B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0316329E mov eax, dword ptr fs:[00000030h] 1_2_0316329E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0316329E mov eax, dword ptr fs:[00000030h] 1_2_0316329E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0316E284 mov eax, dword ptr fs:[00000030h] 1_2_0316E284
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0316E284 mov eax, dword ptr fs:[00000030h] 1_2_0316E284
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B0283 mov eax, dword ptr fs:[00000030h] 1_2_031B0283
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B0283 mov eax, dword ptr fs:[00000030h] 1_2_031B0283
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B0283 mov eax, dword ptr fs:[00000030h] 1_2_031B0283
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03205283 mov eax, dword ptr fs:[00000030h] 1_2_03205283
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B92BC mov eax, dword ptr fs:[00000030h] 1_2_031B92BC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B92BC mov eax, dword ptr fs:[00000030h] 1_2_031B92BC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B92BC mov ecx, dword ptr fs:[00000030h] 1_2_031B92BC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B92BC mov ecx, dword ptr fs:[00000030h] 1_2_031B92BC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031402A0 mov eax, dword ptr fs:[00000030h] 1_2_031402A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031402A0 mov eax, dword ptr fs:[00000030h] 1_2_031402A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031452A0 mov eax, dword ptr fs:[00000030h] 1_2_031452A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031452A0 mov eax, dword ptr fs:[00000030h] 1_2_031452A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031452A0 mov eax, dword ptr fs:[00000030h] 1_2_031452A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031452A0 mov eax, dword ptr fs:[00000030h] 1_2_031452A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031F92A6 mov eax, dword ptr fs:[00000030h] 1_2_031F92A6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031F92A6 mov eax, dword ptr fs:[00000030h] 1_2_031F92A6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031F92A6 mov eax, dword ptr fs:[00000030h] 1_2_031F92A6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031F92A6 mov eax, dword ptr fs:[00000030h] 1_2_031F92A6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031C62A0 mov eax, dword ptr fs:[00000030h] 1_2_031C62A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031C62A0 mov ecx, dword ptr fs:[00000030h] 1_2_031C62A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031C62A0 mov eax, dword ptr fs:[00000030h] 1_2_031C62A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031C62A0 mov eax, dword ptr fs:[00000030h] 1_2_031C62A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031C62A0 mov eax, dword ptr fs:[00000030h] 1_2_031C62A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031C62A0 mov eax, dword ptr fs:[00000030h] 1_2_031C62A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031C72A0 mov eax, dword ptr fs:[00000030h] 1_2_031C72A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031C72A0 mov eax, dword ptr fs:[00000030h] 1_2_031C72A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312B2D3 mov eax, dword ptr fs:[00000030h] 1_2_0312B2D3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312B2D3 mov eax, dword ptr fs:[00000030h] 1_2_0312B2D3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312B2D3 mov eax, dword ptr fs:[00000030h] 1_2_0312B2D3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_032052E2 mov eax, dword ptr fs:[00000030h] 1_2_032052E2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0315F2D0 mov eax, dword ptr fs:[00000030h] 1_2_0315F2D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0315F2D0 mov eax, dword ptr fs:[00000030h] 1_2_0315F2D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0313A2C3 mov eax, dword ptr fs:[00000030h] 1_2_0313A2C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0313A2C3 mov eax, dword ptr fs:[00000030h] 1_2_0313A2C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0313A2C3 mov eax, dword ptr fs:[00000030h] 1_2_0313A2C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0313A2C3 mov eax, dword ptr fs:[00000030h] 1_2_0313A2C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0313A2C3 mov eax, dword ptr fs:[00000030h] 1_2_0313A2C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0315B2C0 mov eax, dword ptr fs:[00000030h] 1_2_0315B2C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0315B2C0 mov eax, dword ptr fs:[00000030h] 1_2_0315B2C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0315B2C0 mov eax, dword ptr fs:[00000030h] 1_2_0315B2C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0315B2C0 mov eax, dword ptr fs:[00000030h] 1_2_0315B2C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0315B2C0 mov eax, dword ptr fs:[00000030h] 1_2_0315B2C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0315B2C0 mov eax, dword ptr fs:[00000030h] 1_2_0315B2C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0315B2C0 mov eax, dword ptr fs:[00000030h] 1_2_0315B2C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031392C5 mov eax, dword ptr fs:[00000030h] 1_2_031392C5
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031392C5 mov eax, dword ptr fs:[00000030h] 1_2_031392C5
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031EF2F8 mov eax, dword ptr fs:[00000030h] 1_2_031EF2F8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031292FF mov eax, dword ptr fs:[00000030h] 1_2_031292FF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E12ED mov eax, dword ptr fs:[00000030h] 1_2_031E12ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E12ED mov eax, dword ptr fs:[00000030h] 1_2_031E12ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E12ED mov eax, dword ptr fs:[00000030h] 1_2_031E12ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E12ED mov eax, dword ptr fs:[00000030h] 1_2_031E12ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E12ED mov eax, dword ptr fs:[00000030h] 1_2_031E12ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E12ED mov eax, dword ptr fs:[00000030h] 1_2_031E12ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E12ED mov eax, dword ptr fs:[00000030h] 1_2_031E12ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E12ED mov eax, dword ptr fs:[00000030h] 1_2_031E12ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E12ED mov eax, dword ptr fs:[00000030h] 1_2_031E12ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E12ED mov eax, dword ptr fs:[00000030h] 1_2_031E12ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E12ED mov eax, dword ptr fs:[00000030h] 1_2_031E12ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E12ED mov eax, dword ptr fs:[00000030h] 1_2_031E12ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E12ED mov eax, dword ptr fs:[00000030h] 1_2_031E12ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E12ED mov eax, dword ptr fs:[00000030h] 1_2_031E12ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031402E1 mov eax, dword ptr fs:[00000030h] 1_2_031402E1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031402E1 mov eax, dword ptr fs:[00000030h] 1_2_031402E1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031402E1 mov eax, dword ptr fs:[00000030h] 1_2_031402E1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031DA118 mov ecx, dword ptr fs:[00000030h] 1_2_031DA118
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031DA118 mov eax, dword ptr fs:[00000030h] 1_2_031DA118
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031DA118 mov eax, dword ptr fs:[00000030h] 1_2_031DA118
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031DA118 mov eax, dword ptr fs:[00000030h] 1_2_031DA118
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031F0115 mov eax, dword ptr fs:[00000030h] 1_2_031F0115
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03131131 mov eax, dword ptr fs:[00000030h] 1_2_03131131
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03131131 mov eax, dword ptr fs:[00000030h] 1_2_03131131
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312B136 mov eax, dword ptr fs:[00000030h] 1_2_0312B136
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312B136 mov eax, dword ptr fs:[00000030h] 1_2_0312B136
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312B136 mov eax, dword ptr fs:[00000030h] 1_2_0312B136
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312B136 mov eax, dword ptr fs:[00000030h] 1_2_0312B136
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03160124 mov eax, dword ptr fs:[00000030h] 1_2_03160124
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03137152 mov eax, dword ptr fs:[00000030h] 1_2_03137152
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312C156 mov eax, dword ptr fs:[00000030h] 1_2_0312C156
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031C8158 mov eax, dword ptr fs:[00000030h] 1_2_031C8158
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03136154 mov eax, dword ptr fs:[00000030h] 1_2_03136154
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03136154 mov eax, dword ptr fs:[00000030h] 1_2_03136154
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031C4144 mov eax, dword ptr fs:[00000030h] 1_2_031C4144
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031C4144 mov eax, dword ptr fs:[00000030h] 1_2_031C4144
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031C4144 mov ecx, dword ptr fs:[00000030h] 1_2_031C4144
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031C4144 mov eax, dword ptr fs:[00000030h] 1_2_031C4144
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031C4144 mov eax, dword ptr fs:[00000030h] 1_2_031C4144
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03129148 mov eax, dword ptr fs:[00000030h] 1_2_03129148
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03129148 mov eax, dword ptr fs:[00000030h] 1_2_03129148
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03129148 mov eax, dword ptr fs:[00000030h] 1_2_03129148
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03129148 mov eax, dword ptr fs:[00000030h] 1_2_03129148
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F172 mov eax, dword ptr fs:[00000030h] 1_2_0312F172
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F172 mov eax, dword ptr fs:[00000030h] 1_2_0312F172
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F172 mov eax, dword ptr fs:[00000030h] 1_2_0312F172
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F172 mov eax, dword ptr fs:[00000030h] 1_2_0312F172
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F172 mov eax, dword ptr fs:[00000030h] 1_2_0312F172
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F172 mov eax, dword ptr fs:[00000030h] 1_2_0312F172
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F172 mov eax, dword ptr fs:[00000030h] 1_2_0312F172
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F172 mov eax, dword ptr fs:[00000030h] 1_2_0312F172
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F172 mov eax, dword ptr fs:[00000030h] 1_2_0312F172
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F172 mov eax, dword ptr fs:[00000030h] 1_2_0312F172
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F172 mov eax, dword ptr fs:[00000030h] 1_2_0312F172
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F172 mov eax, dword ptr fs:[00000030h] 1_2_0312F172
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F172 mov eax, dword ptr fs:[00000030h] 1_2_0312F172
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F172 mov eax, dword ptr fs:[00000030h] 1_2_0312F172
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F172 mov eax, dword ptr fs:[00000030h] 1_2_0312F172
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F172 mov eax, dword ptr fs:[00000030h] 1_2_0312F172
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F172 mov eax, dword ptr fs:[00000030h] 1_2_0312F172
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F172 mov eax, dword ptr fs:[00000030h] 1_2_0312F172
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F172 mov eax, dword ptr fs:[00000030h] 1_2_0312F172
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F172 mov eax, dword ptr fs:[00000030h] 1_2_0312F172
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F172 mov eax, dword ptr fs:[00000030h] 1_2_0312F172
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031C9179 mov eax, dword ptr fs:[00000030h] 1_2_031C9179
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03205152 mov eax, dword ptr fs:[00000030h] 1_2_03205152
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B019F mov eax, dword ptr fs:[00000030h] 1_2_031B019F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B019F mov eax, dword ptr fs:[00000030h] 1_2_031B019F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B019F mov eax, dword ptr fs:[00000030h] 1_2_031B019F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B019F mov eax, dword ptr fs:[00000030h] 1_2_031B019F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312A197 mov eax, dword ptr fs:[00000030h] 1_2_0312A197
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312A197 mov eax, dword ptr fs:[00000030h] 1_2_0312A197
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312A197 mov eax, dword ptr fs:[00000030h] 1_2_0312A197
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03187190 mov eax, dword ptr fs:[00000030h] 1_2_03187190
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03170185 mov eax, dword ptr fs:[00000030h] 1_2_03170185
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031EC188 mov eax, dword ptr fs:[00000030h] 1_2_031EC188
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031EC188 mov eax, dword ptr fs:[00000030h] 1_2_031EC188
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0314B1B0 mov eax, dword ptr fs:[00000030h] 1_2_0314B1B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E11A4 mov eax, dword ptr fs:[00000030h] 1_2_031E11A4
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E11A4 mov eax, dword ptr fs:[00000030h] 1_2_031E11A4
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E11A4 mov eax, dword ptr fs:[00000030h] 1_2_031E11A4
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031E11A4 mov eax, dword ptr fs:[00000030h] 1_2_031E11A4
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_032061E5 mov eax, dword ptr fs:[00000030h] 1_2_032061E5
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0316D1D0 mov eax, dword ptr fs:[00000030h] 1_2_0316D1D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0316D1D0 mov ecx, dword ptr fs:[00000030h] 1_2_0316D1D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031AE1D0 mov eax, dword ptr fs:[00000030h] 1_2_031AE1D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031AE1D0 mov eax, dword ptr fs:[00000030h] 1_2_031AE1D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031AE1D0 mov ecx, dword ptr fs:[00000030h] 1_2_031AE1D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031AE1D0 mov eax, dword ptr fs:[00000030h] 1_2_031AE1D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031AE1D0 mov eax, dword ptr fs:[00000030h] 1_2_031AE1D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031F61C3 mov eax, dword ptr fs:[00000030h] 1_2_031F61C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031F61C3 mov eax, dword ptr fs:[00000030h] 1_2_031F61C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031D71F9 mov esi, dword ptr fs:[00000030h] 1_2_031D71F9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_032051CB mov eax, dword ptr fs:[00000030h] 1_2_032051CB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031601F8 mov eax, dword ptr fs:[00000030h] 1_2_031601F8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031551EF mov eax, dword ptr fs:[00000030h] 1_2_031551EF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031551EF mov eax, dword ptr fs:[00000030h] 1_2_031551EF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031551EF mov eax, dword ptr fs:[00000030h] 1_2_031551EF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031551EF mov eax, dword ptr fs:[00000030h] 1_2_031551EF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031551EF mov eax, dword ptr fs:[00000030h] 1_2_031551EF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031551EF mov eax, dword ptr fs:[00000030h] 1_2_031551EF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031551EF mov eax, dword ptr fs:[00000030h] 1_2_031551EF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031551EF mov eax, dword ptr fs:[00000030h] 1_2_031551EF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031551EF mov eax, dword ptr fs:[00000030h] 1_2_031551EF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031551EF mov eax, dword ptr fs:[00000030h] 1_2_031551EF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031551EF mov eax, dword ptr fs:[00000030h] 1_2_031551EF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031551EF mov eax, dword ptr fs:[00000030h] 1_2_031551EF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031551EF mov eax, dword ptr fs:[00000030h] 1_2_031551EF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031351ED mov eax, dword ptr fs:[00000030h] 1_2_031351ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0314E016 mov eax, dword ptr fs:[00000030h] 1_2_0314E016
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0314E016 mov eax, dword ptr fs:[00000030h] 1_2_0314E016
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0314E016 mov eax, dword ptr fs:[00000030h] 1_2_0314E016
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0314E016 mov eax, dword ptr fs:[00000030h] 1_2_0314E016
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B4000 mov ecx, dword ptr fs:[00000030h] 1_2_031B4000
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031F903E mov eax, dword ptr fs:[00000030h] 1_2_031F903E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031F903E mov eax, dword ptr fs:[00000030h] 1_2_031F903E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031F903E mov eax, dword ptr fs:[00000030h] 1_2_031F903E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031F903E mov eax, dword ptr fs:[00000030h] 1_2_031F903E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312A020 mov eax, dword ptr fs:[00000030h] 1_2_0312A020
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312C020 mov eax, dword ptr fs:[00000030h] 1_2_0312C020
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03205060 mov eax, dword ptr fs:[00000030h] 1_2_03205060
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03132050 mov eax, dword ptr fs:[00000030h] 1_2_03132050
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031D705E mov ebx, dword ptr fs:[00000030h] 1_2_031D705E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031D705E mov eax, dword ptr fs:[00000030h] 1_2_031D705E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0315B052 mov eax, dword ptr fs:[00000030h] 1_2_0315B052
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B6050 mov eax, dword ptr fs:[00000030h] 1_2_031B6050
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03141070 mov eax, dword ptr fs:[00000030h] 1_2_03141070
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03141070 mov ecx, dword ptr fs:[00000030h] 1_2_03141070
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03141070 mov eax, dword ptr fs:[00000030h] 1_2_03141070
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03141070 mov eax, dword ptr fs:[00000030h] 1_2_03141070
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03141070 mov eax, dword ptr fs:[00000030h] 1_2_03141070
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03141070 mov eax, dword ptr fs:[00000030h] 1_2_03141070
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03141070 mov eax, dword ptr fs:[00000030h] 1_2_03141070
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03141070 mov eax, dword ptr fs:[00000030h] 1_2_03141070
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03141070 mov eax, dword ptr fs:[00000030h] 1_2_03141070
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03141070 mov eax, dword ptr fs:[00000030h] 1_2_03141070
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03141070 mov eax, dword ptr fs:[00000030h] 1_2_03141070
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03141070 mov eax, dword ptr fs:[00000030h] 1_2_03141070
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03141070 mov eax, dword ptr fs:[00000030h] 1_2_03141070
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0315C073 mov eax, dword ptr fs:[00000030h] 1_2_0315C073
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031AD070 mov ecx, dword ptr fs:[00000030h] 1_2_031AD070
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B106E mov eax, dword ptr fs:[00000030h] 1_2_031B106E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03135096 mov eax, dword ptr fs:[00000030h] 1_2_03135096
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0315D090 mov eax, dword ptr fs:[00000030h] 1_2_0315D090
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0315D090 mov eax, dword ptr fs:[00000030h] 1_2_0315D090
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0316909C mov eax, dword ptr fs:[00000030h] 1_2_0316909C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0313208A mov eax, dword ptr fs:[00000030h] 1_2_0313208A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031BD080 mov eax, dword ptr fs:[00000030h] 1_2_031BD080
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031BD080 mov eax, dword ptr fs:[00000030h] 1_2_031BD080
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312D08D mov eax, dword ptr fs:[00000030h] 1_2_0312D08D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031F60B8 mov eax, dword ptr fs:[00000030h] 1_2_031F60B8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031F60B8 mov ecx, dword ptr fs:[00000030h] 1_2_031F60B8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031C80A8 mov eax, dword ptr fs:[00000030h] 1_2_031C80A8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B20DE mov eax, dword ptr fs:[00000030h] 1_2_031B20DE
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031590DB mov eax, dword ptr fs:[00000030h] 1_2_031590DB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031470C0 mov eax, dword ptr fs:[00000030h] 1_2_031470C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031470C0 mov ecx, dword ptr fs:[00000030h] 1_2_031470C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031470C0 mov ecx, dword ptr fs:[00000030h] 1_2_031470C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031470C0 mov eax, dword ptr fs:[00000030h] 1_2_031470C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031470C0 mov ecx, dword ptr fs:[00000030h] 1_2_031470C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031470C0 mov ecx, dword ptr fs:[00000030h] 1_2_031470C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031470C0 mov eax, dword ptr fs:[00000030h] 1_2_031470C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031470C0 mov eax, dword ptr fs:[00000030h] 1_2_031470C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031470C0 mov eax, dword ptr fs:[00000030h] 1_2_031470C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031470C0 mov eax, dword ptr fs:[00000030h] 1_2_031470C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031470C0 mov eax, dword ptr fs:[00000030h] 1_2_031470C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031470C0 mov eax, dword ptr fs:[00000030h] 1_2_031470C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031470C0 mov eax, dword ptr fs:[00000030h] 1_2_031470C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031470C0 mov eax, dword ptr fs:[00000030h] 1_2_031470C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031470C0 mov eax, dword ptr fs:[00000030h] 1_2_031470C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031470C0 mov eax, dword ptr fs:[00000030h] 1_2_031470C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031470C0 mov eax, dword ptr fs:[00000030h] 1_2_031470C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031470C0 mov eax, dword ptr fs:[00000030h] 1_2_031470C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031AD0C0 mov eax, dword ptr fs:[00000030h] 1_2_031AD0C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031AD0C0 mov eax, dword ptr fs:[00000030h] 1_2_031AD0C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312C0F0 mov eax, dword ptr fs:[00000030h] 1_2_0312C0F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031720F0 mov ecx, dword ptr fs:[00000030h] 1_2_031720F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031550E4 mov eax, dword ptr fs:[00000030h] 1_2_031550E4
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031550E4 mov ecx, dword ptr fs:[00000030h] 1_2_031550E4
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312A0E3 mov ecx, dword ptr fs:[00000030h] 1_2_0312A0E3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_032050D9 mov eax, dword ptr fs:[00000030h] 1_2_032050D9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031380E9 mov eax, dword ptr fs:[00000030h] 1_2_031380E9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B60E0 mov eax, dword ptr fs:[00000030h] 1_2_031B60E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03130710 mov eax, dword ptr fs:[00000030h] 1_2_03130710
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03160710 mov eax, dword ptr fs:[00000030h] 1_2_03160710
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0316F71F mov eax, dword ptr fs:[00000030h] 1_2_0316F71F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0316F71F mov eax, dword ptr fs:[00000030h] 1_2_0316F71F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03137703 mov eax, dword ptr fs:[00000030h] 1_2_03137703
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03135702 mov eax, dword ptr fs:[00000030h] 1_2_03135702
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03135702 mov eax, dword ptr fs:[00000030h] 1_2_03135702
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0316C700 mov eax, dword ptr fs:[00000030h] 1_2_0316C700
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0320B73C mov eax, dword ptr fs:[00000030h] 1_2_0320B73C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0320B73C mov eax, dword ptr fs:[00000030h] 1_2_0320B73C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0320B73C mov eax, dword ptr fs:[00000030h] 1_2_0320B73C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0320B73C mov eax, dword ptr fs:[00000030h] 1_2_0320B73C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03129730 mov eax, dword ptr fs:[00000030h] 1_2_03129730
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03129730 mov eax, dword ptr fs:[00000030h] 1_2_03129730
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03165734 mov eax, dword ptr fs:[00000030h] 1_2_03165734
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0313973A mov eax, dword ptr fs:[00000030h] 1_2_0313973A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0313973A mov eax, dword ptr fs:[00000030h] 1_2_0313973A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0316273C mov eax, dword ptr fs:[00000030h] 1_2_0316273C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0316273C mov ecx, dword ptr fs:[00000030h] 1_2_0316273C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0316273C mov eax, dword ptr fs:[00000030h] 1_2_0316273C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031AC730 mov eax, dword ptr fs:[00000030h] 1_2_031AC730
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031EF72E mov eax, dword ptr fs:[00000030h] 1_2_031EF72E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03133720 mov eax, dword ptr fs:[00000030h] 1_2_03133720
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0314F720 mov eax, dword ptr fs:[00000030h] 1_2_0314F720
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0314F720 mov eax, dword ptr fs:[00000030h] 1_2_0314F720
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0314F720 mov eax, dword ptr fs:[00000030h] 1_2_0314F720
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031F972B mov eax, dword ptr fs:[00000030h] 1_2_031F972B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0316C720 mov eax, dword ptr fs:[00000030h] 1_2_0316C720
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0316C720 mov eax, dword ptr fs:[00000030h] 1_2_0316C720
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03130750 mov eax, dword ptr fs:[00000030h] 1_2_03130750
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031BE75D mov eax, dword ptr fs:[00000030h] 1_2_031BE75D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172750 mov eax, dword ptr fs:[00000030h] 1_2_03172750
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172750 mov eax, dword ptr fs:[00000030h] 1_2_03172750
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B4755 mov eax, dword ptr fs:[00000030h] 1_2_031B4755
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03143740 mov eax, dword ptr fs:[00000030h] 1_2_03143740
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03143740 mov eax, dword ptr fs:[00000030h] 1_2_03143740
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03143740 mov eax, dword ptr fs:[00000030h] 1_2_03143740
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0316674D mov esi, dword ptr fs:[00000030h] 1_2_0316674D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0316674D mov eax, dword ptr fs:[00000030h] 1_2_0316674D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0316674D mov eax, dword ptr fs:[00000030h] 1_2_0316674D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03138770 mov eax, dword ptr fs:[00000030h] 1_2_03138770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03140770 mov eax, dword ptr fs:[00000030h] 1_2_03140770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03140770 mov eax, dword ptr fs:[00000030h] 1_2_03140770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03140770 mov eax, dword ptr fs:[00000030h] 1_2_03140770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03140770 mov eax, dword ptr fs:[00000030h] 1_2_03140770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03140770 mov eax, dword ptr fs:[00000030h] 1_2_03140770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03140770 mov eax, dword ptr fs:[00000030h] 1_2_03140770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03140770 mov eax, dword ptr fs:[00000030h] 1_2_03140770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03140770 mov eax, dword ptr fs:[00000030h] 1_2_03140770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03140770 mov eax, dword ptr fs:[00000030h] 1_2_03140770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03140770 mov eax, dword ptr fs:[00000030h] 1_2_03140770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03140770 mov eax, dword ptr fs:[00000030h] 1_2_03140770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03140770 mov eax, dword ptr fs:[00000030h] 1_2_03140770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03203749 mov eax, dword ptr fs:[00000030h] 1_2_03203749
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312B765 mov eax, dword ptr fs:[00000030h] 1_2_0312B765
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312B765 mov eax, dword ptr fs:[00000030h] 1_2_0312B765
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312B765 mov eax, dword ptr fs:[00000030h] 1_2_0312B765
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312B765 mov eax, dword ptr fs:[00000030h] 1_2_0312B765
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031EF78A mov eax, dword ptr fs:[00000030h] 1_2_031EF78A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_032037B6 mov eax, dword ptr fs:[00000030h] 1_2_032037B6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0315D7B0 mov eax, dword ptr fs:[00000030h] 1_2_0315D7B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F7BA mov eax, dword ptr fs:[00000030h] 1_2_0312F7BA
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F7BA mov eax, dword ptr fs:[00000030h] 1_2_0312F7BA
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F7BA mov eax, dword ptr fs:[00000030h] 1_2_0312F7BA
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F7BA mov eax, dword ptr fs:[00000030h] 1_2_0312F7BA
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F7BA mov eax, dword ptr fs:[00000030h] 1_2_0312F7BA
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F7BA mov eax, dword ptr fs:[00000030h] 1_2_0312F7BA
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F7BA mov eax, dword ptr fs:[00000030h] 1_2_0312F7BA
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F7BA mov eax, dword ptr fs:[00000030h] 1_2_0312F7BA
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F7BA mov eax, dword ptr fs:[00000030h] 1_2_0312F7BA
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B97A9 mov eax, dword ptr fs:[00000030h] 1_2_031B97A9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031BF7AF mov eax, dword ptr fs:[00000030h] 1_2_031BF7AF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031BF7AF mov eax, dword ptr fs:[00000030h] 1_2_031BF7AF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031BF7AF mov eax, dword ptr fs:[00000030h] 1_2_031BF7AF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031BF7AF mov eax, dword ptr fs:[00000030h] 1_2_031BF7AF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031BF7AF mov eax, dword ptr fs:[00000030h] 1_2_031BF7AF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031307AF mov eax, dword ptr fs:[00000030h] 1_2_031307AF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0313C7C0 mov eax, dword ptr fs:[00000030h] 1_2_0313C7C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031357C0 mov eax, dword ptr fs:[00000030h] 1_2_031357C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031357C0 mov eax, dword ptr fs:[00000030h] 1_2_031357C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031357C0 mov eax, dword ptr fs:[00000030h] 1_2_031357C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B07C3 mov eax, dword ptr fs:[00000030h] 1_2_031B07C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031347FB mov eax, dword ptr fs:[00000030h] 1_2_031347FB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031347FB mov eax, dword ptr fs:[00000030h] 1_2_031347FB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0313D7E0 mov ecx, dword ptr fs:[00000030h] 1_2_0313D7E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031527ED mov eax, dword ptr fs:[00000030h] 1_2_031527ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031527ED mov eax, dword ptr fs:[00000030h] 1_2_031527ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031527ED mov eax, dword ptr fs:[00000030h] 1_2_031527ED
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031BE7E1 mov eax, dword ptr fs:[00000030h] 1_2_031BE7E1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03133616 mov eax, dword ptr fs:[00000030h] 1_2_03133616
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03133616 mov eax, dword ptr fs:[00000030h] 1_2_03133616
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03172619 mov eax, dword ptr fs:[00000030h] 1_2_03172619
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03161607 mov eax, dword ptr fs:[00000030h] 1_2_03161607
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031AE609 mov eax, dword ptr fs:[00000030h] 1_2_031AE609
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0316F603 mov eax, dword ptr fs:[00000030h] 1_2_0316F603
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03205636 mov eax, dword ptr fs:[00000030h] 1_2_03205636
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0314260B mov eax, dword ptr fs:[00000030h] 1_2_0314260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0314260B mov eax, dword ptr fs:[00000030h] 1_2_0314260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0314260B mov eax, dword ptr fs:[00000030h] 1_2_0314260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0314260B mov eax, dword ptr fs:[00000030h] 1_2_0314260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0314260B mov eax, dword ptr fs:[00000030h] 1_2_0314260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0314260B mov eax, dword ptr fs:[00000030h] 1_2_0314260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0314260B mov eax, dword ptr fs:[00000030h] 1_2_0314260B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0314E627 mov eax, dword ptr fs:[00000030h] 1_2_0314E627
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F626 mov eax, dword ptr fs:[00000030h] 1_2_0312F626
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F626 mov eax, dword ptr fs:[00000030h] 1_2_0312F626
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F626 mov eax, dword ptr fs:[00000030h] 1_2_0312F626
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F626 mov eax, dword ptr fs:[00000030h] 1_2_0312F626
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F626 mov eax, dword ptr fs:[00000030h] 1_2_0312F626
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F626 mov eax, dword ptr fs:[00000030h] 1_2_0312F626
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F626 mov eax, dword ptr fs:[00000030h] 1_2_0312F626
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F626 mov eax, dword ptr fs:[00000030h] 1_2_0312F626
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312F626 mov eax, dword ptr fs:[00000030h] 1_2_0312F626
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03166620 mov eax, dword ptr fs:[00000030h] 1_2_03166620
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03168620 mov eax, dword ptr fs:[00000030h] 1_2_03168620
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0313262C mov eax, dword ptr fs:[00000030h] 1_2_0313262C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0314C640 mov eax, dword ptr fs:[00000030h] 1_2_0314C640
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03162674 mov eax, dword ptr fs:[00000030h] 1_2_03162674
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031F866E mov eax, dword ptr fs:[00000030h] 1_2_031F866E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031F866E mov eax, dword ptr fs:[00000030h] 1_2_031F866E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0316A660 mov eax, dword ptr fs:[00000030h] 1_2_0316A660
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0316A660 mov eax, dword ptr fs:[00000030h] 1_2_0316A660
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03169660 mov eax, dword ptr fs:[00000030h] 1_2_03169660
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03169660 mov eax, dword ptr fs:[00000030h] 1_2_03169660
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03134690 mov eax, dword ptr fs:[00000030h] 1_2_03134690
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_03134690 mov eax, dword ptr fs:[00000030h] 1_2_03134690
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B368C mov eax, dword ptr fs:[00000030h] 1_2_031B368C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B368C mov eax, dword ptr fs:[00000030h] 1_2_031B368C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B368C mov eax, dword ptr fs:[00000030h] 1_2_031B368C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031B368C mov eax, dword ptr fs:[00000030h] 1_2_031B368C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031276B2 mov eax, dword ptr fs:[00000030h] 1_2_031276B2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031276B2 mov eax, dword ptr fs:[00000030h] 1_2_031276B2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031276B2 mov eax, dword ptr fs:[00000030h] 1_2_031276B2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_031666B0 mov eax, dword ptr fs:[00000030h] 1_2_031666B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0316C6A6 mov eax, dword ptr fs:[00000030h] 1_2_0316C6A6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312D6AA mov eax, dword ptr fs:[00000030h] 1_2_0312D6AA
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0312D6AA mov eax, dword ptr fs:[00000030h] 1_2_0312D6AA
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0316A6C7 mov ebx, dword ptr fs:[00000030h] 1_2_0316A6C7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0316A6C7 mov eax, dword ptr fs:[00000030h] 1_2_0316A6C7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0313B6C0 mov eax, dword ptr fs:[00000030h] 1_2_0313B6C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0313B6C0 mov eax, dword ptr fs:[00000030h] 1_2_0313B6C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0313B6C0 mov eax, dword ptr fs:[00000030h] 1_2_0313B6C0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 1_2_0313B6C0 mov eax, dword ptr fs:[00000030h] 1_2_0313B6C0
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0087A66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity, 0_2_0087A66C
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00868189 SetUnhandledExceptionFilter, 0_2_00868189
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_008681AC SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_008681AC

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtWriteVirtualMemory: Direct from: 0x76F0490C Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtOpenKeyEx: Direct from: 0x76F03C9C Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtClose: Direct from: 0x76F02B6C
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtReadVirtualMemory: Direct from: 0x76F02E8C Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtCreateKey: Direct from: 0x76F02C6C Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtSetInformationThread: Direct from: 0x76F02B4C Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtQueryAttributesFile: Direct from: 0x76F02E6C Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtAllocateVirtualMemory: Direct from: 0x76F048EC Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtQuerySystemInformation: Direct from: 0x76F048CC Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtQueryVolumeInformationFile: Direct from: 0x76F02F2C Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtOpenSection: Direct from: 0x76F02E0C Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtSetInformationThread: Direct from: 0x76EF63F9 Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtDeviceIoControlFile: Direct from: 0x76F02AEC Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtQueryValueKey: Direct from: 0x76F02BEC Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtCreateFile: Direct from: 0x76F02FEC Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtOpenFile: Direct from: 0x76F02DCC Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtQueryInformationToken: Direct from: 0x76F02CAC Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtTerminateThread: Direct from: 0x76F02FCC Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtProtectVirtualMemory: Direct from: 0x76EF7B2E Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtOpenKeyEx: Direct from: 0x76F02B9C Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtProtectVirtualMemory: Direct from: 0x76F02F9C Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtSetInformationProcess: Direct from: 0x76F02C5C Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtNotifyChangeKey: Direct from: 0x76F03C2C Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtCreateMutant: Direct from: 0x76F035CC Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtWriteVirtualMemory: Direct from: 0x76F02E3C Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtMapViewOfSection: Direct from: 0x76F02D1C Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtResumeThread: Direct from: 0x76F036AC Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtAllocateVirtualMemory: Direct from: 0x76F02BFC Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtReadFile: Direct from: 0x76F02ADC Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtQuerySystemInformation: Direct from: 0x76F02DFC Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtDelayExecution: Direct from: 0x76F02DDC Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtQueryInformationProcess: Direct from: 0x76F02C26 Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtResumeThread: Direct from: 0x76F02FBC Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe NtCreateUserProcess: Direct from: 0x76F0371C Jump to behavior
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Section loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Section loaded: NULL target: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Section loaded: NULL target: C:\Windows\SysWOW64\netbtugc.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Section loaded: NULL target: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe protection: read write Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Section loaded: NULL target: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Section loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read write Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Section loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Thread register set: target process: 4624 Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Thread APC queued: target process: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe Jump to behavior
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 27C8008 Jump to behavior
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0087B106 LogonUserW, 0_2_0087B106
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00843D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW, 0_2_00843D19
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0088411C SendInput,keybd_event, 0_2_0088411C
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_008874BB mouse_event, 0_2_008874BB
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Process created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Certificate 1045-20-11.exe" Jump to behavior
Source: C:\Program Files (x86)\OmMYORIdyGtOWLCXABixOvtHOYfFndDaSeqYmtgOpbhZSxHmHJqeisBDItAZ\FGcoivYXQsEMNANuoDkk.exe Process created: C:\Windows\SysWOW64\netbtugc.exe "C:\Windows\SysWOW64\netbtugc.exe" Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Process created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe" Jump to behavior
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0087A66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity, 0_2_0087A66C
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_008871FA AllocateAndInitializeSid,CheckTokenMembership,FreeSid, 0_2_008871FA
Source: Certificate 1045-20-11.exe, FGcoivYXQsEMNANuoDkk.exe, 00000002.00000002.4166122921.0000000000D60000.00000002.00000001.00040000.00000000.sdmp, FGcoivYXQsEMNANuoDkk.exe, 00000002.00000000.1795016529.0000000000D60000.00000002.00000001.00040000.00000000.sdmp Binary or memory string: Shell_TrayWnd
Source: FGcoivYXQsEMNANuoDkk.exe, 00000002.00000002.4166122921.0000000000D60000.00000002.00000001.00040000.00000000.sdmp, FGcoivYXQsEMNANuoDkk.exe, 00000002.00000000.1795016529.0000000000D60000.00000002.00000001.00040000.00000000.sdmp, FGcoivYXQsEMNANuoDkk.exe, 00000007.00000002.4166622080.0000000000CE0000.00000002.00000001.00040000.00000000.sdmp Binary or memory string: Progman
Source: Certificate 1045-20-11.exe Binary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndTHISREMOVEblankinfoquestionstopwarning
Source: FGcoivYXQsEMNANuoDkk.exe, 00000002.00000002.4166122921.0000000000D60000.00000002.00000001.00040000.00000000.sdmp, FGcoivYXQsEMNANuoDkk.exe, 00000002.00000000.1795016529.0000000000D60000.00000002.00000001.00040000.00000000.sdmp, FGcoivYXQsEMNANuoDkk.exe, 00000007.00000002.4166622080.0000000000CE0000.00000002.00000001.00040000.00000000.sdmp Binary or memory string: Progmanlock
Source: FGcoivYXQsEMNANuoDkk.exe, 00000002.00000002.4166122921.0000000000D60000.00000002.00000001.00040000.00000000.sdmp, FGcoivYXQsEMNANuoDkk.exe, 00000002.00000000.1795016529.0000000000D60000.00000002.00000001.00040000.00000000.sdmp, FGcoivYXQsEMNANuoDkk.exe, 00000007.00000002.4166622080.0000000000CE0000.00000002.00000001.00040000.00000000.sdmp Binary or memory string: }Program Manager
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_008665C4 cpuid 0_2_008665C4
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0089091D GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,__wsplitpath,_wcscat,_wcscat,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,_wcscpy,SetCurrentDirectoryW, 0_2_0089091D
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_008BB340 GetUserNameW, 0_2_008BB340
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00871E8E __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte, 0_2_00871E8E
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0085DDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo, 0_2_0085DDC0

Stealing of Sensitive Information

barindex
Source: Yara match File source: 1.2.svchost.exe.2520000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.svchost.exe.2520000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000003.00000002.4165331791.0000000002D00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1868757997.0000000002520000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1870531753.0000000002F90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.4165463340.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.4165026551.0000000000750000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.4168934011.0000000004AD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1871626103.0000000003800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.4166827472.0000000002450000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
Source: C:\Windows\SysWOW64\netbtugc.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local State Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local State Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data Jump to behavior
Source: C:\Windows\SysWOW64\netbtugc.exe Key opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\ Jump to behavior
Source: Certificate 1045-20-11.exe Binary or memory string: WIN_81
Source: Certificate 1045-20-11.exe Binary or memory string: WIN_XP
Source: Certificate 1045-20-11.exe Binary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 12, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubytep
Source: Certificate 1045-20-11.exe Binary or memory string: WIN_XPe
Source: Certificate 1045-20-11.exe Binary or memory string: WIN_VISTA
Source: Certificate 1045-20-11.exe Binary or memory string: WIN_7
Source: Certificate 1045-20-11.exe Binary or memory string: WIN_8

Remote Access Functionality

barindex
Source: Yara match File source: 1.2.svchost.exe.2520000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.svchost.exe.2520000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000003.00000002.4165331791.0000000002D00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1868757997.0000000002520000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1870531753.0000000002F90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.4165463340.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.4165026551.0000000000750000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.4168934011.0000000004AD0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.1871626103.0000000003800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.4166827472.0000000002450000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_00898C4F socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket, 0_2_00898C4F
Source: C:\Users\user\Desktop\Certificate 1045-20-11.exe Code function: 0_2_0089923B socket,WSAGetLastError,bind,WSAGetLastError,closesocket, 0_2_0089923B
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs