Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Details Of Our PO..exe

Overview

General Information

Sample name:Details Of Our PO..exe
Analysis ID:1665094
MD5:de3b837022c60759a0bbc49a1b37f87b
SHA1:7392485b619806eaeef1b1bd2c1420452ad56d51
SHA256:3ef9e32717d21cbe668ad80d638e035431fde3d2807fa265f8c4b24451acfd22
Tags:exeuser-threatcat_ch
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected FormBook
.NET source code contains potential unpacker
Found direct / indirect Syscall (likely to bypass EDR)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Details Of Our PO..exe (PID: 4796 cmdline: "C:\Users\user\Desktop\Details Of Our PO..exe" MD5: DE3B837022C60759A0BBC49A1B37F87B)
    • Details Of Our PO..exe (PID: 4856 cmdline: "C:\Users\user\Desktop\Details Of Our PO..exe" MD5: DE3B837022C60759A0BBC49A1B37F87B)
      • kgiwhJAWTiJvkoTzfbZTr.exe (PID: 6152 cmdline: "C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\fdA2mlnPmU.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
        • ktmutil.exe (PID: 5504 cmdline: "C:\Windows\SysWOW64\ktmutil.exe" MD5: AC387D5962B2FE2BF4D518DD57BA7230)
          • kgiwhJAWTiJvkoTzfbZTr.exe (PID: 4284 cmdline: "C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\e7uiCZM2.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
          • firefox.exe (PID: 7624 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000004.00000002.3639234599.0000000000B00000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    0000000B.00000002.3641351972.00000000053B0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000004.00000002.3636731674.0000000000500000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        00000001.00000002.1306921757.0000000001290000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000001.00000002.1304498095.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 4 entries
            SourceRuleDescriptionAuthorStrings
            1.2.Details Of Our PO..exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              1.2.Details Of Our PO..exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-04-15T08:54:16.981457+020028596221Exploit Kit Activity Detected104.21.80.180192.168.2.449749TCP
                2025-04-15T08:54:19.624896+020028596221Exploit Kit Activity Detected104.21.80.180192.168.2.449750TCP
                2025-04-15T08:54:22.265814+020028596221Exploit Kit Activity Detected104.21.80.180192.168.2.449751TCP
                2025-04-15T08:54:25.015069+020028596221Exploit Kit Activity Detected104.21.80.180192.168.2.449752TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: Details Of Our PO..exeVirustotal: Detection: 51%Perma Link
                Source: Details Of Our PO..exeReversingLabs: Detection: 52%
                Source: Yara matchFile source: 1.2.Details Of Our PO..exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.Details Of Our PO..exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.3639234599.0000000000B00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3641351972.00000000053B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3636731674.0000000000500000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1306921757.0000000001290000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1304498095.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3638939405.00000000009B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3639012811.0000000003090000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1307125156.0000000001DE0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Submited SampleNeural Call Log Analysis: 94.5%

                Compliance

                barindex
                Source: C:\Users\user\Desktop\Details Of Our PO..exeUnpacked PE file: 0.2.Details Of Our PO..exe.bd0000.0.unpack
                Source: Details Of Our PO..exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: Details Of Our PO..exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: wntdll.pdbUGP source: Details Of Our PO..exe, 00000001.00000002.1305230211.0000000000EF0000.00000040.00001000.00020000.00000000.sdmp, ktmutil.exe, 00000004.00000003.1304959427.0000000000A23000.00000004.00000020.00020000.00000000.sdmp, ktmutil.exe, 00000004.00000002.3639639405.0000000003000000.00000040.00001000.00020000.00000000.sdmp, ktmutil.exe, 00000004.00000002.3639639405.000000000319E000.00000040.00001000.00020000.00000000.sdmp, ktmutil.exe, 00000004.00000003.1308013332.0000000000BD5000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: Details Of Our PO..exe, Details Of Our PO..exe, 00000001.00000002.1305230211.0000000000EF0000.00000040.00001000.00020000.00000000.sdmp, ktmutil.exe, ktmutil.exe, 00000004.00000003.1304959427.0000000000A23000.00000004.00000020.00020000.00000000.sdmp, ktmutil.exe, 00000004.00000002.3639639405.0000000003000000.00000040.00001000.00020000.00000000.sdmp, ktmutil.exe, 00000004.00000002.3639639405.000000000319E000.00000040.00001000.00020000.00000000.sdmp, ktmutil.exe, 00000004.00000003.1308013332.0000000000BD5000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: ktmutil.pdbGCTL source: Details Of Our PO..exe, 00000001.00000002.1304752116.0000000000937000.00000004.00000020.00020000.00000000.sdmp, kgiwhJAWTiJvkoTzfbZTr.exe, 00000003.00000002.3637599691.000000000092E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: ktmutil.pdb source: Details Of Our PO..exe, 00000001.00000002.1304752116.0000000000937000.00000004.00000020.00020000.00000000.sdmp, kgiwhJAWTiJvkoTzfbZTr.exe, 00000003.00000002.3637599691.000000000092E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Work\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: kgiwhJAWTiJvkoTzfbZTr.exe, 00000003.00000000.1226816694.0000000000A7F000.00000002.00000001.01000000.0000000C.sdmp, kgiwhJAWTiJvkoTzfbZTr.exe, 0000000B.00000002.3637340658.0000000000A7F000.00000002.00000001.01000000.0000000C.sdmp
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0051C7A0 FindFirstFileW,FindNextFileW,FindClose,4_2_0051C7A0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4x nop then xor eax, eax4_2_00509F70
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4x nop then mov ebx, 00000004h4_2_00C004EE

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2859622 - Severity 1 - ETPRO EXPLOIT_KIT FoxTDS Initial Check : 104.21.80.1:80 -> 192.168.2.4:49751
                Source: Network trafficSuricata IDS: 2859622 - Severity 1 - ETPRO EXPLOIT_KIT FoxTDS Initial Check : 104.21.80.1:80 -> 192.168.2.4:49749
                Source: Network trafficSuricata IDS: 2859622 - Severity 1 - ETPRO EXPLOIT_KIT FoxTDS Initial Check : 104.21.80.1:80 -> 192.168.2.4:49750
                Source: Network trafficSuricata IDS: 2859622 - Severity 1 - ETPRO EXPLOIT_KIT FoxTDS Initial Check : 104.21.80.1:80 -> 192.168.2.4:49752
                Source: DNS query: www.restrainreflection.xyz
                Source: DNS query: www.melayari.xyz
                Source: DNS query: www.031233793.xyz
                Source: DNS query: www.btcetf.xyz
                Source: Joe Sandbox ViewIP Address: 144.76.229.203 144.76.229.203
                Source: Joe Sandbox ViewIP Address: 199.192.23.195 199.192.23.195
                Source: Joe Sandbox ViewASN Name: HETZNER-ASDE HETZNER-ASDE
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /180h/?oxr=vzuH8N7P9nf&Bz=UzOvCVCfqsud0C/WkrMqcP2RHNbsAaZ8o9tyVTqa4UQoUorKeeDFRYXvu+Maq61THDiQ8APUEXADUp5L/iYhjOK05jeOtPOZBuiYDzf9Kcx8by5e2CyoVAY= HTTP/1.1Host: www.3333bet.websiteAccept: */*Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SV1; [eburo v4.0]; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3)
                Source: global trafficHTTP traffic detected: GET /el9f/?Bz=gBTjJ3HhuA6Y8oUx+q7BJruz/QnVOwvkMUV75EoY0rHEPotyrFeSFHwEnXZQtqJZGp/pT9EAUiNRhYVokcWj3DMyQWvqWDjgn/yihnZDLS/B0objMfufdC4=&oxr=vzuH8N7P9nf HTTP/1.1Host: www.restrainreflection.xyzAccept: */*Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SV1; [eburo v4.0]; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3)
                Source: global trafficHTTP traffic detected: GET /6ll4/?Bz=4EPGr05mGjSiauGbX7VQ62yH/iG53Dl8IA8brTo02OAzAUan1C0DkP00lQ/2uXHXWR2+wjSsnM8K+XeIsSLFE82vu6FTCqpZjZ1Xn8Uq+onop1dRHcIqw9I=&oxr=vzuH8N7P9nf HTTP/1.1Host: www.reviewsonline.shopAccept: */*Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SV1; [eburo v4.0]; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3)
                Source: global trafficHTTP traffic detected: GET /nrm5/?Bz=/oERluzzM0pGzAPiM4PWR2qy/B5KhqUS8N6tZO7kvOymG6wHkEScXS4KihZuzroZh6dcbVTqQgiZSCDFHO8BVJlg0C19v26IlqaCVaQEMFWO86YAfJstWpA=&oxr=vzuH8N7P9nf HTTP/1.1Host: www.melayari.xyzAccept: */*Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SV1; [eburo v4.0]; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3)
                Source: global trafficHTTP traffic detected: GET /k12w/?Bz=I6te/k1lbUDv9lUmInG92Y4ZLnEsH0cpjuyXjkObmr6KGlNEilnQgEy9r5056f7AXw2PFRopXOcGWV00u+Ah+2qydIfQMOrdiqqOVs6HK1nq/fOngBW7h60=&oxr=vzuH8N7P9nf HTTP/1.1Host: www.aibay.topAccept: */*Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SV1; [eburo v4.0]; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3)
                Source: global trafficHTTP traffic detected: GET /ha82/?Bz=t8GdRcIw0FwFpctsohSO+eXMMv6n3j3HolPXkxe8uD6TgII5WqfYhsHRMkcuzf52vTuC2N23TbiUNUOxwiqQJ++/Sr6g/inFfBl2Iar0TBpReq67PNq1j3c=&oxr=vzuH8N7P9nf HTTP/1.1Host: www.031233793.xyzAccept: */*Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SV1; [eburo v4.0]; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3)
                Source: global trafficHTTP traffic detected: GET /8afc/?oxr=vzuH8N7P9nf&Bz=KVtMYsRfNwMvdwBGTmbjTbVxKWEGME8MHLBwnoWB8FqE+U7e+AlwWYsu6uTC9PWkoBdq0NSpn8DuYD4ByIwkH6Prh+Yj6fnOcmfInq2Dm50bNtbBKsVX5kE= HTTP/1.1Host: www.venturegioballng.funAccept: */*Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SV1; [eburo v4.0]; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3)
                Source: global trafficHTTP traffic detected: GET /mfiy/?Bz=0IFkCdbmSQmD2uscPZm1qLpVXo+OlvxIcim3EGA2+6tPYtfl1Y4J2bovDCnjA/J4AvZpuEqsscdvcun9q3T0DRbWHDkLpMI9ksov5OHLKPkrw4+Y4XDycBE=&oxr=vzuH8N7P9nf HTTP/1.1Host: www.uqcdnvgr.bizAccept: */*Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SV1; [eburo v4.0]; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3)
                Source: global trafficHTTP traffic detected: GET /n7w1/?Bz=sv80E+GBb5G+kJvLhfKHhefcrhH6Ur25+8bFg+5TIx+AYwioddgnSDOF9J3I+7VeP2HfoilVWnkorzDt7ky+QX9uVrZ0CtCHLzZH9N6VQ5XrTfBlxpf2h9U=&oxr=vzuH8N7P9nf HTTP/1.1Host: www.miconion.shopAccept: */*Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SV1; [eburo v4.0]; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3)
                Source: global trafficHTTP traffic detected: GET /o820/?Bz=0n0qKyUK2peSxCSBB66YbZy7YOM28cwzZ7fY5Elmb8S7ZdGCVRINIMhO5A/sygFaToE4G33M5hneBjK3KfgrzDSeX0FoHMElk95ieuMs3G8Yl1qXIrmqk7s=&oxr=vzuH8N7P9nf HTTP/1.1Host: www.chillrocket.topAccept: */*Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SV1; [eburo v4.0]; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3)
                Source: global trafficHTTP traffic detected: GET /mlo1/?Bz=IfONekum+z06T0s2BK7rknpoaYzKqjBUI/afBYbGYqNxNS3gO/R476nmBH3br7pvBiWtavfILBb5Tnp6k9C4k0TCb4hjIaYg+2HUu8mbTBumq74K0MzSNso=&oxr=vzuH8N7P9nf HTTP/1.1Host: www.btcetf.xyzAccept: */*Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SV1; [eburo v4.0]; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3)
                Source: global trafficHTTP traffic detected: GET /3ujc/?Bz=9jA6gDHEOaO+WXBpyrwfxueCOwGw/wmolW6noVBcEa1vE91JFnV2Ay7j0xeI/wg/WKXIb0WqB7dxxO1/Ldl8oKEHXUy3QnzjcvB58LQcL0OjWI5eopWteOk=&oxr=vzuH8N7P9nf HTTP/1.1Host: www.eczanem.shopAccept: */*Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SV1; [eburo v4.0]; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3)
                Source: global trafficHTTP traffic detected: GET /ysql/?oxr=vzuH8N7P9nf&Bz=MK+gaqCdeM2a79iFj6ZsYH6MQK1E4vUbphgPjlpFoiR4jnFQIzXQ8twRdYLl9qrO7HrhnQhBzh8VLlrAqD0D8txJeLmDgYMypG/RIOr1AuueRHaY3968pGg= HTTP/1.1Host: www.mbalib.comAccept: */*Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SV1; [eburo v4.0]; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3)
                Source: global trafficHTTP traffic detected: GET /lhqx/?Bz=fKq8cJKQ1+x3R9+W4cFGWFxk+op7D8ljzdfmmmi/a/wBvbTF7KqGwgc/lSbuPXPnMrNsqlbGkCBAwDgfLh5Y2t9l7pJEF7hYSBJ+V6MYpVslqnB5FhwD88c=&oxr=vzuH8N7P9nf HTTP/1.1Host: www.celadonassn.netAccept: */*Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SV1; [eburo v4.0]; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3)
                Source: global trafficHTTP traffic detected: GET /iveg/?Bz=0qmA2LPMhkAipH4BrQ7tytYF8N5D6Q5E1bC9i5y1EQ9My6wnDm5mIzcV6Ixfg8ax9KV/gLNUYLwMqNxHCF4vLc4hr8RDC+vQxaT2fdmkW7Uu1uzA/xYu59w=&oxr=vzuH8N7P9nf HTTP/1.1Host: www.nkq.infoAccept: */*Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SV1; [eburo v4.0]; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3)
                Source: global trafficHTTP traffic detected: GET /8u15/?Bz=zJGTfjuA56RhR7bV5btEuaPO+sRVNcKtSshskeNEfXZx+wKjIJBG71TQHM+ju47VGGVsU4Ha1kULI3jP0sJC+PGOhWLKycixNKjgYctIH6cJwmuVVfDO1yY=&oxr=vzuH8N7P9nf HTTP/1.1Host: www.skingraphica.netAccept: */*Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SV1; [eburo v4.0]; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3)
                Source: global trafficDNS traffic detected: DNS query: www.3333bet.website
                Source: global trafficDNS traffic detected: DNS query: www.restrainreflection.xyz
                Source: global trafficDNS traffic detected: DNS query: www.reviewsonline.shop
                Source: global trafficDNS traffic detected: DNS query: www.melayari.xyz
                Source: global trafficDNS traffic detected: DNS query: www.aibay.top
                Source: global trafficDNS traffic detected: DNS query: www.031233793.xyz
                Source: global trafficDNS traffic detected: DNS query: www.venturegioballng.fun
                Source: global trafficDNS traffic detected: DNS query: www.uqcdnvgr.biz
                Source: global trafficDNS traffic detected: DNS query: www.miconion.shop
                Source: global trafficDNS traffic detected: DNS query: www.chillrocket.top
                Source: global trafficDNS traffic detected: DNS query: www.btcetf.xyz
                Source: global trafficDNS traffic detected: DNS query: www.eczanem.shop
                Source: global trafficDNS traffic detected: DNS query: www.mbalib.com
                Source: global trafficDNS traffic detected: DNS query: www.celadonassn.net
                Source: global trafficDNS traffic detected: DNS query: www.nkq.info
                Source: global trafficDNS traffic detected: DNS query: www.skingraphica.net
                Source: unknownHTTP traffic detected: POST /el9f/ HTTP/1.1Host: www.restrainreflection.xyzAccept: */*Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Content-Type: application/x-www-form-urlencodedCache-Control: no-cacheContent-Length: 199Connection: closeOrigin: http://www.restrainreflection.xyzReferer: http://www.restrainreflection.xyz/el9f/User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SV1; [eburo v4.0]; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3)Data Raw: 42 7a 3d 74 44 37 44 4b 48 6a 30 78 6d 54 70 39 71 30 51 78 61 66 48 42 49 43 78 32 67 76 6e 66 54 7a 42 4f 56 77 64 79 41 73 79 73 38 50 36 54 50 35 4c 6e 6b 71 68 44 48 38 4c 70 6c 59 37 78 75 45 6c 46 72 69 56 5a 2f 59 67 62 45 38 41 67 70 74 62 79 2b 2f 34 6f 68 45 6b 56 31 33 33 58 54 79 69 74 73 72 32 72 33 38 46 4b 41 66 64 6f 5a 47 61 4b 2f 69 5a 51 6e 6c 59 59 44 47 74 6e 55 4c 73 56 44 5a 45 62 50 35 67 6d 6d 74 32 6c 76 47 73 69 52 61 4f 44 43 52 46 70 43 6d 32 6d 61 37 67 6d 36 66 48 57 38 38 32 4f 76 4d 57 48 6b 58 6e 75 41 59 34 58 6b 7a 67 55 72 31 6b 46 66 57 33 32 51 3d 3d Data Ascii: Bz=tD7DKHj0xmTp9q0QxafHBICx2gvnfTzBOVwdyAsys8P6TP5LnkqhDH8LplY7xuElFriVZ/YgbE8Agptby+/4ohEkV133XTyitsr2r38FKAfdoZGaK/iZQnlYYDGtnULsVDZEbP5gmmt2lvGsiRaODCRFpCm2ma7gm6fHW882OvMWHkXnuAY4XkzgUr1kFfW32Q==
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 15 Apr 2025 06:53:49 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 15 Apr 2025 06:53:52 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 15 Apr 2025 06:53:55 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 15 Apr 2025 06:53:58 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 15 Apr 2025 06:54:44 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 15 Apr 2025 06:54:46 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 15 Apr 2025 06:54:49 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 15 Apr 2025 06:54:52 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 15 Apr 2025 06:55:11 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecache-control: private, no-cache, max-age=0pragma: no-cachevary: Accept-Encodingcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=nLK3i0u%2BNgOxUSqDis6IIBSUTb0VgnU8jT4B2PJzyuVPdGHbnO%2F5GqO92VuYBFwoBE3bP9ixd0EAzt3AiU4vVA5mOZXpwJ6nBERJnVRUIkMlKy3NspNWmLqH%2FwYdcLiHA0Ip"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 9309892eab50afae-ATLContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=106205&min_rtt=106205&rtt_var=53102&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=718&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 32 63 62 0d 0a 1f 8b 08 00 00 00 00 00 00 03 64 54 6d 8b db 38 10 fe 1e b8 ff 30 9b a5 d0 85 78 23 67 1d 7a d8 8e 69 b9 bb 72 07 a5 b7 d0 85 a3 1f 65 6b 1c 0d 2b 4b 3a 69 e2 24 57 fa df 0f 39 c9 be b4 12 c8 92 fc cc a3 99 67 46 aa af 7e ff fb b7 87 af f7 7f 80 e6 c1 34 b3 3a 7d 20 f2 d1 e0 66 ae 91 b6 9a cb 5c 88 37 f3 f4 0b a5 6a 66 f5 80 2c c1 ca 01 37 f3 91 70 ef 5d e0 39 74 ce 32 5a de cc f7 a4 58 6f 14 8e d4 61 36 2d 16 40 96 98 a4 c9 62 27 0d 6e f2 05 44 1d c8 3e 66 ec b2 9e 78 63 5d 62 67 62 83 0d 14 a2 80 cf 8e e1 a3 db 59 f5 cb ac 5e 9e f6 eb c9 a5 e6 fd 80 8a 24 bc f5 01 7b 0c 31 eb 9c 71 21 8b 9d c6 01 4b 25 c3 e3 cd b7 d6 a9 e3 b7 56 76 8f db 90 28 4e 90 f2 5a 08 71 45 43 72 56 5a fe fe bd 5e 9e 08 eb e5 39 aa 64 76 89 fb 64 02 d7 45 51 54 30 c8 b0 25 5b 8a aa 77 96 4b b0 2e 0c d2 40 5e f8 c3 72 25 fc 01 3e 04 92 66 01 7f a2 19 91 a9 93 0b 88 d2 c6 2c 62 a0 be 82 17 12 56 f0 93 57 70 dd f7 7d 95 a2 57 34 fe a0 ba dc b1 ab 60 20 9b bd e2 98 37 90 da 4b 03 c6 03 67 d2 d0 d6 96 d0 a1 65 0c 15 4c ca 97 bf 0a e1 0f 97 10 32 83 3d 97 90 15 a7 4d ef 22 31 39 5b ca 36 3a b3 63 ac 80 9d 2f e1 2e 9d 32 41 d7 e2 4d f2 0d ce ad d6 f9 e5 c4 27 4d 20 89 92 45 fa 0f cb 7c 3d d1 1a b2 f8 e4 f1 69 6b c2 ec 4f 5b ad 33 aa 9a 37 85 28 ea a5 ce 53 51 ad 5e 93 66 c9 89 24 6c f5 4c 0d 77 69 3d 6f 5e d5 85 5e 35 b3 da 37 0f 1a 21 60 74 bb d0 a5 c9 bf 3b 8c 8c 0a 3a b7 33 0a ac 63 68 11 fa 64 03 ce 02 6b 8a 10 31 8c Data Ascii: 2cbdTm80x#gzirek+K:i$W9gF~4:} f\7jf,7p]9t2ZXoa6-@b'nD>fxc]bgbY^${1q!K%Vv(NZqECrVZ^9dvdEQT0%[wK.@^r%>f,bVWp}W4` 7KgeL2=M"19[6:c/.2AM'M E|=ikO[37(SQ^f$lLwi=o^^57!`t;:3chdk1
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 15 Apr 2025 06:55:14 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecache-control: private, no-cache, max-age=0pragma: no-cachevary: Accept-Encodingcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qPllvBXjyILmBcY2IsYChkU2UmD33cUcTXqYbYDa%2BrJnK90%2FYyHjcT%2Bt2zOn9VTYyZrAmifeayLrrh6lqtXBi2igDSMkS1hxipe2zQ8j%2FM7dba0aaUNKC9yl1KxFHCj4sbZi"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 9309893f39807bc0-ATLContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=111905&min_rtt=111905&rtt_var=55952&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=738&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 32 64 36 0d 0a 1f 8b 08 00 00 00 00 00 00 03 64 54 6d 8b db 38 10 fe 1e b8 ff 30 9b a5 d0 85 78 23 67 1d 7a d8 8e 69 b9 bb 72 07 a5 b7 d0 85 a3 1f 65 6b 1c 0d 2b 4b 3a 69 e2 24 57 fa df 0f 39 c9 be b4 12 c8 92 fc cc a3 99 67 46 aa af 7e ff fb b7 87 af f7 7f 80 e6 c1 34 b3 3a 7d 20 f2 d1 e0 66 ae 91 b6 9a cb 5c 88 37 f3 f4 0b a5 6a 66 f5 80 2c c1 ca 01 37 f3 91 70 ef 5d e0 39 74 ce 32 5a de cc f7 a4 58 6f 14 8e d4 61 36 2d 16 40 96 98 a4 c9 62 27 0d 6e f2 05 44 1d c8 3e 66 ec b2 9e 78 63 5d 62 67 62 83 0d 14 a2 80 cf 8e e1 a3 db 59 f5 cb ac 5e 9e f6 eb c9 a5 e6 fd 80 8a 24 bc f5 01 7b 0c 31 eb 9c 71 21 8b 9d c6 01 4b 25 c3 e3 cd b7 d6 a9 e3 b7 56 76 8f db 90 28 4e 90 f2 5a 08 71 45 43 72 56 5a fe fe bd 5e 9e 08 eb e5 39 aa 64 76 89 fb 64 02 d7 45 51 54 30 c8 b0 25 5b 8a aa 77 96 4b b0 2e 0c d2 40 5e f8 c3 72 25 fc 01 3e 04 92 66 01 7f a2 19 91 a9 93 0b 88 d2 c6 2c 62 a0 be 82 17 12 56 f0 93 57 70 dd f7 7d 95 a2 57 34 fe a0 ba dc b1 ab 60 20 9b bd e2 98 37 90 da 4b 03 c6 03 67 d2 d0 d6 96 d0 a1 65 0c 15 4c ca 97 bf 0a e1 0f 97 10 32 83 3d 97 90 15 a7 4d ef 22 31 39 5b ca 36 3a b3 63 ac 80 9d 2f e1 2e 9d 32 41 d7 e2 4d f2 0d ce ad d6 f9 e5 c4 27 4d 20 89 92 45 fa 0f cb 7c 3d d1 1a b2 f8 e4 f1 69 6b c2 ec 4f 5b ad 33 aa 9a 37 85 28 ea a5 ce 53 51 ad 5e 93 66 c9 89 24 6c f5 4c 0d 77 69 3d 6f 5e d5 85 5e 35 b3 da 37 0f 1a 21 60 74 bb d0 a5 c9 bf 3b 8c 8c 0a 3a b7 33 0a ac 63 68 11 fa 64 03 ce 02 6b 8a 10 Data Ascii: 2d6dTm80x#gzirek+K:i$W9gF~4:} f\7jf,7p]9t2ZXoa6-@b'nD>fxc]bgbY^${1q!K%Vv(NZqECrVZ^9dvdEQT0%[wK.@^r%>f,bVWp}W4` 7KgeL2=M"19[6:c/.2AM'M E|=ikO[37(SQ^f$lLwi=o^^57!`t;:3chdk
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 15 Apr 2025 06:55:16 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecache-control: private, no-cache, max-age=0pragma: no-cachevary: Accept-Encodingcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=NZmi8k6s5UYZjSebyEtohnpZnEFm2o77q022l4kJ%2BKEt2weoHzPZMJaXN%2FolsfPz8SKAALnMrUkjemilm3jpD4tlHXL5FzolPwyni%2FF3dx8Cqw4M2vPjRCX9ra2kK2MdmsNW"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 9309894fdbb453ea-ATLContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=107430&min_rtt=107430&rtt_var=53715&sent=2&recv=8&lost=0&retrans=0&sent_bytes=0&recv_bytes=6995&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 32 64 36 0d 0a 1f 8b 08 00 00 00 00 00 00 03 64 54 6d 8b db 38 10 fe 1e b8 ff 30 9b a5 d0 85 78 23 67 1d 7a d8 8e 69 b9 bb 72 07 a5 b7 d0 85 a3 1f 65 6b 1c 0d 2b 4b 3a 69 e2 24 57 fa df 0f 39 c9 be b4 12 c8 92 fc cc a3 99 67 46 aa af 7e ff fb b7 87 af f7 7f 80 e6 c1 34 b3 3a 7d 20 f2 d1 e0 66 ae 91 b6 9a cb 5c 88 37 f3 f4 0b a5 6a 66 f5 80 2c c1 ca 01 37 f3 91 70 ef 5d e0 39 74 ce 32 5a de cc f7 a4 58 6f 14 8e d4 61 36 2d 16 40 96 98 a4 c9 62 27 0d 6e f2 05 44 1d c8 3e 66 ec b2 9e 78 63 5d 62 67 62 83 0d 14 a2 80 cf 8e e1 a3 db 59 f5 cb ac 5e 9e f6 eb c9 a5 e6 fd 80 8a 24 bc f5 01 7b 0c 31 eb 9c 71 21 8b 9d c6 01 4b 25 c3 e3 cd b7 d6 a9 e3 b7 56 76 8f db 90 28 4e 90 f2 5a 08 71 45 43 72 56 5a fe fe bd 5e 9e 08 eb e5 39 aa 64 76 89 fb 64 02 d7 45 51 54 30 c8 b0 25 5b 8a aa 77 96 4b b0 2e 0c d2 40 5e f8 c3 72 25 fc 01 3e 04 92 66 01 7f a2 19 91 a9 93 0b 88 d2 c6 2c 62 a0 be 82 17 12 56 f0 93 57 70 dd f7 7d 95 a2 57 34 fe a0 ba dc b1 ab 60 20 9b bd e2 98 37 90 da 4b 03 c6 03 67 d2 d0 d6 96 d0 a1 65 0c 15 4c ca 97 bf 0a e1 0f 97 10 32 83 3d 97 90 15 a7 4d ef 22 31 39 5b ca 36 3a b3 63 ac 80 9d 2f e1 2e 9d 32 41 d7 e2 4d f2 0d ce ad d6 f9 e5 c4 27 4d 20 89 92 45 fa 0f cb 7c 3d d1 1a b2 f8 e4 f1 69 6b c2 ec 4f 5b ad 33 aa 9a 37 85 28 ea a5 ce 53 51 ad 5e 93 66 c9 89 24 6c f5 4c 0d 77 69 3d 6f 5e d5 85 5e 35 b3 da 37 0f 1a 21 60 74 bb d0 a5 c9 bf 3b 8c 8c 0a 3a b7 33 0a ac 63 68 11 fa 64 03 ce 02 6b 8a 10 31 Data Ascii: 2d6dTm80x#gzirek+K:i$W9gF~4:} f\7jf,7p]9t2ZXoa6-@b'nD>fxc]bgbY^${1q!K%Vv(NZqECrVZ^9dvdEQT0%[wK.@^r%>f,bVWp}W4` 7KgeL2=M"19[6:c/.2AM'M E|=ikO[37(SQ^f$lLwi=o^^57!`t;:3chdk1
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 15 Apr 2025 06:55:19 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecache-control: private, no-cache, max-age=0pragma: no-cachevary: Accept-Encodingcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=RlOEEZkfVNEZTMDYan%2FmUxLfJM695hcjkeeLuJwGUHz3OYHXT1AwSUb58EM%2FQuXg4kynFeEDyBQMwJ4oNBwymSdiJOV1A%2BfyF81xecm7BMgFzzTbILU1ZmGjKAhSl%2BVhYUZw"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 93098960685ee592-ATLalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=106327&min_rtt=106327&rtt_var=53163&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=454&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                Source: ktmutil.exe, 00000004.00000002.3640307217.000000000405C000.00000004.10000000.00040000.00000000.sdmp, kgiwhJAWTiJvkoTzfbZTr.exe, 0000000B.00000002.3639344553.00000000039AC000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.aibay.top/k12w/?Bz=I6te/k1lbUDv9lUmInG92Y4ZLnEsH0cpjuyXjkObmr6KGlNEilnQgEy9r5056f7AXw2PFR
                Source: Details Of Our PO..exe, 00000000.00000002.1207718181.00000000098B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: Details Of Our PO..exe, 00000000.00000002.1207718181.00000000098B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: Details Of Our PO..exe, 00000000.00000002.1207718181.00000000098B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: Details Of Our PO..exe, 00000000.00000002.1207718181.00000000098B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: Details Of Our PO..exe, 00000000.00000002.1207718181.00000000098B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: Details Of Our PO..exe, 00000000.00000002.1207718181.00000000098B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: Details Of Our PO..exe, 00000000.00000002.1207718181.00000000098B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                Source: Details Of Our PO..exe, 00000000.00000002.1207718181.00000000098B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: Details Of Our PO..exe, 00000000.00000002.1207718181.00000000098B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: Details Of Our PO..exe, 00000000.00000002.1207718181.00000000098B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: Details Of Our PO..exe, 00000000.00000002.1207718181.00000000098B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: Details Of Our PO..exe, 00000000.00000002.1207718181.00000000098B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: Details Of Our PO..exe, 00000000.00000002.1207718181.00000000098B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: Details Of Our PO..exe, 00000000.00000002.1207718181.00000000098B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: Details Of Our PO..exe, 00000000.00000002.1207718181.00000000098B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: Details Of Our PO..exe, 00000000.00000002.1207718181.00000000098B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: Details Of Our PO..exe, 00000000.00000002.1207718181.00000000098B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: Details Of Our PO..exe, 00000000.00000002.1207718181.00000000098B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: Details Of Our PO..exe, 00000000.00000002.1207718181.00000000098B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: kgiwhJAWTiJvkoTzfbZTr.exe, 0000000B.00000002.3641351972.0000000005416000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.skingraphica.net
                Source: kgiwhJAWTiJvkoTzfbZTr.exe, 0000000B.00000002.3641351972.0000000005416000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.skingraphica.net/8u15/
                Source: Details Of Our PO..exe, 00000000.00000002.1207718181.00000000098B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: Details Of Our PO..exe, 00000000.00000002.1207718181.00000000098B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: Details Of Our PO..exe, 00000000.00000002.1207718181.00000000098B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: Details Of Our PO..exe, 00000000.00000002.1207718181.00000000098B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: ktmutil.exe, 00000004.00000003.1499092324.0000000007858000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org?q=
                Source: ktmutil.exe, 00000004.00000003.1499092324.0000000007858000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: ktmutil.exe, 00000004.00000003.1499092324.0000000007858000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: ktmutil.exe, 00000004.00000003.1499092324.0000000007858000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: ktmutil.exe, 00000004.00000003.1499092324.0000000007858000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: ktmutil.exe, 00000004.00000003.1499092324.0000000007858000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabv20
                Source: ktmutil.exe, 00000004.00000003.1499092324.0000000007858000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: ktmutil.exe, 00000004.00000003.1499092324.0000000007858000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gemini.google.com/app?q=
                Source: ktmutil.exe, 00000004.00000002.3636898857.00000000005A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                Source: ktmutil.exe, 00000004.00000002.3636898857.00000000005A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=10330
                Source: ktmutil.exe, 00000004.00000002.3636898857.00000000005A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                Source: ktmutil.exe, 00000004.00000003.1489463452.0000000007825000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
                Source: ktmutil.exe, 00000004.00000002.3640307217.0000000003A14000.00000004.10000000.00040000.00000000.sdmp, kgiwhJAWTiJvkoTzfbZTr.exe, 0000000B.00000002.3639344553.0000000003364000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000C.00000002.1604400830.000000003E164000.00000004.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.3333bet.website
                Source: ktmutil.exe, 00000004.00000003.1499092324.0000000007858000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/v20
                Source: ktmutil.exe, 00000004.00000002.3642564016.0000000005DD0000.00000004.00000800.00020000.00000000.sdmp, ktmutil.exe, 00000004.00000002.3640307217.0000000005010000.00000004.10000000.00040000.00000000.sdmp, kgiwhJAWTiJvkoTzfbZTr.exe, 0000000B.00000002.3639344553.0000000004960000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                Source: ktmutil.exe, 00000004.00000003.1499092324.0000000007858000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico
                Source: ktmutil.exe, 00000004.00000002.3640307217.0000000004CEC000.00000004.10000000.00040000.00000000.sdmp, kgiwhJAWTiJvkoTzfbZTr.exe, 0000000B.00000002.3639344553.000000000463C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.mbalib.com/ysql/?oxr=vzuH8N7P9nf&Bz=MK

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 1.2.Details Of Our PO..exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.Details Of Our PO..exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.3639234599.0000000000B00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3641351972.00000000053B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3636731674.0000000000500000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1306921757.0000000001290000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1304498095.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3638939405.00000000009B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3639012811.0000000003090000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1307125156.0000000001DE0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_012B07D4 NtQueryInformationProcess,0_2_012B07D4
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_012B60A0 NtQueryInformationProcess,0_2_012B60A0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_0042CD23 NtClose,1_2_0042CD23
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F635C0 NtCreateMutant,LdrInitializeThunk,1_2_00F635C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F62B60 NtClose,LdrInitializeThunk,1_2_00F62B60
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F62C70 NtFreeVirtualMemory,LdrInitializeThunk,1_2_00F62C70
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F62DF0 NtQuerySystemInformation,LdrInitializeThunk,1_2_00F62DF0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F63090 NtSetValueKey,1_2_00F63090
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F63010 NtOpenDirectoryObject,1_2_00F63010
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F64340 NtSetContextThread,1_2_00F64340
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F64650 NtSuspendThread,1_2_00F64650
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F639B0 NtGetContextThread,1_2_00F639B0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F62AF0 NtWriteFile,1_2_00F62AF0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F62AD0 NtReadFile,1_2_00F62AD0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F62AB0 NtWaitForSingleObject,1_2_00F62AB0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F62BF0 NtAllocateVirtualMemory,1_2_00F62BF0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F62BE0 NtQueryValueKey,1_2_00F62BE0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F62BA0 NtEnumerateValueKey,1_2_00F62BA0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F62B80 NtQueryInformationFile,1_2_00F62B80
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F62CF0 NtOpenProcess,1_2_00F62CF0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F62CC0 NtQueryVirtualMemory,1_2_00F62CC0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F62CA0 NtQueryInformationToken,1_2_00F62CA0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F62C60 NtCreateKey,1_2_00F62C60
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F62C00 NtQueryInformationProcess,1_2_00F62C00
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F62DD0 NtDelayExecution,1_2_00F62DD0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F62DB0 NtEnumerateKey,1_2_00F62DB0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F63D70 NtOpenThread,1_2_00F63D70
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F62D30 NtUnmapViewOfSection,1_2_00F62D30
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F62D10 NtMapViewOfSection,1_2_00F62D10
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F63D10 NtOpenProcessToken,1_2_00F63D10
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F62D00 NtSetInformationFile,1_2_00F62D00
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F62EE0 NtQueueApcThread,1_2_00F62EE0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F62EA0 NtAdjustPrivilegesToken,1_2_00F62EA0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F62E80 NtReadVirtualMemory,1_2_00F62E80
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F62E30 NtWriteVirtualMemory,1_2_00F62E30
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F62FE0 NtCreateFile,1_2_00F62FE0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F62FB0 NtResumeThread,1_2_00F62FB0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F62FA0 NtQuerySection,1_2_00F62FA0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F62F90 NtProtectVirtualMemory,1_2_00F62F90
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F62F60 NtCreateProcessEx,1_2_00F62F60
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F62F30 NtCreateSection,1_2_00F62F30
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03074340 NtSetContextThread,LdrInitializeThunk,4_2_03074340
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03074650 NtSuspendThread,LdrInitializeThunk,4_2_03074650
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03072B60 NtClose,LdrInitializeThunk,4_2_03072B60
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03072BA0 NtEnumerateValueKey,LdrInitializeThunk,4_2_03072BA0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03072BE0 NtQueryValueKey,LdrInitializeThunk,4_2_03072BE0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03072BF0 NtAllocateVirtualMemory,LdrInitializeThunk,4_2_03072BF0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03072AD0 NtReadFile,LdrInitializeThunk,4_2_03072AD0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03072AF0 NtWriteFile,LdrInitializeThunk,4_2_03072AF0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03072F30 NtCreateSection,LdrInitializeThunk,4_2_03072F30
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03072FB0 NtResumeThread,LdrInitializeThunk,4_2_03072FB0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03072FE0 NtCreateFile,LdrInitializeThunk,4_2_03072FE0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03072E80 NtReadVirtualMemory,LdrInitializeThunk,4_2_03072E80
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03072EE0 NtQueueApcThread,LdrInitializeThunk,4_2_03072EE0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03072D10 NtMapViewOfSection,LdrInitializeThunk,4_2_03072D10
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03072D30 NtUnmapViewOfSection,LdrInitializeThunk,4_2_03072D30
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03072DD0 NtDelayExecution,LdrInitializeThunk,4_2_03072DD0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03072DF0 NtQuerySystemInformation,LdrInitializeThunk,4_2_03072DF0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03072C60 NtCreateKey,LdrInitializeThunk,4_2_03072C60
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03072C70 NtFreeVirtualMemory,LdrInitializeThunk,4_2_03072C70
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03072CA0 NtQueryInformationToken,LdrInitializeThunk,4_2_03072CA0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030735C0 NtCreateMutant,LdrInitializeThunk,4_2_030735C0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030739B0 NtGetContextThread,LdrInitializeThunk,4_2_030739B0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03072B80 NtQueryInformationFile,4_2_03072B80
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03072AB0 NtWaitForSingleObject,4_2_03072AB0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03072F60 NtCreateProcessEx,4_2_03072F60
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03072F90 NtProtectVirtualMemory,4_2_03072F90
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03072FA0 NtQuerySection,4_2_03072FA0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03072E30 NtWriteVirtualMemory,4_2_03072E30
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03072EA0 NtAdjustPrivilegesToken,4_2_03072EA0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03072D00 NtSetInformationFile,4_2_03072D00
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03072DB0 NtEnumerateKey,4_2_03072DB0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03072C00 NtQueryInformationProcess,4_2_03072C00
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03072CC0 NtQueryVirtualMemory,4_2_03072CC0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03072CF0 NtOpenProcess,4_2_03072CF0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03073010 NtOpenDirectoryObject,4_2_03073010
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03073090 NtSetValueKey,4_2_03073090
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03073D10 NtOpenProcessToken,4_2_03073D10
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03073D70 NtOpenThread,4_2_03073D70
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_005293D0 NtCreateFile,4_2_005293D0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_00529540 NtReadFile,4_2_00529540
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_00529630 NtDeleteFile,4_2_00529630
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_005296D0 NtClose,4_2_005296D0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_00529830 NtAllocateVirtualMemory,4_2_00529830
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_012B65680_2_012B6568
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_012B08C00_2_012B08C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_012B0F600_2_012B0F60
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_012B65580_2_012B6558
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_012B37710_2_012B3771
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_012B37800_2_012B3780
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_012B67840_2_012B6784
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_012B57E00_2_012B57E0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_012B57F00_2_012B57F0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_012B093A0_2_012B093A
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_012B5BB80_2_012B5BB8
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_012B5BC80_2_012B5BC8
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_012B2C410_2_012B2C41
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_012B2C500_2_012B2C50
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_0985A4480_2_0985A448
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_0985F87A0_2_0985F87A
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_0985C1710_2_0985C171
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_098503F00_2_098503F0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_098504000_2_09850400
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_0985A43F0_2_0985A43F
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_0A25CBC80_2_0A25CBC8
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_0A2578300_2_0A257830
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_0A25781F0_2_0A25781F
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_0A255FD10_2_0A255FD1
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_0A2581E00_2_0A2581E0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_0A2586180_2_0A258618
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_0A2564280_2_0A256428
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00418B731_2_00418B73
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_004010C01_2_004010C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_004031351_2_00403135
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_004012401_2_00401240
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_004102DB1_2_004102DB
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_004102E31_2_004102E3
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_0042F3431_2_0042F343
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00402B301_2_00402B30
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_004033D01_2_004033D0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_0040E4E31_2_0040E4E3
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00416D6F1_2_00416D6F
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00416D731_2_00416D73
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_004105031_2_00410503
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_0040E6271_2_0040E627
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_0040E6331_2_0040E633
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00402F901_2_00402F90
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_004027A01_2_004027A0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FE70E91_2_00FE70E9
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FEF0E01_2_00FEF0E0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FDF0CC1_2_00FDF0CC
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F370C01_2_00F370C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FE81CC1_2_00FE81CC
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F3B1B01_2_00F3B1B0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FF01AA1_2_00FF01AA
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1F1721_2_00F1F172
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FFB16B1_2_00FFB16B
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F6516C1_2_00F6516C
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FB81581_2_00FB8158
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FCA1181_2_00FCA118
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F201001_2_00F20100
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD12ED1_2_00FD12ED
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4B2C01_2_00F4B2C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F352A01_2_00F352A0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD02741_2_00FD0274
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F3E3F01_2_00F3E3F0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FF03E61_2_00FF03E6
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F7739A1_2_00F7739A
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FEA3521_2_00FEA352
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1D34C1_2_00F1D34C
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FE132D1_2_00FE132D
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FDE4F61_2_00FDE4F6
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F214601_2_00F21460
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FE24461_2_00FE2446
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FEF43F1_2_00FEF43F
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FCD5B01_2_00FCD5B0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FF05911_2_00FF0591
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FE75711_2_00FE7571
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F305351_2_00F30535
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4C6E01_2_00F4C6E0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FE16CC1_2_00FE16CC
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F2C7C01_2_00F2C7C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FEF7B01_2_00FEF7B0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F307701_2_00F30770
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F547501_2_00F54750
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5E8F01_2_00F5E8F0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F338E01_2_00F338E0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F168B81_2_00F168B8
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F328401_2_00F32840
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F3A8401_2_00F3A840
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F9D8001_2_00F9D800
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F329A01_2_00F329A0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FFA9A61_2_00FFA9A6
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F469621_2_00F46962
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F399501_2_00F39950
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4B9501_2_00F4B950
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FDDAC61_2_00FDDAC6
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FCDAAC1_2_00FCDAAC
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F75AA01_2_00F75AA0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F2EA801_2_00F2EA80
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA3A6C1_2_00FA3A6C
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FEFA491_2_00FEFA49
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FE7A461_2_00FE7A46
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA5BF01_2_00FA5BF0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F6DBF91_2_00F6DBF9
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FE6BD71_2_00FE6BD7
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4FB801_2_00F4FB80
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FEFB761_2_00FEFB76
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FEAB401_2_00FEAB40
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F20CF21_2_00F20CF2
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FEFCF21_2_00FEFCF2
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD0CB51_2_00FD0CB5
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA9C321_2_00FA9C32
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F30C001_2_00F30C00
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F2ADE01_2_00F2ADE0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4FDC01_2_00F4FDC0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F48DBF1_2_00F48DBF
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FE7D731_2_00FE7D73
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FE1D5A1_2_00FE1D5A
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F33D401_2_00F33D40
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F3AD001_2_00F3AD00
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FEEEDB1_2_00FEEEDB
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F39EB01_2_00F39EB0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F42E901_2_00F42E90
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FECE931_2_00FECE93
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F30E591_2_00F30E59
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FEEE261_2_00FEEE26
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F3CFE01_2_00F3CFE0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F22FC81_2_00F22FC8
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FEFFB11_2_00FEFFB1
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F31F921_2_00F31F92
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA4F401_2_00FA4F40
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F50F301_2_00F50F30
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F72F281_2_00F72F28
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FEFF091_2_00FEFF09
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeCode function: 3_2_033083163_2_03308316
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeCode function: 3_2_0330EB823_2_0330EB82
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeCode function: 3_2_0330EB863_2_0330EB86
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeCode function: 3_2_033062F63_2_033062F6
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeCode function: 3_2_0331097D3_2_0331097D
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeCode function: 3_2_033271563_2_03327156
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeCode function: 3_2_033080F63_2_033080F6
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeCode function: 3_2_033080EE3_2_033080EE
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeCode function: 3_2_033064463_2_03306446
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030FA3524_2_030FA352
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0304E3F04_2_0304E3F0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_031003E64_2_031003E6
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030E02744_2_030E0274
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030C02C04_2_030C02C0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030301004_2_03030100
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030DA1184_2_030DA118
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030C81584_2_030C8158
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030F41A24_2_030F41A2
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_031001AA4_2_031001AA
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030F81CC4_2_030F81CC
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030D20004_2_030D2000
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030647504_2_03064750
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030407704_2_03040770
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0305C6E04_2_0305C6E0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030405354_2_03040535
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_031005914_2_03100591
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030E44204_2_030E4420
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030F24464_2_030F2446
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030EE4F64_2_030EE4F6
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030FAB404_2_030FAB40
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030F6BD74_2_030F6BD7
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0303EA804_2_0303EA80
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030569624_2_03056962
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030429A04_2_030429A0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0310A9A64_2_0310A9A6
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0304A8404_2_0304A840
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030428404_2_03042840
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030268B84_2_030268B8
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0306E8F04_2_0306E8F0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03082F284_2_03082F28
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03060F304_2_03060F30
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030E2F304_2_030E2F30
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030B4F404_2_030B4F40
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030BEFA04_2_030BEFA0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03032FC84_2_03032FC8
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0304CFE04_2_0304CFE0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030FEE264_2_030FEE26
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03040E594_2_03040E59
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03052E904_2_03052E90
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030FCE934_2_030FCE93
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030FEEDB4_2_030FEEDB
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0304AD004_2_0304AD00
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030DCD1F4_2_030DCD1F
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03058DBF4_2_03058DBF
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0303ADE04_2_0303ADE0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03040C004_2_03040C00
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030E0CB54_2_030E0CB5
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03030CF24_2_03030CF2
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030F132D4_2_030F132D
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0302D34C4_2_0302D34C
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0308739A4_2_0308739A
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030452A04_2_030452A0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0305B2C04_2_0305B2C0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030E12ED4_2_030E12ED
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0307516C4_2_0307516C
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0302F1724_2_0302F172
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0310B16B4_2_0310B16B
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0304B1B04_2_0304B1B0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030EF0CC4_2_030EF0CC
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030470C04_2_030470C0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030F70E94_2_030F70E9
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030FF0E04_2_030FF0E0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030FF7B04_2_030FF7B0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030856304_2_03085630
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030F16CC4_2_030F16CC
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030F75714_2_030F7571
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030DD5B04_2_030DD5B0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_031095C34_2_031095C3
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030FF43F4_2_030FF43F
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030314604_2_03031460
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030FFB764_2_030FFB76
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0305FB804_2_0305FB80
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030B5BF04_2_030B5BF0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0307DBF94_2_0307DBF9
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030FFA494_2_030FFA49
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030F7A464_2_030F7A46
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030B3A6C4_2_030B3A6C
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030DDAAC4_2_030DDAAC
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03085AA04_2_03085AA0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030E1AA34_2_030E1AA3
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030EDAC64_2_030EDAC6
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030D59104_2_030D5910
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030499504_2_03049950
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0305B9504_2_0305B950
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030AD8004_2_030AD800
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030438E04_2_030438E0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030FFF094_2_030FFF09
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03041F924_2_03041F92
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030FFFB14_2_030FFFB1
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03003FD24_2_03003FD2
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03003FD54_2_03003FD5
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03049EB04_2_03049EB0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_03043D404_2_03043D40
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030F1D5A4_2_030F1D5A
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030F7D734_2_030F7D73
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0305FDC04_2_0305FDC0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030B9C324_2_030B9C32
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030FFCF24_2_030FFCF2
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_00511E404_2_00511E40
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0050CC904_2_0050CC90
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0050CC884_2_0050CC88
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0050AE904_2_0050AE90
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0050CEB04_2_0050CEB0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0050AFD44_2_0050AFD4
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0050AFE04_2_0050AFE0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_005155204_2_00515520
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0051371C4_2_0051371C
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_005137204_2_00513720
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0052BCF04_2_0052BCF0
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_00C0E33C4_2_00C0E33C
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_00C0E4834_2_00C0E483
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_00C0D8E84_2_00C0D8E8
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_00C0E81C4_2_00C0E81C
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_00C0CB884_2_00C0CB88
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: String function: 030BF290 appears 105 times
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: String function: 03075130 appears 58 times
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: String function: 030AEA12 appears 86 times
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: String function: 0302B970 appears 280 times
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: String function: 03087E54 appears 111 times
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: String function: 00F65130 appears 36 times
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: String function: 00FAF290 appears 105 times
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: String function: 00F77E54 appears 93 times
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: String function: 00F1B970 appears 268 times
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: String function: 00F9EA12 appears 86 times
                Source: Details Of Our PO..exe, 00000000.00000000.1175504825.0000000000C9E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedioK.exe( vs Details Of Our PO..exe
                Source: Details Of Our PO..exe, 00000000.00000002.1209596073.000000000A500000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Details Of Our PO..exe
                Source: Details Of Our PO..exe, 00000000.00000002.1200375344.00000000012DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Details Of Our PO..exe
                Source: Details Of Our PO..exe, 00000001.00000002.1304752116.0000000000937000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamektmutil.exej% vs Details Of Our PO..exe
                Source: Details Of Our PO..exe, 00000001.00000002.1305230211.000000000101D000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Details Of Our PO..exe
                Source: Details Of Our PO..exeBinary or memory string: OriginalFilenamedioK.exe( vs Details Of Our PO..exe
                Source: Details Of Our PO..exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: Details Of Our PO..exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 0.2.Details Of Our PO..exe.4cb61b8.5.raw.unpack, N6Vo3p1v0BooWZZpdw.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.Details Of Our PO..exe.4cb61b8.5.raw.unpack, N6Vo3p1v0BooWZZpdw.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.Details Of Our PO..exe.4cb61b8.5.raw.unpack, N6Vo3p1v0BooWZZpdw.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: 0.2.Details Of Our PO..exe.4d40fd8.4.raw.unpack, MfXsNDEYnYkPrZcmpb.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.Details Of Our PO..exe.4d40fd8.4.raw.unpack, MfXsNDEYnYkPrZcmpb.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.Details Of Our PO..exe.a500000.7.raw.unpack, MfXsNDEYnYkPrZcmpb.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.Details Of Our PO..exe.a500000.7.raw.unpack, MfXsNDEYnYkPrZcmpb.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.Details Of Our PO..exe.4d40fd8.4.raw.unpack, N6Vo3p1v0BooWZZpdw.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.Details Of Our PO..exe.4d40fd8.4.raw.unpack, N6Vo3p1v0BooWZZpdw.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.Details Of Our PO..exe.4d40fd8.4.raw.unpack, N6Vo3p1v0BooWZZpdw.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: 0.2.Details Of Our PO..exe.4cb61b8.5.raw.unpack, MfXsNDEYnYkPrZcmpb.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.Details Of Our PO..exe.4cb61b8.5.raw.unpack, MfXsNDEYnYkPrZcmpb.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.Details Of Our PO..exe.a500000.7.raw.unpack, N6Vo3p1v0BooWZZpdw.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.Details Of Our PO..exe.a500000.7.raw.unpack, N6Vo3p1v0BooWZZpdw.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.Details Of Our PO..exe.a500000.7.raw.unpack, N6Vo3p1v0BooWZZpdw.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/2@16/12
                Source: C:\Users\user\Desktop\Details Of Our PO..exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Details Of Our PO..exe.logJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeMutant created: NULL
                Source: C:\Windows\SysWOW64\ktmutil.exeFile created: C:\Users\user\AppData\Local\Temp\z3oM-2xJump to behavior
                Source: Details Of Our PO..exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: Details Of Our PO..exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: ktmutil.exe, 00000004.00000002.3636898857.0000000000607000.00000004.00000020.00020000.00000000.sdmp, ktmutil.exe, 00000004.00000003.1490951056.0000000000607000.00000004.00000020.00020000.00000000.sdmp, ktmutil.exe, 00000004.00000003.1490951056.00000000005E6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: Details Of Our PO..exeVirustotal: Detection: 51%
                Source: Details Of Our PO..exeReversingLabs: Detection: 52%
                Source: unknownProcess created: C:\Users\user\Desktop\Details Of Our PO..exe "C:\Users\user\Desktop\Details Of Our PO..exe"
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess created: C:\Users\user\Desktop\Details Of Our PO..exe "C:\Users\user\Desktop\Details Of Our PO..exe"
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeProcess created: C:\Windows\SysWOW64\ktmutil.exe "C:\Windows\SysWOW64\ktmutil.exe"
                Source: C:\Windows\SysWOW64\ktmutil.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess created: C:\Users\user\Desktop\Details Of Our PO..exe "C:\Users\user\Desktop\Details Of Our PO..exe"Jump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeProcess created: C:\Windows\SysWOW64\ktmutil.exe "C:\Windows\SysWOW64\ktmutil.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeSection loaded: iconcodecservice.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: ktmw32.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: winsqlite3.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                Source: Details Of Our PO..exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: Details Of Our PO..exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: wntdll.pdbUGP source: Details Of Our PO..exe, 00000001.00000002.1305230211.0000000000EF0000.00000040.00001000.00020000.00000000.sdmp, ktmutil.exe, 00000004.00000003.1304959427.0000000000A23000.00000004.00000020.00020000.00000000.sdmp, ktmutil.exe, 00000004.00000002.3639639405.0000000003000000.00000040.00001000.00020000.00000000.sdmp, ktmutil.exe, 00000004.00000002.3639639405.000000000319E000.00000040.00001000.00020000.00000000.sdmp, ktmutil.exe, 00000004.00000003.1308013332.0000000000BD5000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: Details Of Our PO..exe, Details Of Our PO..exe, 00000001.00000002.1305230211.0000000000EF0000.00000040.00001000.00020000.00000000.sdmp, ktmutil.exe, ktmutil.exe, 00000004.00000003.1304959427.0000000000A23000.00000004.00000020.00020000.00000000.sdmp, ktmutil.exe, 00000004.00000002.3639639405.0000000003000000.00000040.00001000.00020000.00000000.sdmp, ktmutil.exe, 00000004.00000002.3639639405.000000000319E000.00000040.00001000.00020000.00000000.sdmp, ktmutil.exe, 00000004.00000003.1308013332.0000000000BD5000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: ktmutil.pdbGCTL source: Details Of Our PO..exe, 00000001.00000002.1304752116.0000000000937000.00000004.00000020.00020000.00000000.sdmp, kgiwhJAWTiJvkoTzfbZTr.exe, 00000003.00000002.3637599691.000000000092E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: ktmutil.pdb source: Details Of Our PO..exe, 00000001.00000002.1304752116.0000000000937000.00000004.00000020.00020000.00000000.sdmp, kgiwhJAWTiJvkoTzfbZTr.exe, 00000003.00000002.3637599691.000000000092E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Work\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: kgiwhJAWTiJvkoTzfbZTr.exe, 00000003.00000000.1226816694.0000000000A7F000.00000002.00000001.01000000.0000000C.sdmp, kgiwhJAWTiJvkoTzfbZTr.exe, 0000000B.00000002.3637340658.0000000000A7F000.00000002.00000001.01000000.0000000C.sdmp

                Data Obfuscation

                barindex
                Source: C:\Users\user\Desktop\Details Of Our PO..exeUnpacked PE file: 0.2.Details Of Our PO..exe.bd0000.0.unpack .text:ER;.rsrc:R;.reloc:R; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:R;
                Source: C:\Users\user\Desktop\Details Of Our PO..exeUnpacked PE file: 0.2.Details Of Our PO..exe.bd0000.0.unpack
                Source: 0.2.Details Of Our PO..exe.32d6fbc.1.raw.unpack, dTuvtD1DdyQbwj9dR3.cs.Net Code: CP08EDIlFp4tShm7sYs System.Reflection.Assembly.Load(byte[])
                Source: 0.2.Details Of Our PO..exe.a500000.7.raw.unpack, N6Vo3p1v0BooWZZpdw.cs.Net Code: LZO5uZvVbN System.Reflection.Assembly.Load(byte[])
                Source: 0.2.Details Of Our PO..exe.4cb61b8.5.raw.unpack, N6Vo3p1v0BooWZZpdw.cs.Net Code: LZO5uZvVbN System.Reflection.Assembly.Load(byte[])
                Source: 0.2.Details Of Our PO..exe.4d40fd8.4.raw.unpack, N6Vo3p1v0BooWZZpdw.cs.Net Code: LZO5uZvVbN System.Reflection.Assembly.Load(byte[])
                Source: 0.2.Details Of Our PO..exe.9860000.6.raw.unpack, dTuvtD1DdyQbwj9dR3.cs.Net Code: CP08EDIlFp4tShm7sYs System.Reflection.Assembly.Load(byte[])
                Source: Details Of Our PO..exeStatic PE information: 0xCD72A704 [Fri Mar 24 00:25:40 2079 UTC]
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_012B1E7A push cs; retf 0_2_012B1E8D
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 0_2_0A25DDD5 push FFFFFF8Bh; iretd 0_2_0A25DDD7
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_0042D853 push ds; ret 1_2_0042D916
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_0041B0C9 push cs; retf 1_2_0041B0D1
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_004189B9 push ecx; ret 1_2_004189C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00401560 push ss; retn 4683h1_2_00401691
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00403650 push eax; ret 1_2_00403652
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_0040AECC push es; ret 1_2_0040AEE4
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_0041EEED push edi; iretd 1_2_0041EEEF
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00414EF6 push esi; iretd 1_2_00414EF7
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00426F53 push ecx; ret 1_2_00426FAC
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F209AD push ecx; mov dword ptr [esp], ecx1_2_00F209B6
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeCode function: 3_2_033107CC push ecx; ret 3_2_033107D3
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeCode function: 3_2_03312EDC push cs; retf 3_2_03312EE4
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeCode function: 3_2_03316D00 push edi; iretd 3_2_03316D02
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeCode function: 3_2_0330CD09 push esi; iretd 3_2_0330CD0A
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeCode function: 3_2_03302CDF push es; ret 3_2_03302CF7
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0300225F pushad ; ret 4_2_030027F9
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030027FA pushad ; ret 4_2_030027F9
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_030309AD push ecx; mov dword ptr [esp], ecx4_2_030309B6
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0300283D push eax; iretd 4_2_03002858
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0300135E push eax; iretd 4_2_03001369
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0052A200 push ds; ret 4_2_0052A2C3
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0051C2A4 push es; retf 4_2_0051C2A5
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0051C397 push 50DE8CE6h; ret 4_2_0051C3AF
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0051C5AE push esp; ret 4_2_0051C5B1
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0051CFFB push esp; iretd 4_2_0051D008
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_00515366 push ecx; ret 4_2_0051536D
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_00507879 push es; ret 4_2_00507891
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0051B89A push edi; iretd 4_2_0051B89C
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0051D8BF push ecx; ret 4_2_0051D8C0
                Source: Details Of Our PO..exeStatic PE information: section name: .text entropy: 7.7955549604489764
                Source: 0.2.Details Of Our PO..exe.32d6fbc.1.raw.unpack, P3eh8af2o4VTkSD0Y3.csHigh entropy of concatenated method names: 'Dispose', 'P3efh8a2o', 'yH8LT4C6bmLeWc8YL5', 'L4Ca6Xd2uZ8fu7tskX', 'DguxHGFPrqLRK6Jgbs', 'rGmoViKuA1CYkAIaDT', 'pSCfTfOip17KqF4YlD', 'FPnfDwDcQAmPdvY5g0', 'tTY1xtxACVStGqjdTk', 'B1WwFvRAyy9IRNc19V'
                Source: 0.2.Details Of Our PO..exe.32d6fbc.1.raw.unpack, dTuvtD1DdyQbwj9dR3.csHigh entropy of concatenated method names: 'KYGvAvhTF', 'JFn7SRQet', 'ax2QgSfgc', 'g5OeQ68r3', 'a6IZjF0TE', 'UeGcOh08y', 'PKxX9EuHD', 'OcPJIHTlp', 'Ym7kCXKit', 'LsoLtyUhZ'
                Source: 0.2.Details Of Our PO..exe.32d6fbc.1.raw.unpack, ihTFxFFnSRQetgx2gS.csHigh entropy of concatenated method names: 'ISrkpyii4tSUs', 'b50WjUTaChgUDI2NEVw', 'gQERmsTu2tA2TFSBlH8', 'rFnpM5TnkllvYULeG2c', 'vcFCwhTvUgN9tUBDaUO', 'frROXdT0dSL2FIpOj8j', 'zOHiqMTZkx59a1xMwqr'
                Source: 0.2.Details Of Our PO..exe.a500000.7.raw.unpack, uihWa9FRNPUyOSq1R0w.csHigh entropy of concatenated method names: 'ToString', 'D8gOEvB54d', 'h92OnlaZ0j', 'zUFOB1KFHJ', 'JDAObnr4KK', 'RQBO2mIvf9', 'jM3OIcGR1N', 'Sp3OkB4Cl3', 'sFvm2glEe42iJh5lM0P', 'Rr6NNtlf2OFExmiLt7m'
                Source: 0.2.Details Of Our PO..exe.a500000.7.raw.unpack, sgYpuIRNQ2QwSlpx68.csHigh entropy of concatenated method names: 'cXhu9QJOJ', 'CZ8s7H8EY', 'oymhmHKfI', 'LIf6vOa1c', 'BxKnABxSC', 'gWkBoxBsm', 'v7QNdmp6vB0MGxA8W9', 'swx9s91FIxRKNevx8y', 'domc7S4LR', 'qAZQmn1rl'
                Source: 0.2.Details Of Our PO..exe.a500000.7.raw.unpack, gtI4bxPOtVjtuknJxd.csHigh entropy of concatenated method names: 'svOyb5sGNb', 'xOAy2nWt1h', 'N9VyI0s7hu', 'kaqykBNvkv', 'F40ytqdM1n', 'th6yeQy0BT', 'a8WyAsL9w7', 'k7py7Z011P', 'Uk7yNuNi3u', 'HSAyK1mFvD'
                Source: 0.2.Details Of Our PO..exe.a500000.7.raw.unpack, quylH1lKWtWtiZvsj0.csHigh entropy of concatenated method names: 't5SLE7Vil9', 'qm9LnunbTy', 'NZYLbdswJq', 'bEDL2aqTy0', 'LHqLkWMN5L', 'F7PLtIwLfy', 'byWLAo5hd2', 'QmvL7TCTpA', 'cC8LK1nfRa', 'SLFLHyuu99'
                Source: 0.2.Details Of Our PO..exe.a500000.7.raw.unpack, dksBp9C3TcHBhSymSe.csHigh entropy of concatenated method names: 'Dispose', 'AhqFPwu1Au', 'jvYR2cR8mt', 'C8vpJEZZEn', 'xAFFjD9x33', 'TsIFzA4M2i', 'ProcessDialogKey', 'RVxRDtI4bx', 'ttVRFjtukn', 'UxdRRLflBT'
                Source: 0.2.Details Of Our PO..exe.a500000.7.raw.unpack, FsxC5cY5JBbsab0uYC.csHigh entropy of concatenated method names: 'fPQ39DAlfP', 'ygD3jRH0ps', 'vBUcD82dKS', 'LKhcFAqrJJ', 'qLy3HDJaVv', 'GV73ZloRG0', 'MgM3la5HL5', 's6W3oT5T7A', 'PqR3V554yn', 'y2u3dtgirx'
                Source: 0.2.Details Of Our PO..exe.a500000.7.raw.unpack, MfXsNDEYnYkPrZcmpb.csHigh entropy of concatenated method names: 'FFVCowy8HK', 'yh6CVXUadC', 'NwjCdwTLCu', 'hlrCqlZ3X0', 'K2fCJSgLjm', 'FulCYvS3Gr', 'CPDCWiJTkH', 'D0CC94GRYW', 'aEcCPW7aI5', 'Ya0CjIWQyP'
                Source: 0.2.Details Of Our PO..exe.a500000.7.raw.unpack, SCTBPMFD3SwVyQGyQaN.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'FyFQHN4VLl', 'sobQZudeyN', 'fNoQl0lhZe', 'IVnQos8S18', 'VrIQVanFKj', 'OjHQdFkWZH', 'o51QqRX8gl'
                Source: 0.2.Details Of Our PO..exe.a500000.7.raw.unpack, wjwVVn56BIUeuOnJiN.csHigh entropy of concatenated method names: 'dxNFwfXsND', 'VnYF1kPrZc', 'IHWFXv8NjV', 'CC5FSAfWWw', 'ICdFGmlDeL', 'kxPFaHBMml', 'tpkABJOekJf36BOnJt', 'sDNXH05w3n98o1Mj8y', 'tP8ajv4uPZ67jrIuFf', 'VJSFFREjiD'
                Source: 0.2.Details Of Our PO..exe.a500000.7.raw.unpack, nflBTaj7TwdbrnbVJd.csHigh entropy of concatenated method names: 'JbLQxfV6nG', 'nTGQUYsawW', 'yCWQr7ClVY', 'ejuQwR1THM', 'EZyQyMA8A9', 'fa5Q1dhJnA', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.Details Of Our PO..exe.a500000.7.raw.unpack, N6Vo3p1v0BooWZZpdw.csHigh entropy of concatenated method names: 'VyJmfOqCkW', 'FODmvZkWKX', 'SapmCXRI1l', 'JLimxkMXLH', 'oRpmUTPpGI', 'd31mr5b5rO', 'CqRmwFYYQ6', 'iXXm1hv4pc', 'n8PmTDWblj', 'TV9mX81T3F'
                Source: 0.2.Details Of Our PO..exe.a500000.7.raw.unpack, sT4WaknHWv8NjVhC5A.csHigh entropy of concatenated method names: 'QiZxs8PAnH', 'FUUxhJrV6m', 'BTYxELLarg', 'jWGxnqWqbe', 'R9RxG3BLSr', 'GI4xabxAki', 'HWSx31A9tE', 'tW1xcNcUY7', 'QD2xyTscQ5', 'pOJxQq7JV0'
                Source: 0.2.Details Of Our PO..exe.a500000.7.raw.unpack, Vau9IxF5u5OKCAJdxE0.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'BBGpyY8pGY', 'OoupQXsko4', 'pr9pOgIoUf', 'u48ppkwQ00', 'v0Dp4mCYqn', 'PAZpM6wP2l', 'leNpiSP3Y2'
                Source: 0.2.Details Of Our PO..exe.a500000.7.raw.unpack, I3yXh5z8QOrOMYaR4C.csHigh entropy of concatenated method names: 'PgFQhOfwmK', 'PjaQEWKkOI', 't7XQnGweP5', 'vMYQbM7Z2w', 'QqHQ27Vim3', 'CLEQkDrMGq', 'oWfQt7RJNo', 'IHAQiu6AvE', 'uaDQ0lJx8R', 'jyCQg61PYn'
                Source: 0.2.Details Of Our PO..exe.a500000.7.raw.unpack, TVcieEFF8ZPTljS25dw.csHigh entropy of concatenated method names: 'QsTQjHYlny', 'rR1QzPMYXb', 'BQ5ODw0ywl', 'dCrOFqbAOu', 'BkaORHVRDv', 'DsVOmYBkdS', 'HpZO5gTpNh', 'bEFOf9FYZh', 'JB6Ovy0mCE', 'ntZOCUQA4g'
                Source: 0.2.Details Of Our PO..exe.a500000.7.raw.unpack, XsWC8dADtygZTgViow.csHigh entropy of concatenated method names: 'aPvwv9e9IN', 'X8bwx3RU7a', 'KCywr31qk9', 'srXrjvdaZh', 'XyCrzIVWA1', 'dN0wDUpFUl', 'z9fwFLJoT5', 'JDswRxYXIM', 'mjlwmgbVqk', 'v3Ow51DZnI'
                Source: 0.2.Details Of Our PO..exe.a500000.7.raw.unpack, xyNcKuqSWdy7N7fAyC.csHigh entropy of concatenated method names: 'UYq3XgSZJV', 'PMX3SiaHv4', 'ToString', 'jcb3vMKQTN', 'hqP3CQfka6', 'GxI3xgrehK', 'Go33U9cuoC', 'eio3rIu1Ch', 'vuW3wtaEH5', 'd77313ith6'
                Source: 0.2.Details Of Our PO..exe.a500000.7.raw.unpack, aeL1xPbHBMmlqA63j6.csHigh entropy of concatenated method names: 'hRrrfFf9KG', 'IeZrCGvGio', 'RbIrUHJAK9', 'nlFrwT5x4M', 'mgSr1dkTCx', 'AvDUJG4e6b', 'SxrUYCFKlr', 'pFhUWenFI7', 'LaIU9IYvA5', 'dBLUPkkBhn'
                Source: 0.2.Details Of Our PO..exe.a500000.7.raw.unpack, uHkTEUWoI8hqwu1Aui.csHigh entropy of concatenated method names: 'Wp9yGDShrG', 'nRiy39sUMD', 'Tjyyy9oZR5', 'TtuyOcdErH', 'j0yy4wsdfQ', 'k5XyiuDVhr', 'Dispose', 'OgOcviEJOM', 'wj8cCYVXXu', 'cBScxP2gnt'
                Source: 0.2.Details Of Our PO..exe.a500000.7.raw.unpack, C1JruYNs1Thr5cMP1m.csHigh entropy of concatenated method names: 'EQsw0UuJMD', 'nNIwgpDvPr', 'hTdwuvNEHm', 'fSCwsvnkut', 'AgJw8GIxe0', 'wvywh5iZa6', 'k3tw6uFmDO', 'zQ8wEuK1TI', 'qadwnBExtp', 'uPcwBmMc0P'
                Source: 0.2.Details Of Our PO..exe.4cb61b8.5.raw.unpack, uihWa9FRNPUyOSq1R0w.csHigh entropy of concatenated method names: 'ToString', 'D8gOEvB54d', 'h92OnlaZ0j', 'zUFOB1KFHJ', 'JDAObnr4KK', 'RQBO2mIvf9', 'jM3OIcGR1N', 'Sp3OkB4Cl3', 'sFvm2glEe42iJh5lM0P', 'Rr6NNtlf2OFExmiLt7m'
                Source: 0.2.Details Of Our PO..exe.4cb61b8.5.raw.unpack, sgYpuIRNQ2QwSlpx68.csHigh entropy of concatenated method names: 'cXhu9QJOJ', 'CZ8s7H8EY', 'oymhmHKfI', 'LIf6vOa1c', 'BxKnABxSC', 'gWkBoxBsm', 'v7QNdmp6vB0MGxA8W9', 'swx9s91FIxRKNevx8y', 'domc7S4LR', 'qAZQmn1rl'
                Source: 0.2.Details Of Our PO..exe.4cb61b8.5.raw.unpack, gtI4bxPOtVjtuknJxd.csHigh entropy of concatenated method names: 'svOyb5sGNb', 'xOAy2nWt1h', 'N9VyI0s7hu', 'kaqykBNvkv', 'F40ytqdM1n', 'th6yeQy0BT', 'a8WyAsL9w7', 'k7py7Z011P', 'Uk7yNuNi3u', 'HSAyK1mFvD'
                Source: 0.2.Details Of Our PO..exe.4cb61b8.5.raw.unpack, quylH1lKWtWtiZvsj0.csHigh entropy of concatenated method names: 't5SLE7Vil9', 'qm9LnunbTy', 'NZYLbdswJq', 'bEDL2aqTy0', 'LHqLkWMN5L', 'F7PLtIwLfy', 'byWLAo5hd2', 'QmvL7TCTpA', 'cC8LK1nfRa', 'SLFLHyuu99'
                Source: 0.2.Details Of Our PO..exe.4cb61b8.5.raw.unpack, dksBp9C3TcHBhSymSe.csHigh entropy of concatenated method names: 'Dispose', 'AhqFPwu1Au', 'jvYR2cR8mt', 'C8vpJEZZEn', 'xAFFjD9x33', 'TsIFzA4M2i', 'ProcessDialogKey', 'RVxRDtI4bx', 'ttVRFjtukn', 'UxdRRLflBT'
                Source: 0.2.Details Of Our PO..exe.4cb61b8.5.raw.unpack, FsxC5cY5JBbsab0uYC.csHigh entropy of concatenated method names: 'fPQ39DAlfP', 'ygD3jRH0ps', 'vBUcD82dKS', 'LKhcFAqrJJ', 'qLy3HDJaVv', 'GV73ZloRG0', 'MgM3la5HL5', 's6W3oT5T7A', 'PqR3V554yn', 'y2u3dtgirx'
                Source: 0.2.Details Of Our PO..exe.4cb61b8.5.raw.unpack, MfXsNDEYnYkPrZcmpb.csHigh entropy of concatenated method names: 'FFVCowy8HK', 'yh6CVXUadC', 'NwjCdwTLCu', 'hlrCqlZ3X0', 'K2fCJSgLjm', 'FulCYvS3Gr', 'CPDCWiJTkH', 'D0CC94GRYW', 'aEcCPW7aI5', 'Ya0CjIWQyP'
                Source: 0.2.Details Of Our PO..exe.4cb61b8.5.raw.unpack, SCTBPMFD3SwVyQGyQaN.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'FyFQHN4VLl', 'sobQZudeyN', 'fNoQl0lhZe', 'IVnQos8S18', 'VrIQVanFKj', 'OjHQdFkWZH', 'o51QqRX8gl'
                Source: 0.2.Details Of Our PO..exe.4cb61b8.5.raw.unpack, wjwVVn56BIUeuOnJiN.csHigh entropy of concatenated method names: 'dxNFwfXsND', 'VnYF1kPrZc', 'IHWFXv8NjV', 'CC5FSAfWWw', 'ICdFGmlDeL', 'kxPFaHBMml', 'tpkABJOekJf36BOnJt', 'sDNXH05w3n98o1Mj8y', 'tP8ajv4uPZ67jrIuFf', 'VJSFFREjiD'
                Source: 0.2.Details Of Our PO..exe.4cb61b8.5.raw.unpack, nflBTaj7TwdbrnbVJd.csHigh entropy of concatenated method names: 'JbLQxfV6nG', 'nTGQUYsawW', 'yCWQr7ClVY', 'ejuQwR1THM', 'EZyQyMA8A9', 'fa5Q1dhJnA', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.Details Of Our PO..exe.4cb61b8.5.raw.unpack, N6Vo3p1v0BooWZZpdw.csHigh entropy of concatenated method names: 'VyJmfOqCkW', 'FODmvZkWKX', 'SapmCXRI1l', 'JLimxkMXLH', 'oRpmUTPpGI', 'd31mr5b5rO', 'CqRmwFYYQ6', 'iXXm1hv4pc', 'n8PmTDWblj', 'TV9mX81T3F'
                Source: 0.2.Details Of Our PO..exe.4cb61b8.5.raw.unpack, sT4WaknHWv8NjVhC5A.csHigh entropy of concatenated method names: 'QiZxs8PAnH', 'FUUxhJrV6m', 'BTYxELLarg', 'jWGxnqWqbe', 'R9RxG3BLSr', 'GI4xabxAki', 'HWSx31A9tE', 'tW1xcNcUY7', 'QD2xyTscQ5', 'pOJxQq7JV0'
                Source: 0.2.Details Of Our PO..exe.4cb61b8.5.raw.unpack, Vau9IxF5u5OKCAJdxE0.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'BBGpyY8pGY', 'OoupQXsko4', 'pr9pOgIoUf', 'u48ppkwQ00', 'v0Dp4mCYqn', 'PAZpM6wP2l', 'leNpiSP3Y2'
                Source: 0.2.Details Of Our PO..exe.4cb61b8.5.raw.unpack, I3yXh5z8QOrOMYaR4C.csHigh entropy of concatenated method names: 'PgFQhOfwmK', 'PjaQEWKkOI', 't7XQnGweP5', 'vMYQbM7Z2w', 'QqHQ27Vim3', 'CLEQkDrMGq', 'oWfQt7RJNo', 'IHAQiu6AvE', 'uaDQ0lJx8R', 'jyCQg61PYn'
                Source: 0.2.Details Of Our PO..exe.4cb61b8.5.raw.unpack, TVcieEFF8ZPTljS25dw.csHigh entropy of concatenated method names: 'QsTQjHYlny', 'rR1QzPMYXb', 'BQ5ODw0ywl', 'dCrOFqbAOu', 'BkaORHVRDv', 'DsVOmYBkdS', 'HpZO5gTpNh', 'bEFOf9FYZh', 'JB6Ovy0mCE', 'ntZOCUQA4g'
                Source: 0.2.Details Of Our PO..exe.4cb61b8.5.raw.unpack, XsWC8dADtygZTgViow.csHigh entropy of concatenated method names: 'aPvwv9e9IN', 'X8bwx3RU7a', 'KCywr31qk9', 'srXrjvdaZh', 'XyCrzIVWA1', 'dN0wDUpFUl', 'z9fwFLJoT5', 'JDswRxYXIM', 'mjlwmgbVqk', 'v3Ow51DZnI'
                Source: 0.2.Details Of Our PO..exe.4cb61b8.5.raw.unpack, xyNcKuqSWdy7N7fAyC.csHigh entropy of concatenated method names: 'UYq3XgSZJV', 'PMX3SiaHv4', 'ToString', 'jcb3vMKQTN', 'hqP3CQfka6', 'GxI3xgrehK', 'Go33U9cuoC', 'eio3rIu1Ch', 'vuW3wtaEH5', 'd77313ith6'
                Source: 0.2.Details Of Our PO..exe.4cb61b8.5.raw.unpack, aeL1xPbHBMmlqA63j6.csHigh entropy of concatenated method names: 'hRrrfFf9KG', 'IeZrCGvGio', 'RbIrUHJAK9', 'nlFrwT5x4M', 'mgSr1dkTCx', 'AvDUJG4e6b', 'SxrUYCFKlr', 'pFhUWenFI7', 'LaIU9IYvA5', 'dBLUPkkBhn'
                Source: 0.2.Details Of Our PO..exe.4cb61b8.5.raw.unpack, uHkTEUWoI8hqwu1Aui.csHigh entropy of concatenated method names: 'Wp9yGDShrG', 'nRiy39sUMD', 'Tjyyy9oZR5', 'TtuyOcdErH', 'j0yy4wsdfQ', 'k5XyiuDVhr', 'Dispose', 'OgOcviEJOM', 'wj8cCYVXXu', 'cBScxP2gnt'
                Source: 0.2.Details Of Our PO..exe.4cb61b8.5.raw.unpack, C1JruYNs1Thr5cMP1m.csHigh entropy of concatenated method names: 'EQsw0UuJMD', 'nNIwgpDvPr', 'hTdwuvNEHm', 'fSCwsvnkut', 'AgJw8GIxe0', 'wvywh5iZa6', 'k3tw6uFmDO', 'zQ8wEuK1TI', 'qadwnBExtp', 'uPcwBmMc0P'
                Source: 0.2.Details Of Our PO..exe.4d40fd8.4.raw.unpack, uihWa9FRNPUyOSq1R0w.csHigh entropy of concatenated method names: 'ToString', 'D8gOEvB54d', 'h92OnlaZ0j', 'zUFOB1KFHJ', 'JDAObnr4KK', 'RQBO2mIvf9', 'jM3OIcGR1N', 'Sp3OkB4Cl3', 'sFvm2glEe42iJh5lM0P', 'Rr6NNtlf2OFExmiLt7m'
                Source: 0.2.Details Of Our PO..exe.4d40fd8.4.raw.unpack, sgYpuIRNQ2QwSlpx68.csHigh entropy of concatenated method names: 'cXhu9QJOJ', 'CZ8s7H8EY', 'oymhmHKfI', 'LIf6vOa1c', 'BxKnABxSC', 'gWkBoxBsm', 'v7QNdmp6vB0MGxA8W9', 'swx9s91FIxRKNevx8y', 'domc7S4LR', 'qAZQmn1rl'
                Source: 0.2.Details Of Our PO..exe.4d40fd8.4.raw.unpack, gtI4bxPOtVjtuknJxd.csHigh entropy of concatenated method names: 'svOyb5sGNb', 'xOAy2nWt1h', 'N9VyI0s7hu', 'kaqykBNvkv', 'F40ytqdM1n', 'th6yeQy0BT', 'a8WyAsL9w7', 'k7py7Z011P', 'Uk7yNuNi3u', 'HSAyK1mFvD'
                Source: 0.2.Details Of Our PO..exe.4d40fd8.4.raw.unpack, quylH1lKWtWtiZvsj0.csHigh entropy of concatenated method names: 't5SLE7Vil9', 'qm9LnunbTy', 'NZYLbdswJq', 'bEDL2aqTy0', 'LHqLkWMN5L', 'F7PLtIwLfy', 'byWLAo5hd2', 'QmvL7TCTpA', 'cC8LK1nfRa', 'SLFLHyuu99'
                Source: 0.2.Details Of Our PO..exe.4d40fd8.4.raw.unpack, dksBp9C3TcHBhSymSe.csHigh entropy of concatenated method names: 'Dispose', 'AhqFPwu1Au', 'jvYR2cR8mt', 'C8vpJEZZEn', 'xAFFjD9x33', 'TsIFzA4M2i', 'ProcessDialogKey', 'RVxRDtI4bx', 'ttVRFjtukn', 'UxdRRLflBT'
                Source: 0.2.Details Of Our PO..exe.4d40fd8.4.raw.unpack, FsxC5cY5JBbsab0uYC.csHigh entropy of concatenated method names: 'fPQ39DAlfP', 'ygD3jRH0ps', 'vBUcD82dKS', 'LKhcFAqrJJ', 'qLy3HDJaVv', 'GV73ZloRG0', 'MgM3la5HL5', 's6W3oT5T7A', 'PqR3V554yn', 'y2u3dtgirx'
                Source: 0.2.Details Of Our PO..exe.4d40fd8.4.raw.unpack, MfXsNDEYnYkPrZcmpb.csHigh entropy of concatenated method names: 'FFVCowy8HK', 'yh6CVXUadC', 'NwjCdwTLCu', 'hlrCqlZ3X0', 'K2fCJSgLjm', 'FulCYvS3Gr', 'CPDCWiJTkH', 'D0CC94GRYW', 'aEcCPW7aI5', 'Ya0CjIWQyP'
                Source: 0.2.Details Of Our PO..exe.4d40fd8.4.raw.unpack, SCTBPMFD3SwVyQGyQaN.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'FyFQHN4VLl', 'sobQZudeyN', 'fNoQl0lhZe', 'IVnQos8S18', 'VrIQVanFKj', 'OjHQdFkWZH', 'o51QqRX8gl'
                Source: 0.2.Details Of Our PO..exe.4d40fd8.4.raw.unpack, wjwVVn56BIUeuOnJiN.csHigh entropy of concatenated method names: 'dxNFwfXsND', 'VnYF1kPrZc', 'IHWFXv8NjV', 'CC5FSAfWWw', 'ICdFGmlDeL', 'kxPFaHBMml', 'tpkABJOekJf36BOnJt', 'sDNXH05w3n98o1Mj8y', 'tP8ajv4uPZ67jrIuFf', 'VJSFFREjiD'
                Source: 0.2.Details Of Our PO..exe.4d40fd8.4.raw.unpack, nflBTaj7TwdbrnbVJd.csHigh entropy of concatenated method names: 'JbLQxfV6nG', 'nTGQUYsawW', 'yCWQr7ClVY', 'ejuQwR1THM', 'EZyQyMA8A9', 'fa5Q1dhJnA', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.Details Of Our PO..exe.4d40fd8.4.raw.unpack, N6Vo3p1v0BooWZZpdw.csHigh entropy of concatenated method names: 'VyJmfOqCkW', 'FODmvZkWKX', 'SapmCXRI1l', 'JLimxkMXLH', 'oRpmUTPpGI', 'd31mr5b5rO', 'CqRmwFYYQ6', 'iXXm1hv4pc', 'n8PmTDWblj', 'TV9mX81T3F'
                Source: 0.2.Details Of Our PO..exe.4d40fd8.4.raw.unpack, sT4WaknHWv8NjVhC5A.csHigh entropy of concatenated method names: 'QiZxs8PAnH', 'FUUxhJrV6m', 'BTYxELLarg', 'jWGxnqWqbe', 'R9RxG3BLSr', 'GI4xabxAki', 'HWSx31A9tE', 'tW1xcNcUY7', 'QD2xyTscQ5', 'pOJxQq7JV0'
                Source: 0.2.Details Of Our PO..exe.4d40fd8.4.raw.unpack, Vau9IxF5u5OKCAJdxE0.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'BBGpyY8pGY', 'OoupQXsko4', 'pr9pOgIoUf', 'u48ppkwQ00', 'v0Dp4mCYqn', 'PAZpM6wP2l', 'leNpiSP3Y2'
                Source: 0.2.Details Of Our PO..exe.4d40fd8.4.raw.unpack, I3yXh5z8QOrOMYaR4C.csHigh entropy of concatenated method names: 'PgFQhOfwmK', 'PjaQEWKkOI', 't7XQnGweP5', 'vMYQbM7Z2w', 'QqHQ27Vim3', 'CLEQkDrMGq', 'oWfQt7RJNo', 'IHAQiu6AvE', 'uaDQ0lJx8R', 'jyCQg61PYn'
                Source: 0.2.Details Of Our PO..exe.4d40fd8.4.raw.unpack, TVcieEFF8ZPTljS25dw.csHigh entropy of concatenated method names: 'QsTQjHYlny', 'rR1QzPMYXb', 'BQ5ODw0ywl', 'dCrOFqbAOu', 'BkaORHVRDv', 'DsVOmYBkdS', 'HpZO5gTpNh', 'bEFOf9FYZh', 'JB6Ovy0mCE', 'ntZOCUQA4g'
                Source: 0.2.Details Of Our PO..exe.4d40fd8.4.raw.unpack, XsWC8dADtygZTgViow.csHigh entropy of concatenated method names: 'aPvwv9e9IN', 'X8bwx3RU7a', 'KCywr31qk9', 'srXrjvdaZh', 'XyCrzIVWA1', 'dN0wDUpFUl', 'z9fwFLJoT5', 'JDswRxYXIM', 'mjlwmgbVqk', 'v3Ow51DZnI'
                Source: 0.2.Details Of Our PO..exe.4d40fd8.4.raw.unpack, xyNcKuqSWdy7N7fAyC.csHigh entropy of concatenated method names: 'UYq3XgSZJV', 'PMX3SiaHv4', 'ToString', 'jcb3vMKQTN', 'hqP3CQfka6', 'GxI3xgrehK', 'Go33U9cuoC', 'eio3rIu1Ch', 'vuW3wtaEH5', 'd77313ith6'
                Source: 0.2.Details Of Our PO..exe.4d40fd8.4.raw.unpack, aeL1xPbHBMmlqA63j6.csHigh entropy of concatenated method names: 'hRrrfFf9KG', 'IeZrCGvGio', 'RbIrUHJAK9', 'nlFrwT5x4M', 'mgSr1dkTCx', 'AvDUJG4e6b', 'SxrUYCFKlr', 'pFhUWenFI7', 'LaIU9IYvA5', 'dBLUPkkBhn'
                Source: 0.2.Details Of Our PO..exe.4d40fd8.4.raw.unpack, uHkTEUWoI8hqwu1Aui.csHigh entropy of concatenated method names: 'Wp9yGDShrG', 'nRiy39sUMD', 'Tjyyy9oZR5', 'TtuyOcdErH', 'j0yy4wsdfQ', 'k5XyiuDVhr', 'Dispose', 'OgOcviEJOM', 'wj8cCYVXXu', 'cBScxP2gnt'
                Source: 0.2.Details Of Our PO..exe.4d40fd8.4.raw.unpack, C1JruYNs1Thr5cMP1m.csHigh entropy of concatenated method names: 'EQsw0UuJMD', 'nNIwgpDvPr', 'hTdwuvNEHm', 'fSCwsvnkut', 'AgJw8GIxe0', 'wvywh5iZa6', 'k3tw6uFmDO', 'zQ8wEuK1TI', 'qadwnBExtp', 'uPcwBmMc0P'
                Source: 0.2.Details Of Our PO..exe.9860000.6.raw.unpack, P3eh8af2o4VTkSD0Y3.csHigh entropy of concatenated method names: 'Dispose', 'P3efh8a2o', 'yH8LT4C6bmLeWc8YL5', 'L4Ca6Xd2uZ8fu7tskX', 'DguxHGFPrqLRK6Jgbs', 'rGmoViKuA1CYkAIaDT', 'pSCfTfOip17KqF4YlD', 'FPnfDwDcQAmPdvY5g0', 'tTY1xtxACVStGqjdTk', 'B1WwFvRAyy9IRNc19V'
                Source: 0.2.Details Of Our PO..exe.9860000.6.raw.unpack, dTuvtD1DdyQbwj9dR3.csHigh entropy of concatenated method names: 'KYGvAvhTF', 'JFn7SRQet', 'ax2QgSfgc', 'g5OeQ68r3', 'a6IZjF0TE', 'UeGcOh08y', 'PKxX9EuHD', 'OcPJIHTlp', 'Ym7kCXKit', 'LsoLtyUhZ'
                Source: 0.2.Details Of Our PO..exe.9860000.6.raw.unpack, ihTFxFFnSRQetgx2gS.csHigh entropy of concatenated method names: 'ISrkpyii4tSUs', 'b50WjUTaChgUDI2NEVw', 'gQERmsTu2tA2TFSBlH8', 'rFnpM5TnkllvYULeG2c', 'vcFCwhTvUgN9tUBDaUO', 'frROXdT0dSL2FIpOj8j', 'zOHiqMTZkx59a1xMwqr'
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: Details Of Our PO..exe PID: 4796, type: MEMORYSTR
                Source: C:\Windows\SysWOW64\ktmutil.exeAPI/Special instruction interceptor: Address: 7FFCC372D324
                Source: C:\Windows\SysWOW64\ktmutil.exeAPI/Special instruction interceptor: Address: 7FFCC372D7E4
                Source: C:\Windows\SysWOW64\ktmutil.exeAPI/Special instruction interceptor: Address: 7FFCC372D944
                Source: C:\Windows\SysWOW64\ktmutil.exeAPI/Special instruction interceptor: Address: 7FFCC372D504
                Source: C:\Windows\SysWOW64\ktmutil.exeAPI/Special instruction interceptor: Address: 7FFCC372D544
                Source: C:\Windows\SysWOW64\ktmutil.exeAPI/Special instruction interceptor: Address: 7FFCC372D1E4
                Source: C:\Windows\SysWOW64\ktmutil.exeAPI/Special instruction interceptor: Address: 7FFCC3730154
                Source: C:\Windows\SysWOW64\ktmutil.exeAPI/Special instruction interceptor: Address: 7FFCC372DA44
                Source: C:\Users\user\Desktop\Details Of Our PO..exeMemory allocated: 12B0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeMemory allocated: 3210000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeMemory allocated: 2F20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeMemory allocated: 5650000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeMemory allocated: 6650000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeMemory allocated: 6780000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeMemory allocated: 7780000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeMemory allocated: BB40000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeMemory allocated: CB40000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeMemory allocated: CFD0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeMemory allocated: DFD0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F9D1C0 rdtsc 1_2_00F9D1C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeWindow / User API: threadDelayed 2955Jump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeWindow / User API: threadDelayed 7019Jump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeAPI coverage: 0.8 %
                Source: C:\Windows\SysWOW64\ktmutil.exeAPI coverage: 2.7 %
                Source: C:\Users\user\Desktop\Details Of Our PO..exe TID: 2672Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exe TID: 4768Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exe TID: 7452Thread sleep count: 2955 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exe TID: 7452Thread sleep time: -5910000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exe TID: 7452Thread sleep count: 7019 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exe TID: 7452Thread sleep time: -14038000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exe TID: 7572Thread sleep time: -90000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exe TID: 7572Thread sleep count: 43 > 30Jump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exe TID: 7572Thread sleep time: -64500s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exe TID: 7572Thread sleep count: 45 > 30Jump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exe TID: 7572Thread sleep time: -45000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\ktmutil.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\ktmutil.exeCode function: 4_2_0051C7A0 FindFirstFileW,FindNextFileW,FindClose,4_2_0051C7A0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeThread delayed: delay time: 30000Jump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: ktmutil.exe, 00000004.00000002.3636898857.0000000000593000.00000004.00000020.00020000.00000000.sdmp, kgiwhJAWTiJvkoTzfbZTr.exe, 0000000B.00000002.3638727689.0000000001139000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: firefox.exe, 0000000C.00000002.1606426818.0000010F3DE0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllRR
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F9D1C0 rdtsc 1_2_00F9D1C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00417D03 LdrLoadDll,1_2_00417D03
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1C0F0 mov eax, dword ptr fs:[00000030h]1_2_00F1C0F0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F620F0 mov ecx, dword ptr fs:[00000030h]1_2_00F620F0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F450E4 mov eax, dword ptr fs:[00000030h]1_2_00F450E4
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F450E4 mov ecx, dword ptr fs:[00000030h]1_2_00F450E4
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1A0E3 mov ecx, dword ptr fs:[00000030h]1_2_00F1A0E3
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA60E0 mov eax, dword ptr fs:[00000030h]1_2_00FA60E0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F280E9 mov eax, dword ptr fs:[00000030h]1_2_00F280E9
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA20DE mov eax, dword ptr fs:[00000030h]1_2_00FA20DE
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FF50D9 mov eax, dword ptr fs:[00000030h]1_2_00FF50D9
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F490DB mov eax, dword ptr fs:[00000030h]1_2_00F490DB
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F370C0 mov eax, dword ptr fs:[00000030h]1_2_00F370C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F370C0 mov ecx, dword ptr fs:[00000030h]1_2_00F370C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F370C0 mov ecx, dword ptr fs:[00000030h]1_2_00F370C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F370C0 mov eax, dword ptr fs:[00000030h]1_2_00F370C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F370C0 mov ecx, dword ptr fs:[00000030h]1_2_00F370C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F370C0 mov ecx, dword ptr fs:[00000030h]1_2_00F370C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F370C0 mov eax, dword ptr fs:[00000030h]1_2_00F370C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F370C0 mov eax, dword ptr fs:[00000030h]1_2_00F370C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F370C0 mov eax, dword ptr fs:[00000030h]1_2_00F370C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F370C0 mov eax, dword ptr fs:[00000030h]1_2_00F370C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F370C0 mov eax, dword ptr fs:[00000030h]1_2_00F370C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F370C0 mov eax, dword ptr fs:[00000030h]1_2_00F370C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F370C0 mov eax, dword ptr fs:[00000030h]1_2_00F370C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F370C0 mov eax, dword ptr fs:[00000030h]1_2_00F370C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F370C0 mov eax, dword ptr fs:[00000030h]1_2_00F370C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F370C0 mov eax, dword ptr fs:[00000030h]1_2_00F370C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F370C0 mov eax, dword ptr fs:[00000030h]1_2_00F370C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F370C0 mov eax, dword ptr fs:[00000030h]1_2_00F370C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F9D0C0 mov eax, dword ptr fs:[00000030h]1_2_00F9D0C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F9D0C0 mov eax, dword ptr fs:[00000030h]1_2_00F9D0C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FE60B8 mov eax, dword ptr fs:[00000030h]1_2_00FE60B8
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FE60B8 mov ecx, dword ptr fs:[00000030h]1_2_00FE60B8
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FB80A8 mov eax, dword ptr fs:[00000030h]1_2_00FB80A8
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F25096 mov eax, dword ptr fs:[00000030h]1_2_00F25096
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4D090 mov eax, dword ptr fs:[00000030h]1_2_00F4D090
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4D090 mov eax, dword ptr fs:[00000030h]1_2_00F4D090
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5909C mov eax, dword ptr fs:[00000030h]1_2_00F5909C
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F2208A mov eax, dword ptr fs:[00000030h]1_2_00F2208A
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1D08D mov eax, dword ptr fs:[00000030h]1_2_00F1D08D
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F31070 mov eax, dword ptr fs:[00000030h]1_2_00F31070
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F31070 mov ecx, dword ptr fs:[00000030h]1_2_00F31070
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F31070 mov eax, dword ptr fs:[00000030h]1_2_00F31070
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F31070 mov eax, dword ptr fs:[00000030h]1_2_00F31070
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F31070 mov eax, dword ptr fs:[00000030h]1_2_00F31070
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F31070 mov eax, dword ptr fs:[00000030h]1_2_00F31070
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F31070 mov eax, dword ptr fs:[00000030h]1_2_00F31070
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F31070 mov eax, dword ptr fs:[00000030h]1_2_00F31070
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F31070 mov eax, dword ptr fs:[00000030h]1_2_00F31070
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F31070 mov eax, dword ptr fs:[00000030h]1_2_00F31070
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F31070 mov eax, dword ptr fs:[00000030h]1_2_00F31070
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F31070 mov eax, dword ptr fs:[00000030h]1_2_00F31070
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F31070 mov eax, dword ptr fs:[00000030h]1_2_00F31070
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4C073 mov eax, dword ptr fs:[00000030h]1_2_00F4C073
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F9D070 mov ecx, dword ptr fs:[00000030h]1_2_00F9D070
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA106E mov eax, dword ptr fs:[00000030h]1_2_00FA106E
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FF5060 mov eax, dword ptr fs:[00000030h]1_2_00FF5060
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F22050 mov eax, dword ptr fs:[00000030h]1_2_00F22050
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FC705E mov ebx, dword ptr fs:[00000030h]1_2_00FC705E
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FC705E mov eax, dword ptr fs:[00000030h]1_2_00FC705E
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4B052 mov eax, dword ptr fs:[00000030h]1_2_00F4B052
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA6050 mov eax, dword ptr fs:[00000030h]1_2_00FA6050
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FE903E mov eax, dword ptr fs:[00000030h]1_2_00FE903E
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FE903E mov eax, dword ptr fs:[00000030h]1_2_00FE903E
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FE903E mov eax, dword ptr fs:[00000030h]1_2_00FE903E
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FE903E mov eax, dword ptr fs:[00000030h]1_2_00FE903E
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1A020 mov eax, dword ptr fs:[00000030h]1_2_00F1A020
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1C020 mov eax, dword ptr fs:[00000030h]1_2_00F1C020
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F3E016 mov eax, dword ptr fs:[00000030h]1_2_00F3E016
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F3E016 mov eax, dword ptr fs:[00000030h]1_2_00F3E016
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F3E016 mov eax, dword ptr fs:[00000030h]1_2_00F3E016
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F3E016 mov eax, dword ptr fs:[00000030h]1_2_00F3E016
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA4000 mov ecx, dword ptr fs:[00000030h]1_2_00FA4000
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FC71F9 mov esi, dword ptr fs:[00000030h]1_2_00FC71F9
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F501F8 mov eax, dword ptr fs:[00000030h]1_2_00F501F8
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FF61E5 mov eax, dword ptr fs:[00000030h]1_2_00FF61E5
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F451EF mov eax, dword ptr fs:[00000030h]1_2_00F451EF
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F451EF mov eax, dword ptr fs:[00000030h]1_2_00F451EF
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F451EF mov eax, dword ptr fs:[00000030h]1_2_00F451EF
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F451EF mov eax, dword ptr fs:[00000030h]1_2_00F451EF
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F451EF mov eax, dword ptr fs:[00000030h]1_2_00F451EF
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F451EF mov eax, dword ptr fs:[00000030h]1_2_00F451EF
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F451EF mov eax, dword ptr fs:[00000030h]1_2_00F451EF
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F451EF mov eax, dword ptr fs:[00000030h]1_2_00F451EF
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F451EF mov eax, dword ptr fs:[00000030h]1_2_00F451EF
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F451EF mov eax, dword ptr fs:[00000030h]1_2_00F451EF
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F451EF mov eax, dword ptr fs:[00000030h]1_2_00F451EF
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F451EF mov eax, dword ptr fs:[00000030h]1_2_00F451EF
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F451EF mov eax, dword ptr fs:[00000030h]1_2_00F451EF
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F251ED mov eax, dword ptr fs:[00000030h]1_2_00F251ED
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5D1D0 mov eax, dword ptr fs:[00000030h]1_2_00F5D1D0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5D1D0 mov ecx, dword ptr fs:[00000030h]1_2_00F5D1D0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F9E1D0 mov eax, dword ptr fs:[00000030h]1_2_00F9E1D0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F9E1D0 mov eax, dword ptr fs:[00000030h]1_2_00F9E1D0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F9E1D0 mov ecx, dword ptr fs:[00000030h]1_2_00F9E1D0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F9E1D0 mov eax, dword ptr fs:[00000030h]1_2_00F9E1D0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F9E1D0 mov eax, dword ptr fs:[00000030h]1_2_00F9E1D0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FF51CB mov eax, dword ptr fs:[00000030h]1_2_00FF51CB
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FE61C3 mov eax, dword ptr fs:[00000030h]1_2_00FE61C3
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FE61C3 mov eax, dword ptr fs:[00000030h]1_2_00FE61C3
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F3B1B0 mov eax, dword ptr fs:[00000030h]1_2_00F3B1B0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD11A4 mov eax, dword ptr fs:[00000030h]1_2_00FD11A4
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD11A4 mov eax, dword ptr fs:[00000030h]1_2_00FD11A4
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD11A4 mov eax, dword ptr fs:[00000030h]1_2_00FD11A4
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD11A4 mov eax, dword ptr fs:[00000030h]1_2_00FD11A4
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA019F mov eax, dword ptr fs:[00000030h]1_2_00FA019F
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA019F mov eax, dword ptr fs:[00000030h]1_2_00FA019F
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA019F mov eax, dword ptr fs:[00000030h]1_2_00FA019F
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA019F mov eax, dword ptr fs:[00000030h]1_2_00FA019F
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1A197 mov eax, dword ptr fs:[00000030h]1_2_00F1A197
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1A197 mov eax, dword ptr fs:[00000030h]1_2_00F1A197
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1A197 mov eax, dword ptr fs:[00000030h]1_2_00F1A197
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F77190 mov eax, dword ptr fs:[00000030h]1_2_00F77190
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F60185 mov eax, dword ptr fs:[00000030h]1_2_00F60185
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FDC188 mov eax, dword ptr fs:[00000030h]1_2_00FDC188
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FDC188 mov eax, dword ptr fs:[00000030h]1_2_00FDC188
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FB9179 mov eax, dword ptr fs:[00000030h]1_2_00FB9179
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1F172 mov eax, dword ptr fs:[00000030h]1_2_00F1F172
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1F172 mov eax, dword ptr fs:[00000030h]1_2_00F1F172
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1F172 mov eax, dword ptr fs:[00000030h]1_2_00F1F172
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1F172 mov eax, dword ptr fs:[00000030h]1_2_00F1F172
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1F172 mov eax, dword ptr fs:[00000030h]1_2_00F1F172
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1F172 mov eax, dword ptr fs:[00000030h]1_2_00F1F172
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1F172 mov eax, dword ptr fs:[00000030h]1_2_00F1F172
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1F172 mov eax, dword ptr fs:[00000030h]1_2_00F1F172
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1F172 mov eax, dword ptr fs:[00000030h]1_2_00F1F172
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1F172 mov eax, dword ptr fs:[00000030h]1_2_00F1F172
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1F172 mov eax, dword ptr fs:[00000030h]1_2_00F1F172
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1F172 mov eax, dword ptr fs:[00000030h]1_2_00F1F172
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1F172 mov eax, dword ptr fs:[00000030h]1_2_00F1F172
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1F172 mov eax, dword ptr fs:[00000030h]1_2_00F1F172
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1F172 mov eax, dword ptr fs:[00000030h]1_2_00F1F172
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1F172 mov eax, dword ptr fs:[00000030h]1_2_00F1F172
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1F172 mov eax, dword ptr fs:[00000030h]1_2_00F1F172
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1F172 mov eax, dword ptr fs:[00000030h]1_2_00F1F172
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1F172 mov eax, dword ptr fs:[00000030h]1_2_00F1F172
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1F172 mov eax, dword ptr fs:[00000030h]1_2_00F1F172
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1F172 mov eax, dword ptr fs:[00000030h]1_2_00F1F172
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F27152 mov eax, dword ptr fs:[00000030h]1_2_00F27152
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FB8158 mov eax, dword ptr fs:[00000030h]1_2_00FB8158
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F26154 mov eax, dword ptr fs:[00000030h]1_2_00F26154
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F26154 mov eax, dword ptr fs:[00000030h]1_2_00F26154
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1C156 mov eax, dword ptr fs:[00000030h]1_2_00F1C156
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FF5152 mov eax, dword ptr fs:[00000030h]1_2_00FF5152
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F19148 mov eax, dword ptr fs:[00000030h]1_2_00F19148
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F19148 mov eax, dword ptr fs:[00000030h]1_2_00F19148
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F19148 mov eax, dword ptr fs:[00000030h]1_2_00F19148
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F19148 mov eax, dword ptr fs:[00000030h]1_2_00F19148
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FB4144 mov eax, dword ptr fs:[00000030h]1_2_00FB4144
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FB4144 mov eax, dword ptr fs:[00000030h]1_2_00FB4144
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FB4144 mov ecx, dword ptr fs:[00000030h]1_2_00FB4144
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FB4144 mov eax, dword ptr fs:[00000030h]1_2_00FB4144
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FB4144 mov eax, dword ptr fs:[00000030h]1_2_00FB4144
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F21131 mov eax, dword ptr fs:[00000030h]1_2_00F21131
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F21131 mov eax, dword ptr fs:[00000030h]1_2_00F21131
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1B136 mov eax, dword ptr fs:[00000030h]1_2_00F1B136
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1B136 mov eax, dword ptr fs:[00000030h]1_2_00F1B136
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1B136 mov eax, dword ptr fs:[00000030h]1_2_00F1B136
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1B136 mov eax, dword ptr fs:[00000030h]1_2_00F1B136
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F50124 mov eax, dword ptr fs:[00000030h]1_2_00F50124
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FCA118 mov ecx, dword ptr fs:[00000030h]1_2_00FCA118
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FCA118 mov eax, dword ptr fs:[00000030h]1_2_00FCA118
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FCA118 mov eax, dword ptr fs:[00000030h]1_2_00FCA118
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FCA118 mov eax, dword ptr fs:[00000030h]1_2_00FCA118
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FE0115 mov eax, dword ptr fs:[00000030h]1_2_00FE0115
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FDF2F8 mov eax, dword ptr fs:[00000030h]1_2_00FDF2F8
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F192FF mov eax, dword ptr fs:[00000030h]1_2_00F192FF
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD12ED mov eax, dword ptr fs:[00000030h]1_2_00FD12ED
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD12ED mov eax, dword ptr fs:[00000030h]1_2_00FD12ED
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD12ED mov eax, dword ptr fs:[00000030h]1_2_00FD12ED
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD12ED mov eax, dword ptr fs:[00000030h]1_2_00FD12ED
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD12ED mov eax, dword ptr fs:[00000030h]1_2_00FD12ED
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD12ED mov eax, dword ptr fs:[00000030h]1_2_00FD12ED
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD12ED mov eax, dword ptr fs:[00000030h]1_2_00FD12ED
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD12ED mov eax, dword ptr fs:[00000030h]1_2_00FD12ED
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD12ED mov eax, dword ptr fs:[00000030h]1_2_00FD12ED
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD12ED mov eax, dword ptr fs:[00000030h]1_2_00FD12ED
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD12ED mov eax, dword ptr fs:[00000030h]1_2_00FD12ED
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD12ED mov eax, dword ptr fs:[00000030h]1_2_00FD12ED
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD12ED mov eax, dword ptr fs:[00000030h]1_2_00FD12ED
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD12ED mov eax, dword ptr fs:[00000030h]1_2_00FD12ED
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F302E1 mov eax, dword ptr fs:[00000030h]1_2_00F302E1
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F302E1 mov eax, dword ptr fs:[00000030h]1_2_00F302E1
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F302E1 mov eax, dword ptr fs:[00000030h]1_2_00F302E1
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FF52E2 mov eax, dword ptr fs:[00000030h]1_2_00FF52E2
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1B2D3 mov eax, dword ptr fs:[00000030h]1_2_00F1B2D3
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1B2D3 mov eax, dword ptr fs:[00000030h]1_2_00F1B2D3
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1B2D3 mov eax, dword ptr fs:[00000030h]1_2_00F1B2D3
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4F2D0 mov eax, dword ptr fs:[00000030h]1_2_00F4F2D0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4F2D0 mov eax, dword ptr fs:[00000030h]1_2_00F4F2D0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F2A2C3 mov eax, dword ptr fs:[00000030h]1_2_00F2A2C3
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F2A2C3 mov eax, dword ptr fs:[00000030h]1_2_00F2A2C3
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F2A2C3 mov eax, dword ptr fs:[00000030h]1_2_00F2A2C3
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F2A2C3 mov eax, dword ptr fs:[00000030h]1_2_00F2A2C3
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F2A2C3 mov eax, dword ptr fs:[00000030h]1_2_00F2A2C3
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4B2C0 mov eax, dword ptr fs:[00000030h]1_2_00F4B2C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4B2C0 mov eax, dword ptr fs:[00000030h]1_2_00F4B2C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4B2C0 mov eax, dword ptr fs:[00000030h]1_2_00F4B2C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4B2C0 mov eax, dword ptr fs:[00000030h]1_2_00F4B2C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4B2C0 mov eax, dword ptr fs:[00000030h]1_2_00F4B2C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4B2C0 mov eax, dword ptr fs:[00000030h]1_2_00F4B2C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4B2C0 mov eax, dword ptr fs:[00000030h]1_2_00F4B2C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F292C5 mov eax, dword ptr fs:[00000030h]1_2_00F292C5
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F292C5 mov eax, dword ptr fs:[00000030h]1_2_00F292C5
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA92BC mov eax, dword ptr fs:[00000030h]1_2_00FA92BC
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA92BC mov eax, dword ptr fs:[00000030h]1_2_00FA92BC
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA92BC mov ecx, dword ptr fs:[00000030h]1_2_00FA92BC
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA92BC mov ecx, dword ptr fs:[00000030h]1_2_00FA92BC
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F302A0 mov eax, dword ptr fs:[00000030h]1_2_00F302A0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F302A0 mov eax, dword ptr fs:[00000030h]1_2_00F302A0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F352A0 mov eax, dword ptr fs:[00000030h]1_2_00F352A0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F352A0 mov eax, dword ptr fs:[00000030h]1_2_00F352A0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F352A0 mov eax, dword ptr fs:[00000030h]1_2_00F352A0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F352A0 mov eax, dword ptr fs:[00000030h]1_2_00F352A0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FE92A6 mov eax, dword ptr fs:[00000030h]1_2_00FE92A6
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FE92A6 mov eax, dword ptr fs:[00000030h]1_2_00FE92A6
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FE92A6 mov eax, dword ptr fs:[00000030h]1_2_00FE92A6
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FE92A6 mov eax, dword ptr fs:[00000030h]1_2_00FE92A6
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FB72A0 mov eax, dword ptr fs:[00000030h]1_2_00FB72A0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FB72A0 mov eax, dword ptr fs:[00000030h]1_2_00FB72A0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FB62A0 mov eax, dword ptr fs:[00000030h]1_2_00FB62A0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FB62A0 mov ecx, dword ptr fs:[00000030h]1_2_00FB62A0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FB62A0 mov eax, dword ptr fs:[00000030h]1_2_00FB62A0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FB62A0 mov eax, dword ptr fs:[00000030h]1_2_00FB62A0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FB62A0 mov eax, dword ptr fs:[00000030h]1_2_00FB62A0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FB62A0 mov eax, dword ptr fs:[00000030h]1_2_00FB62A0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5329E mov eax, dword ptr fs:[00000030h]1_2_00F5329E
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5329E mov eax, dword ptr fs:[00000030h]1_2_00F5329E
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5E284 mov eax, dword ptr fs:[00000030h]1_2_00F5E284
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5E284 mov eax, dword ptr fs:[00000030h]1_2_00F5E284
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA0283 mov eax, dword ptr fs:[00000030h]1_2_00FA0283
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA0283 mov eax, dword ptr fs:[00000030h]1_2_00FA0283
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA0283 mov eax, dword ptr fs:[00000030h]1_2_00FA0283
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FF5283 mov eax, dword ptr fs:[00000030h]1_2_00FF5283
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F49274 mov eax, dword ptr fs:[00000030h]1_2_00F49274
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F61270 mov eax, dword ptr fs:[00000030h]1_2_00F61270
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F61270 mov eax, dword ptr fs:[00000030h]1_2_00F61270
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD0274 mov eax, dword ptr fs:[00000030h]1_2_00FD0274
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD0274 mov eax, dword ptr fs:[00000030h]1_2_00FD0274
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD0274 mov eax, dword ptr fs:[00000030h]1_2_00FD0274
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD0274 mov eax, dword ptr fs:[00000030h]1_2_00FD0274
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD0274 mov eax, dword ptr fs:[00000030h]1_2_00FD0274
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD0274 mov eax, dword ptr fs:[00000030h]1_2_00FD0274
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD0274 mov eax, dword ptr fs:[00000030h]1_2_00FD0274
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD0274 mov eax, dword ptr fs:[00000030h]1_2_00FD0274
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD0274 mov eax, dword ptr fs:[00000030h]1_2_00FD0274
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD0274 mov eax, dword ptr fs:[00000030h]1_2_00FD0274
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD0274 mov eax, dword ptr fs:[00000030h]1_2_00FD0274
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FD0274 mov eax, dword ptr fs:[00000030h]1_2_00FD0274
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F24260 mov eax, dword ptr fs:[00000030h]1_2_00F24260
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F24260 mov eax, dword ptr fs:[00000030h]1_2_00F24260
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F24260 mov eax, dword ptr fs:[00000030h]1_2_00F24260
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FED26B mov eax, dword ptr fs:[00000030h]1_2_00FED26B
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FED26B mov eax, dword ptr fs:[00000030h]1_2_00FED26B
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1826B mov eax, dword ptr fs:[00000030h]1_2_00F1826B
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1A250 mov eax, dword ptr fs:[00000030h]1_2_00F1A250
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FDB256 mov eax, dword ptr fs:[00000030h]1_2_00FDB256
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FDB256 mov eax, dword ptr fs:[00000030h]1_2_00FDB256
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F26259 mov eax, dword ptr fs:[00000030h]1_2_00F26259
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F19240 mov eax, dword ptr fs:[00000030h]1_2_00F19240
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F19240 mov eax, dword ptr fs:[00000030h]1_2_00F19240
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5724D mov eax, dword ptr fs:[00000030h]1_2_00F5724D
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1823B mov eax, dword ptr fs:[00000030h]1_2_00F1823B
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FF5227 mov eax, dword ptr fs:[00000030h]1_2_00FF5227
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F57208 mov eax, dword ptr fs:[00000030h]1_2_00F57208
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F57208 mov eax, dword ptr fs:[00000030h]1_2_00F57208
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FF53FC mov eax, dword ptr fs:[00000030h]1_2_00FF53FC
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F3E3F0 mov eax, dword ptr fs:[00000030h]1_2_00F3E3F0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F3E3F0 mov eax, dword ptr fs:[00000030h]1_2_00F3E3F0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F3E3F0 mov eax, dword ptr fs:[00000030h]1_2_00F3E3F0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F563FF mov eax, dword ptr fs:[00000030h]1_2_00F563FF
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F303E9 mov eax, dword ptr fs:[00000030h]1_2_00F303E9
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F303E9 mov eax, dword ptr fs:[00000030h]1_2_00F303E9
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F303E9 mov eax, dword ptr fs:[00000030h]1_2_00F303E9
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F303E9 mov eax, dword ptr fs:[00000030h]1_2_00F303E9
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F303E9 mov eax, dword ptr fs:[00000030h]1_2_00F303E9
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F303E9 mov eax, dword ptr fs:[00000030h]1_2_00F303E9
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F303E9 mov eax, dword ptr fs:[00000030h]1_2_00F303E9
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F303E9 mov eax, dword ptr fs:[00000030h]1_2_00F303E9
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FDF3E6 mov eax, dword ptr fs:[00000030h]1_2_00FDF3E6
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FDB3D0 mov ecx, dword ptr fs:[00000030h]1_2_00FDB3D0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FDC3CD mov eax, dword ptr fs:[00000030h]1_2_00FDC3CD
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F2A3C0 mov eax, dword ptr fs:[00000030h]1_2_00F2A3C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F2A3C0 mov eax, dword ptr fs:[00000030h]1_2_00F2A3C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F2A3C0 mov eax, dword ptr fs:[00000030h]1_2_00F2A3C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F2A3C0 mov eax, dword ptr fs:[00000030h]1_2_00F2A3C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F2A3C0 mov eax, dword ptr fs:[00000030h]1_2_00F2A3C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F2A3C0 mov eax, dword ptr fs:[00000030h]1_2_00F2A3C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F283C0 mov eax, dword ptr fs:[00000030h]1_2_00F283C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F283C0 mov eax, dword ptr fs:[00000030h]1_2_00F283C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F283C0 mov eax, dword ptr fs:[00000030h]1_2_00F283C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F283C0 mov eax, dword ptr fs:[00000030h]1_2_00F283C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA63C0 mov eax, dword ptr fs:[00000030h]1_2_00FA63C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F433A5 mov eax, dword ptr fs:[00000030h]1_2_00F433A5
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F533A0 mov eax, dword ptr fs:[00000030h]1_2_00F533A0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F533A0 mov eax, dword ptr fs:[00000030h]1_2_00F533A0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FF539D mov eax, dword ptr fs:[00000030h]1_2_00FF539D
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F18397 mov eax, dword ptr fs:[00000030h]1_2_00F18397
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F18397 mov eax, dword ptr fs:[00000030h]1_2_00F18397
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F18397 mov eax, dword ptr fs:[00000030h]1_2_00F18397
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F7739A mov eax, dword ptr fs:[00000030h]1_2_00F7739A
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F7739A mov eax, dword ptr fs:[00000030h]1_2_00F7739A
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1E388 mov eax, dword ptr fs:[00000030h]1_2_00F1E388
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1E388 mov eax, dword ptr fs:[00000030h]1_2_00F1E388
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1E388 mov eax, dword ptr fs:[00000030h]1_2_00F1E388
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4438F mov eax, dword ptr fs:[00000030h]1_2_00F4438F
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4438F mov eax, dword ptr fs:[00000030h]1_2_00F4438F
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FC437C mov eax, dword ptr fs:[00000030h]1_2_00FC437C
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F27370 mov eax, dword ptr fs:[00000030h]1_2_00F27370
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F27370 mov eax, dword ptr fs:[00000030h]1_2_00F27370
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F27370 mov eax, dword ptr fs:[00000030h]1_2_00F27370
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FDF367 mov eax, dword ptr fs:[00000030h]1_2_00FDF367
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F19353 mov eax, dword ptr fs:[00000030h]1_2_00F19353
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F19353 mov eax, dword ptr fs:[00000030h]1_2_00F19353
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA035C mov eax, dword ptr fs:[00000030h]1_2_00FA035C
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA035C mov eax, dword ptr fs:[00000030h]1_2_00FA035C
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA035C mov eax, dword ptr fs:[00000030h]1_2_00FA035C
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA035C mov ecx, dword ptr fs:[00000030h]1_2_00FA035C
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA035C mov eax, dword ptr fs:[00000030h]1_2_00FA035C
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA035C mov eax, dword ptr fs:[00000030h]1_2_00FA035C
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FEA352 mov eax, dword ptr fs:[00000030h]1_2_00FEA352
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA2349 mov eax, dword ptr fs:[00000030h]1_2_00FA2349
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA2349 mov eax, dword ptr fs:[00000030h]1_2_00FA2349
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA2349 mov eax, dword ptr fs:[00000030h]1_2_00FA2349
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA2349 mov eax, dword ptr fs:[00000030h]1_2_00FA2349
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA2349 mov eax, dword ptr fs:[00000030h]1_2_00FA2349
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA2349 mov eax, dword ptr fs:[00000030h]1_2_00FA2349
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA2349 mov eax, dword ptr fs:[00000030h]1_2_00FA2349
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA2349 mov eax, dword ptr fs:[00000030h]1_2_00FA2349
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA2349 mov eax, dword ptr fs:[00000030h]1_2_00FA2349
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA2349 mov eax, dword ptr fs:[00000030h]1_2_00FA2349
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA2349 mov eax, dword ptr fs:[00000030h]1_2_00FA2349
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA2349 mov eax, dword ptr fs:[00000030h]1_2_00FA2349
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA2349 mov eax, dword ptr fs:[00000030h]1_2_00FA2349
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA2349 mov eax, dword ptr fs:[00000030h]1_2_00FA2349
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA2349 mov eax, dword ptr fs:[00000030h]1_2_00FA2349
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1D34C mov eax, dword ptr fs:[00000030h]1_2_00F1D34C
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1D34C mov eax, dword ptr fs:[00000030h]1_2_00F1D34C
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FF5341 mov eax, dword ptr fs:[00000030h]1_2_00FF5341
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F17330 mov eax, dword ptr fs:[00000030h]1_2_00F17330
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FE132D mov eax, dword ptr fs:[00000030h]1_2_00FE132D
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FE132D mov eax, dword ptr fs:[00000030h]1_2_00FE132D
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4F32A mov eax, dword ptr fs:[00000030h]1_2_00F4F32A
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1C310 mov ecx, dword ptr fs:[00000030h]1_2_00F1C310
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F40310 mov ecx, dword ptr fs:[00000030h]1_2_00F40310
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA930B mov eax, dword ptr fs:[00000030h]1_2_00FA930B
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA930B mov eax, dword ptr fs:[00000030h]1_2_00FA930B
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA930B mov eax, dword ptr fs:[00000030h]1_2_00FA930B
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5A30B mov eax, dword ptr fs:[00000030h]1_2_00F5A30B
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5A30B mov eax, dword ptr fs:[00000030h]1_2_00F5A30B
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5A30B mov eax, dword ptr fs:[00000030h]1_2_00F5A30B
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F204E5 mov ecx, dword ptr fs:[00000030h]1_2_00F204E5
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FC94E0 mov eax, dword ptr fs:[00000030h]1_2_00FC94E0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FF54DB mov eax, dword ptr fs:[00000030h]1_2_00FF54DB
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F534B0 mov eax, dword ptr fs:[00000030h]1_2_00F534B0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F544B0 mov ecx, dword ptr fs:[00000030h]1_2_00F544B0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FAA4B0 mov eax, dword ptr fs:[00000030h]1_2_00FAA4B0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F264AB mov eax, dword ptr fs:[00000030h]1_2_00F264AB
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1B480 mov eax, dword ptr fs:[00000030h]1_2_00F1B480
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F29486 mov eax, dword ptr fs:[00000030h]1_2_00F29486
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F29486 mov eax, dword ptr fs:[00000030h]1_2_00F29486
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FF547F mov eax, dword ptr fs:[00000030h]1_2_00FF547F
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4A470 mov eax, dword ptr fs:[00000030h]1_2_00F4A470
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4A470 mov eax, dword ptr fs:[00000030h]1_2_00F4A470
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4A470 mov eax, dword ptr fs:[00000030h]1_2_00F4A470
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F21460 mov eax, dword ptr fs:[00000030h]1_2_00F21460
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F21460 mov eax, dword ptr fs:[00000030h]1_2_00F21460
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F21460 mov eax, dword ptr fs:[00000030h]1_2_00F21460
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F21460 mov eax, dword ptr fs:[00000030h]1_2_00F21460
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F21460 mov eax, dword ptr fs:[00000030h]1_2_00F21460
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F3F460 mov eax, dword ptr fs:[00000030h]1_2_00F3F460
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F3F460 mov eax, dword ptr fs:[00000030h]1_2_00F3F460
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F3F460 mov eax, dword ptr fs:[00000030h]1_2_00F3F460
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F3F460 mov eax, dword ptr fs:[00000030h]1_2_00F3F460
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F3F460 mov eax, dword ptr fs:[00000030h]1_2_00F3F460
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F3F460 mov eax, dword ptr fs:[00000030h]1_2_00F3F460
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1645D mov eax, dword ptr fs:[00000030h]1_2_00F1645D
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FDF453 mov eax, dword ptr fs:[00000030h]1_2_00FDF453
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4245A mov eax, dword ptr fs:[00000030h]1_2_00F4245A
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F2B440 mov eax, dword ptr fs:[00000030h]1_2_00F2B440
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F2B440 mov eax, dword ptr fs:[00000030h]1_2_00F2B440
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F2B440 mov eax, dword ptr fs:[00000030h]1_2_00F2B440
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F2B440 mov eax, dword ptr fs:[00000030h]1_2_00F2B440
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F2B440 mov eax, dword ptr fs:[00000030h]1_2_00F2B440
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F2B440 mov eax, dword ptr fs:[00000030h]1_2_00F2B440
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5E443 mov eax, dword ptr fs:[00000030h]1_2_00F5E443
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5E443 mov eax, dword ptr fs:[00000030h]1_2_00F5E443
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5E443 mov eax, dword ptr fs:[00000030h]1_2_00F5E443
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5E443 mov eax, dword ptr fs:[00000030h]1_2_00F5E443
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5E443 mov eax, dword ptr fs:[00000030h]1_2_00F5E443
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5E443 mov eax, dword ptr fs:[00000030h]1_2_00F5E443
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5E443 mov eax, dword ptr fs:[00000030h]1_2_00F5E443
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5E443 mov eax, dword ptr fs:[00000030h]1_2_00F5E443
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5A430 mov eax, dword ptr fs:[00000030h]1_2_00F5A430
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1E420 mov eax, dword ptr fs:[00000030h]1_2_00F1E420
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1E420 mov eax, dword ptr fs:[00000030h]1_2_00F1E420
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1E420 mov eax, dword ptr fs:[00000030h]1_2_00F1E420
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1C427 mov eax, dword ptr fs:[00000030h]1_2_00F1C427
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA6420 mov eax, dword ptr fs:[00000030h]1_2_00FA6420
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA6420 mov eax, dword ptr fs:[00000030h]1_2_00FA6420
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA6420 mov eax, dword ptr fs:[00000030h]1_2_00FA6420
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA6420 mov eax, dword ptr fs:[00000030h]1_2_00FA6420
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA6420 mov eax, dword ptr fs:[00000030h]1_2_00FA6420
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA6420 mov eax, dword ptr fs:[00000030h]1_2_00FA6420
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA6420 mov eax, dword ptr fs:[00000030h]1_2_00FA6420
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA7410 mov eax, dword ptr fs:[00000030h]1_2_00FA7410
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F58402 mov eax, dword ptr fs:[00000030h]1_2_00F58402
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F58402 mov eax, dword ptr fs:[00000030h]1_2_00F58402
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F58402 mov eax, dword ptr fs:[00000030h]1_2_00F58402
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4340D mov eax, dword ptr fs:[00000030h]1_2_00F4340D
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F415F4 mov eax, dword ptr fs:[00000030h]1_2_00F415F4
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F415F4 mov eax, dword ptr fs:[00000030h]1_2_00F415F4
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F415F4 mov eax, dword ptr fs:[00000030h]1_2_00F415F4
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F415F4 mov eax, dword ptr fs:[00000030h]1_2_00F415F4
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F415F4 mov eax, dword ptr fs:[00000030h]1_2_00F415F4
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F415F4 mov eax, dword ptr fs:[00000030h]1_2_00F415F4
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F225E0 mov eax, dword ptr fs:[00000030h]1_2_00F225E0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4E5E7 mov eax, dword ptr fs:[00000030h]1_2_00F4E5E7
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4E5E7 mov eax, dword ptr fs:[00000030h]1_2_00F4E5E7
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4E5E7 mov eax, dword ptr fs:[00000030h]1_2_00F4E5E7
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4E5E7 mov eax, dword ptr fs:[00000030h]1_2_00F4E5E7
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4E5E7 mov eax, dword ptr fs:[00000030h]1_2_00F4E5E7
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4E5E7 mov eax, dword ptr fs:[00000030h]1_2_00F4E5E7
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4E5E7 mov eax, dword ptr fs:[00000030h]1_2_00F4E5E7
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4E5E7 mov eax, dword ptr fs:[00000030h]1_2_00F4E5E7
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5C5ED mov eax, dword ptr fs:[00000030h]1_2_00F5C5ED
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5C5ED mov eax, dword ptr fs:[00000030h]1_2_00F5C5ED
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F265D0 mov eax, dword ptr fs:[00000030h]1_2_00F265D0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5A5D0 mov eax, dword ptr fs:[00000030h]1_2_00F5A5D0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5A5D0 mov eax, dword ptr fs:[00000030h]1_2_00F5A5D0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FF35D7 mov eax, dword ptr fs:[00000030h]1_2_00FF35D7
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FF35D7 mov eax, dword ptr fs:[00000030h]1_2_00FF35D7
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FF35D7 mov eax, dword ptr fs:[00000030h]1_2_00FF35D7
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F9D5D0 mov eax, dword ptr fs:[00000030h]1_2_00F9D5D0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F9D5D0 mov ecx, dword ptr fs:[00000030h]1_2_00F9D5D0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F495DA mov eax, dword ptr fs:[00000030h]1_2_00F495DA
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F555C0 mov eax, dword ptr fs:[00000030h]1_2_00F555C0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FF55C9 mov eax, dword ptr fs:[00000030h]1_2_00FF55C9
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5E5CF mov eax, dword ptr fs:[00000030h]1_2_00F5E5CF
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5E5CF mov eax, dword ptr fs:[00000030h]1_2_00F5E5CF
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FB35BA mov eax, dword ptr fs:[00000030h]1_2_00FB35BA
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FB35BA mov eax, dword ptr fs:[00000030h]1_2_00FB35BA
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FB35BA mov eax, dword ptr fs:[00000030h]1_2_00FB35BA
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FB35BA mov eax, dword ptr fs:[00000030h]1_2_00FB35BA
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FDF5BE mov eax, dword ptr fs:[00000030h]1_2_00FDF5BE
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4F5B0 mov eax, dword ptr fs:[00000030h]1_2_00F4F5B0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4F5B0 mov eax, dword ptr fs:[00000030h]1_2_00F4F5B0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4F5B0 mov eax, dword ptr fs:[00000030h]1_2_00F4F5B0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4F5B0 mov eax, dword ptr fs:[00000030h]1_2_00F4F5B0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4F5B0 mov eax, dword ptr fs:[00000030h]1_2_00F4F5B0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4F5B0 mov eax, dword ptr fs:[00000030h]1_2_00F4F5B0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4F5B0 mov eax, dword ptr fs:[00000030h]1_2_00F4F5B0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4F5B0 mov eax, dword ptr fs:[00000030h]1_2_00F4F5B0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4F5B0 mov eax, dword ptr fs:[00000030h]1_2_00F4F5B0
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F445B1 mov eax, dword ptr fs:[00000030h]1_2_00F445B1
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F445B1 mov eax, dword ptr fs:[00000030h]1_2_00F445B1
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA05A7 mov eax, dword ptr fs:[00000030h]1_2_00FA05A7
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA05A7 mov eax, dword ptr fs:[00000030h]1_2_00FA05A7
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FA05A7 mov eax, dword ptr fs:[00000030h]1_2_00FA05A7
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F415A9 mov eax, dword ptr fs:[00000030h]1_2_00F415A9
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F415A9 mov eax, dword ptr fs:[00000030h]1_2_00F415A9
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F415A9 mov eax, dword ptr fs:[00000030h]1_2_00F415A9
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F415A9 mov eax, dword ptr fs:[00000030h]1_2_00F415A9
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F415A9 mov eax, dword ptr fs:[00000030h]1_2_00F415A9
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5E59C mov eax, dword ptr fs:[00000030h]1_2_00F5E59C
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FAB594 mov eax, dword ptr fs:[00000030h]1_2_00FAB594
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FAB594 mov eax, dword ptr fs:[00000030h]1_2_00FAB594
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F22582 mov eax, dword ptr fs:[00000030h]1_2_00F22582
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F22582 mov ecx, dword ptr fs:[00000030h]1_2_00F22582
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F54588 mov eax, dword ptr fs:[00000030h]1_2_00F54588
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1758F mov eax, dword ptr fs:[00000030h]1_2_00F1758F
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1758F mov eax, dword ptr fs:[00000030h]1_2_00F1758F
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1758F mov eax, dword ptr fs:[00000030h]1_2_00F1758F
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5B570 mov eax, dword ptr fs:[00000030h]1_2_00F5B570
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5B570 mov eax, dword ptr fs:[00000030h]1_2_00F5B570
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F1B562 mov eax, dword ptr fs:[00000030h]1_2_00F1B562
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5656A mov eax, dword ptr fs:[00000030h]1_2_00F5656A
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5656A mov eax, dword ptr fs:[00000030h]1_2_00F5656A
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5656A mov eax, dword ptr fs:[00000030h]1_2_00F5656A
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F28550 mov eax, dword ptr fs:[00000030h]1_2_00F28550
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F28550 mov eax, dword ptr fs:[00000030h]1_2_00F28550
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5D530 mov eax, dword ptr fs:[00000030h]1_2_00F5D530
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F5D530 mov eax, dword ptr fs:[00000030h]1_2_00F5D530
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F30535 mov eax, dword ptr fs:[00000030h]1_2_00F30535
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F30535 mov eax, dword ptr fs:[00000030h]1_2_00F30535
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F30535 mov eax, dword ptr fs:[00000030h]1_2_00F30535
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F30535 mov eax, dword ptr fs:[00000030h]1_2_00F30535
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F30535 mov eax, dword ptr fs:[00000030h]1_2_00F30535
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F30535 mov eax, dword ptr fs:[00000030h]1_2_00F30535
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F2D534 mov eax, dword ptr fs:[00000030h]1_2_00F2D534
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F2D534 mov eax, dword ptr fs:[00000030h]1_2_00F2D534
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F2D534 mov eax, dword ptr fs:[00000030h]1_2_00F2D534
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F2D534 mov eax, dword ptr fs:[00000030h]1_2_00F2D534
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F2D534 mov eax, dword ptr fs:[00000030h]1_2_00F2D534
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F2D534 mov eax, dword ptr fs:[00000030h]1_2_00F2D534
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00FF5537 mov eax, dword ptr fs:[00000030h]1_2_00FF5537
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4E53E mov eax, dword ptr fs:[00000030h]1_2_00F4E53E
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4E53E mov eax, dword ptr fs:[00000030h]1_2_00F4E53E
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4E53E mov eax, dword ptr fs:[00000030h]1_2_00F4E53E
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4E53E mov eax, dword ptr fs:[00000030h]1_2_00F4E53E
                Source: C:\Users\user\Desktop\Details Of Our PO..exeCode function: 1_2_00F4E53E mov eax, dword ptr fs:[00000030h]1_2_00F4E53E
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtCreateFile: Direct from: 0x77752FECJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtOpenFile: Direct from: 0x77752DCCJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtSetInformationThread: Direct from: 0x777463F9Jump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtQueryInformationToken: Direct from: 0x77752CACJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtTerminateThread: Direct from: 0x77752FCCJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtProtectVirtualMemory: Direct from: 0x77752F9CJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtSetInformationProcess: Direct from: 0x77752C5CJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtNotifyChangeKey: Direct from: 0x77753C2CJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtOpenKeyEx: Direct from: 0x77752B9CJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtOpenSection: Direct from: 0x77752E0CJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtProtectVirtualMemory: Direct from: 0x77747B2EJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtAllocateVirtualMemory: Direct from: 0x777548ECJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtQueryVolumeInformationFile: Direct from: 0x77752F2CJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtQuerySystemInformation: Direct from: 0x777548CCJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtAllocateVirtualMemory: Direct from: 0x77752BECJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtDeviceIoControlFile: Direct from: 0x77752AECJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtCreateUserProcess: Direct from: 0x7775371CJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtWriteVirtualMemory: Direct from: 0x7775490CJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtQueryInformationProcess: Direct from: 0x77752C26Jump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtResumeThread: Direct from: 0x77752FBCJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtReadVirtualMemory: Direct from: 0x77752E8CJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtCreateKey: Direct from: 0x77752C6CJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtSetInformationThread: Direct from: 0x77752B4CJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtQueryAttributesFile: Direct from: 0x77752E6CJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtAllocateVirtualMemory: Direct from: 0x77753C9CJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtClose: Direct from: 0x77752B6C
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtCreateMutant: Direct from: 0x777535CCJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtWriteVirtualMemory: Direct from: 0x77752E3CJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtMapViewOfSection: Direct from: 0x77752D1CJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtResumeThread: Direct from: 0x777536ACJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtReadFile: Direct from: 0x77752ADCJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtQuerySystemInformation: Direct from: 0x77752DFCJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtDelayExecution: Direct from: 0x77752DDCJump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeNtAllocateVirtualMemory: Direct from: 0x77752BFCJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeMemory written: C:\Users\user\Desktop\Details Of Our PO..exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeSection loaded: NULL target: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeSection loaded: NULL target: C:\Windows\SysWOW64\ktmutil.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: NULL target: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: NULL target: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeThread register set: target process: 7624Jump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeThread APC queued: target process: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeProcess created: C:\Users\user\Desktop\Details Of Our PO..exe "C:\Users\user\Desktop\Details Of Our PO..exe"Jump to behavior
                Source: C:\Program Files (x86)\IidvLcMMkvbIslETRzkgmNDucNVfPEsjfxABVOgTmGsP\kgiwhJAWTiJvkoTzfbZTr.exeProcess created: C:\Windows\SysWOW64\ktmutil.exe "C:\Windows\SysWOW64\ktmutil.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: kgiwhJAWTiJvkoTzfbZTr.exe, 00000003.00000002.3638596905.0000000001001000.00000002.00000001.00040000.00000000.sdmp, kgiwhJAWTiJvkoTzfbZTr.exe, 00000003.00000000.1226886547.0000000001000000.00000002.00000001.00040000.00000000.sdmp, kgiwhJAWTiJvkoTzfbZTr.exe, 0000000B.00000002.3638961154.00000000015A1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: XProgram Manager
                Source: kgiwhJAWTiJvkoTzfbZTr.exe, 00000003.00000002.3638596905.0000000001001000.00000002.00000001.00040000.00000000.sdmp, kgiwhJAWTiJvkoTzfbZTr.exe, 00000003.00000000.1226886547.0000000001000000.00000002.00000001.00040000.00000000.sdmp, kgiwhJAWTiJvkoTzfbZTr.exe, 0000000B.00000002.3638961154.00000000015A1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: kgiwhJAWTiJvkoTzfbZTr.exe, 00000003.00000002.3638596905.0000000001001000.00000002.00000001.00040000.00000000.sdmp, kgiwhJAWTiJvkoTzfbZTr.exe, 00000003.00000000.1226886547.0000000001000000.00000002.00000001.00040000.00000000.sdmp, kgiwhJAWTiJvkoTzfbZTr.exe, 0000000B.00000002.3638961154.00000000015A1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: kgiwhJAWTiJvkoTzfbZTr.exe, 00000003.00000002.3638596905.0000000001001000.00000002.00000001.00040000.00000000.sdmp, kgiwhJAWTiJvkoTzfbZTr.exe, 00000003.00000000.1226886547.0000000001000000.00000002.00000001.00040000.00000000.sdmp, kgiwhJAWTiJvkoTzfbZTr.exe, 0000000B.00000002.3638961154.00000000015A1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Users\user\Desktop\Details Of Our PO..exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\DUBAI-MEDIUM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\DUBAI-LIGHT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\DUBAI-BOLD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\flat_officeFontsPreview.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\OFFSYM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\OFFSYMSL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\OFFSYMSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\OFFSYMXL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\OFFSYML.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\OFFSYMB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Details Of Our PO..exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 1.2.Details Of Our PO..exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.Details Of Our PO..exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.3639234599.0000000000B00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3641351972.00000000053B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3636731674.0000000000500000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1306921757.0000000001290000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1304498095.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3638939405.00000000009B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3639012811.0000000003090000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1307125156.0000000001DE0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\ktmutil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\ktmutil.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 1.2.Details Of Our PO..exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.Details Of Our PO..exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.3639234599.0000000000B00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3641351972.00000000053B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3636731674.0000000000500000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1306921757.0000000001290000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1304498095.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3638939405.00000000009B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3639012811.0000000003090000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1307125156.0000000001DE0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                DLL Side-Loading
                412
                Process Injection
                1
                Masquerading
                1
                OS Credential Dumping
                121
                Security Software Discovery
                Remote Services1
                Email Collection
                1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                Abuse Elevation Control Mechanism
                1
                Disable or Modify Tools
                LSASS Memory2
                Process Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                3
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                41
                Virtualization/Sandbox Evasion
                Security Account Manager41
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares1
                Data from Local System
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook412
                Process Injection
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput Capture4
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets2
                File and Directory Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Abuse Elevation Control Mechanism
                Cached Domain Credentials113
                System Information Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items4
                Obfuscated Files or Information
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job32
                Software Packing
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                Timestomp
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                DLL Side-Loading
                Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1665094 Sample: Details Of Our PO..exe Startdate: 15/04/2025 Architecture: WINDOWS Score: 100 31 www.restrainreflection.xyz 2->31 33 www.melayari.xyz 2->33 35 20 other IPs or domains 2->35 45 Suricata IDS alerts for network traffic 2->45 47 Multi AV Scanner detection for submitted file 2->47 49 Detected unpacking (changes PE section rights) 2->49 53 5 other signatures 2->53 10 Details Of Our PO..exe 3 2->10         started        signatures3 51 Performs DNS queries to domains with low reputation 33->51 process4 file5 29 C:\Users\user\...\Details Of Our PO..exe.log, ASCII 10->29 dropped 65 Injects a PE file into a foreign processes 10->65 14 Details Of Our PO..exe 10->14         started        signatures6 process7 signatures8 67 Maps a DLL or memory area into another process 14->67 17 kgiwhJAWTiJvkoTzfbZTr.exe 14->17 injected process9 signatures10 43 Found direct / indirect Syscall (likely to bypass EDR) 17->43 20 ktmutil.exe 13 17->20         started        process11 signatures12 55 Tries to steal Mail credentials (via file / registry access) 20->55 57 Tries to harvest and steal browser information (history, passwords, etc) 20->57 59 Modifies the context of a thread in another process (thread injection) 20->59 61 3 other signatures 20->61 23 kgiwhJAWTiJvkoTzfbZTr.exe 20->23 injected 27 firefox.exe 20->27         started        process13 dnsIp14 37 031233793.xyz 144.76.229.203, 49741, 49742, 49743 HETZNER-ASDE Germany 23->37 39 www.restrainreflection.xyz 13.248.169.48, 49724, 49725, 49726 AMAZON-02US United States 23->39 41 10 other IPs or domains 23->41 63 Found direct / indirect Syscall (likely to bypass EDR) 23->63 signatures15

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.