Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO 768733 - 6750.exe

Overview

General Information

Sample name:PO 768733 - 6750.exe
Analysis ID:1665582
MD5:c8917ca8fb0e14d9e97a453ca8c82f1b
SHA1:068e95cfb96b7a402db449d02d1f21b8f168f5ad
SHA256:e1e9eaab9c48a22be33b5994a2d47ff820dd1a080b9cc17e3025fd43d84450f3
Tags:exeuser-threatcat_ch
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Yara detected FormBook
.NET source code contains potential unpacker
Found direct / indirect Syscall (likely to bypass EDR)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • PO 768733 - 6750.exe (PID: 6760 cmdline: "C:\Users\user\Desktop\PO 768733 - 6750.exe" MD5: C8917CA8FB0E14D9E97A453CA8C82F1B)
    • PO 768733 - 6750.exe (PID: 6964 cmdline: "C:\Users\user\Desktop\PO 768733 - 6750.exe" MD5: C8917CA8FB0E14D9E97A453CA8C82F1B)
      • qMWzFch3YSFcC7wtIS.exe (PID: 5880 cmdline: "C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\wPGOn6NKhtsmE.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
        • Utilman.exe (PID: 3280 cmdline: "C:\Windows\SysWOW64\Utilman.exe" MD5: 4F59EE095E37A83CDCB74091C807AFA9)
          • qMWzFch3YSFcC7wtIS.exe (PID: 4216 cmdline: "C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\3beKNlZ4oZ7Ww0.exe" MD5: 9C98D1A23EFAF1B156A130CEA7D2EE3A)
          • firefox.exe (PID: 1064 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
0000000A.00000002.2495622349.0000000002B70000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000002.00000002.1561829996.0000000001090000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      0000000A.00000002.2497896046.00000000031C0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        0000000A.00000002.2497730850.0000000003170000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000002.00000002.1563152160.0000000002D30000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 2 entries
            SourceRuleDescriptionAuthorStrings
            2.2.PO 768733 - 6750.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              2.2.PO 768733 - 6750.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
                No Sigma rule has matched
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: http://www.031234912.xyz/rxqp/Avira URL Cloud: Label: malware
                Source: http://www.mslgdkor.xyz/9y3c/?WXKD=Uxo1tjvQSOjHJBx4O7005prb1XoyYBiEew3PLayvGrhDG1kktUG/q5smNt5QZYm19xNTf7YleFFlbZBl4hDMyy4sofl45pmbtyh9kyf4Y926YvzUM04JUOE1Qk9ZrWq1pdP75P4=&L8pt1=9Jot2pbhAvira URL Cloud: Label: malware
                Source: http://www.mslgdkor.xyz/9y3c/Avira URL Cloud: Label: malware
                Source: http://www.031234912.xyz/rxqp/?WXKD=yNPDi0FdWVqm/NJAwgx7fO6g9YEBOC5aDAkSlWMNRo5hReSnGh8CdZXLFNAJOOuO+XCRLDSE17WkbvE519aJaLToc6Ri01peA6nlK0kwcyW1Z26mB2oX908R/QoLMJOfWibaABM=&L8pt1=9Jot2pbhAvira URL Cloud: Label: malware
                Source: http://www.mslgdkor.xyzAvira URL Cloud: Label: malware
                Source: PO 768733 - 6750.exeVirustotal: Detection: 31%Perma Link
                Source: PO 768733 - 6750.exeReversingLabs: Detection: 30%
                Source: Yara matchFile source: 2.2.PO 768733 - 6750.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.PO 768733 - 6750.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000A.00000002.2495622349.0000000002B70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1561829996.0000000001090000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2497896046.00000000031C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2497730850.0000000003170000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1563152160.0000000002D30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1561491598.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2498125651.0000000004260000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Submited SampleNeural Call Log Analysis: 94.1%
                Source: PO 768733 - 6750.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: PO 768733 - 6750.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: NXgv.pdb source: PO 768733 - 6750.exe
                Source: Binary string: Utilman.pdb source: PO 768733 - 6750.exe, 00000002.00000002.1561957739.0000000001188000.00000004.00000020.00020000.00000000.sdmp, qMWzFch3YSFcC7wtIS.exe, 00000009.00000002.2496896551.000000000114B000.00000004.00000020.00020000.00000000.sdmp, qMWzFch3YSFcC7wtIS.exe, 00000009.00000003.1499016137.0000000001134000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: PO 768733 - 6750.exe, 00000002.00000002.1562148524.00000000015E0000.00000040.00001000.00020000.00000000.sdmp, Utilman.exe, 0000000A.00000002.2498467153.0000000004EDE000.00000040.00001000.00020000.00000000.sdmp, Utilman.exe, 0000000A.00000002.2498467153.0000000004D40000.00000040.00001000.00020000.00000000.sdmp, Utilman.exe, 0000000A.00000003.1561756392.00000000049E6000.00000004.00000020.00020000.00000000.sdmp, Utilman.exe, 0000000A.00000003.1563615703.0000000004B90000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: PO 768733 - 6750.exe, PO 768733 - 6750.exe, 00000002.00000002.1562148524.00000000015E0000.00000040.00001000.00020000.00000000.sdmp, Utilman.exe, Utilman.exe, 0000000A.00000002.2498467153.0000000004EDE000.00000040.00001000.00020000.00000000.sdmp, Utilman.exe, 0000000A.00000002.2498467153.0000000004D40000.00000040.00001000.00020000.00000000.sdmp, Utilman.exe, 0000000A.00000003.1561756392.00000000049E6000.00000004.00000020.00020000.00000000.sdmp, Utilman.exe, 0000000A.00000003.1563615703.0000000004B90000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: NXgv.pdbSHA256 source: PO 768733 - 6750.exe
                Source: Binary string: Utilman.pdbGCTL source: PO 768733 - 6750.exe, 00000002.00000002.1561957739.0000000001188000.00000004.00000020.00020000.00000000.sdmp, qMWzFch3YSFcC7wtIS.exe, 00000009.00000002.2496896551.000000000114B000.00000004.00000020.00020000.00000000.sdmp, qMWzFch3YSFcC7wtIS.exe, 00000009.00000003.1499016137.0000000001134000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: C:\Work\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: qMWzFch3YSFcC7wtIS.exe, 00000009.00000002.2495623221.00000000009AF000.00000002.00000001.01000000.0000000A.sdmp, qMWzFch3YSFcC7wtIS.exe, 0000000B.00000002.2497055741.00000000009AF000.00000002.00000001.01000000.0000000A.sdmp
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_02B8C2B0 FindFirstFileW,FindNextFileW,FindClose,10_2_02B8C2B0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 4x nop then xor eax, eax10_2_02B79E60
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 4x nop then mov ebx, 00000004h10_2_04C7050E

                Networking

                barindex
                Source: DNS query: www.xxxvideosbox.xyz
                Source: DNS query: www.globedesign.xyz
                Source: DNS query: www.031234912.xyz
                Source: DNS query: www.mslgdkor.xyz
                Source: Joe Sandbox ViewIP Address: 144.76.229.203 144.76.229.203
                Source: Joe Sandbox ViewIP Address: 13.248.169.48 13.248.169.48
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /r1zl/?WXKD=RMtocHhLv4PviDOPrz7fLuI5CuhecpuuCdUbVP3porp0rsRMSXBGxxdZR279wH8k7MV0UwICfeYC4O3VpK1XUM7OjfeUkPQONsU9uKSbOuB3Z7M7+9NrRk+hJu08ewbYw6KraIs=&L8pt1=9Jot2pbh HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeHost: www.xxxvideosbox.xyzUser-Agent: Mozilla/5.0 (BB10; Touch) AppleWebKit/537.35+ (KHTML, like Gecko) Version/10.3.1.2576 Mobile Safari/537.35+
                Source: global trafficHTTP traffic detected: GET /l81p/?WXKD=C3JkAtcW2mlHNs/sdHAbwoHAzJwy20dAXk1d8774ItIR+3LQ/2C5+kruSp+BCP/Yeile9qllhu9r/DRrJhArjD9VFtqPabX22g8LsanpPimVHw4rN8OaIPDPwd2QDBjVULUjTs8=&L8pt1=9Jot2pbh HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeHost: www.globedesign.xyzUser-Agent: Mozilla/5.0 (BB10; Touch) AppleWebKit/537.35+ (KHTML, like Gecko) Version/10.3.1.2576 Mobile Safari/537.35+
                Source: global trafficHTTP traffic detected: GET /rxqp/?WXKD=yNPDi0FdWVqm/NJAwgx7fO6g9YEBOC5aDAkSlWMNRo5hReSnGh8CdZXLFNAJOOuO+XCRLDSE17WkbvE519aJaLToc6Ri01peA6nlK0kwcyW1Z26mB2oX908R/QoLMJOfWibaABM=&L8pt1=9Jot2pbh HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeHost: www.031234912.xyzUser-Agent: Mozilla/5.0 (BB10; Touch) AppleWebKit/537.35+ (KHTML, like Gecko) Version/10.3.1.2576 Mobile Safari/537.35+
                Source: global trafficHTTP traffic detected: GET /9y3c/?WXKD=Uxo1tjvQSOjHJBx4O7005prb1XoyYBiEew3PLayvGrhDG1kktUG/q5smNt5QZYm19xNTf7YleFFlbZBl4hDMyy4sofl45pmbtyh9kyf4Y926YvzUM04JUOE1Qk9ZrWq1pdP75P4=&L8pt1=9Jot2pbh HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeHost: www.mslgdkor.xyzUser-Agent: Mozilla/5.0 (BB10; Touch) AppleWebKit/537.35+ (KHTML, like Gecko) Version/10.3.1.2576 Mobile Safari/537.35+
                Source: global trafficDNS traffic detected: DNS query: www.xxxvideosbox.xyz
                Source: global trafficDNS traffic detected: DNS query: www.globedesign.xyz
                Source: global trafficDNS traffic detected: DNS query: www.031234912.xyz
                Source: global trafficDNS traffic detected: DNS query: www.mslgdkor.xyz
                Source: unknownHTTP traffic detected: POST /l81p/ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cache-Control: max-age=0Content-Length: 209Content-Type: application/x-www-form-urlencodedConnection: closeHost: www.globedesign.xyzOrigin: http://www.globedesign.xyzReferer: http://www.globedesign.xyz/l81p/User-Agent: Mozilla/5.0 (BB10; Touch) AppleWebKit/537.35+ (KHTML, like Gecko) Version/10.3.1.2576 Mobile Safari/537.35+Data Raw: 57 58 4b 44 3d 50 31 68 45 44 62 74 4c 78 44 45 34 45 34 2f 41 51 44 38 68 77 37 7a 47 31 59 59 77 31 45 6c 56 41 6a 6f 47 2f 73 4b 65 42 74 4a 43 30 7a 58 4a 2b 56 44 55 39 77 6d 52 66 4a 2b 54 42 4f 76 68 59 42 6f 72 71 2b 4a 7a 30 38 52 58 6f 54 39 6d 50 42 73 69 72 6a 46 4b 53 66 6d 2b 55 36 66 57 6b 6c 6b 73 74 2b 6a 73 47 69 71 61 4c 6d 41 75 4e 72 69 76 4a 75 48 68 31 61 69 39 4a 48 37 68 51 70 45 63 4e 4a 7a 64 53 45 6a 2f 39 58 39 6e 57 31 56 47 56 50 6d 61 6f 68 68 72 47 56 55 6f 33 55 4a 54 31 44 73 41 39 38 72 54 35 57 71 32 55 4b 4c 52 54 7a 69 30 4c 4f 34 65 78 77 53 78 44 39 68 68 56 76 56 33 36 64 51 43 Data Ascii: WXKD=P1hEDbtLxDE4E4/AQD8hw7zG1YYw1ElVAjoG/sKeBtJC0zXJ+VDU9wmRfJ+TBOvhYBorq+Jz08RXoT9mPBsirjFKSfm+U6fWklkst+jsGiqaLmAuNrivJuHh1ai9JH7hQpEcNJzdSEj/9X9nW1VGVPmaohhrGVUo3UJT1DsA98rT5Wq2UKLRTzi0LO4exwSxD9hhVvV36dQC
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Tue, 15 Apr 2025 15:20:18 GMTContent-Type: text/html; charset=UTF-8Content-Length: 31Connection: closeVary: Accept-EncodingSet-Cookie: from=noref; expires=Wed, 16-Apr-2025 15:20:18 GMT; Max-Age=86400; path=/Set-Cookie: lfrom=noref; expires=Wed, 16-Apr-2025 15:20:18 GMT; Max-Age=86400; path=/Set-Cookie: idcheck=1744730418; expires=Wed, 16-Apr-2025 15:20:18 GMT; Max-Age=86400; path=/Set-Cookie: lp=%2Fr1zl%2F%3FWXKD%3DRMtocHhLv4PviDOPrz7fLuI5CuhecpuuCdUbVP3porp0rsRMSXBGxxdZR279wH8k7MV0UwICfeYC4O3VpK1XUM7OjfeUkPQONsU9uKSbOuB3Z7M7%2B9NrRk%2BhJu08ewbYw6KraIs%3D%26L8pt1%3D9Jot2pbh; expires=Wed, 16-Apr-2025 15:20:18 GMT; Max-Age=86400; path=/Set-Cookie: last_url=content; expires=Wed, 16-Apr-2025 15:20:18 GMT; Max-Age=86400; path=/Set-Cookie: to=%7Curl; expires=Wed, 16-Apr-2025 15:20:18 GMT; Max-Age=86400; path=/Data Raw: 20 20 20 20 20 20 20 20 43 6f 6e 74 65 6e 74 20 6e 6f 74 20 66 6f 75 6e 64 20 70 61 67 65 20 Data Ascii: Content not found page
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 15 Apr 2025 15:20:48 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 15 Apr 2025 15:20:50 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 15 Apr 2025 15:20:53 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 15 Apr 2025 15:20:56 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: qMWzFch3YSFcC7wtIS.exe, 0000000B.00000002.2499971601.0000000004FAE000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.mslgdkor.xyz
                Source: qMWzFch3YSFcC7wtIS.exe, 0000000B.00000002.2499971601.0000000004FAE000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.mslgdkor.xyz/9y3c/
                Source: Utilman.exe, 0000000A.00000003.1762831142.0000000008108000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org?q=
                Source: Utilman.exe, 0000000A.00000003.1762831142.0000000008108000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: Utilman.exe, 0000000A.00000003.1762831142.0000000008108000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: Utilman.exe, 0000000A.00000003.1762831142.0000000008108000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: Utilman.exe, 0000000A.00000003.1762831142.0000000008108000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: Utilman.exe, 0000000A.00000003.1762831142.0000000008108000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabv20-
                Source: Utilman.exe, 0000000A.00000003.1762831142.0000000008108000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: Utilman.exe, 0000000A.00000003.1762831142.0000000008108000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gemini.google.com/app?q=
                Source: Utilman.exe, 0000000A.00000002.2496001959.0000000002EBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
                Source: Utilman.exe, 0000000A.00000002.2496001959.0000000002EBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                Source: Utilman.exe, 0000000A.00000003.1756152442.00000000080F6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srfhttps://login.
                Source: Utilman.exe, 0000000A.00000002.2496001959.0000000002EBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf&
                Source: Utilman.exe, 0000000A.00000002.2496001959.0000000002EBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2)
                Source: Utilman.exe, 0000000A.00000002.2496001959.0000000002EBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: Utilman.exe, 0000000A.00000002.2496001959.0000000002EBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033M
                Source: Utilman.exe, 0000000A.00000002.2496001959.0000000002EBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: Utilman.exe, 0000000A.00000002.2496001959.0000000002EBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                Source: Utilman.exe, 0000000A.00000003.1762831142.0000000008108000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/v20
                Source: Utilman.exe, 0000000A.00000003.1762831142.0000000008108000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 2.2.PO 768733 - 6750.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.PO 768733 - 6750.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000A.00000002.2495622349.0000000002B70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1561829996.0000000001090000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2497896046.00000000031C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2497730850.0000000003170000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1563152160.0000000002D30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1561491598.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2498125651.0000000004260000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0042C4B3 NtClose,2_2_0042C4B3
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652B60 NtClose,LdrInitializeThunk,2_2_01652B60
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_01652DF0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652C70 NtFreeVirtualMemory,LdrInitializeThunk,2_2_01652C70
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016535C0 NtCreateMutant,LdrInitializeThunk,2_2_016535C0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01654340 NtSetContextThread,2_2_01654340
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01654650 NtSuspendThread,2_2_01654650
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652BE0 NtQueryValueKey,2_2_01652BE0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652BF0 NtAllocateVirtualMemory,2_2_01652BF0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652BA0 NtEnumerateValueKey,2_2_01652BA0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652B80 NtQueryInformationFile,2_2_01652B80
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652AF0 NtWriteFile,2_2_01652AF0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652AD0 NtReadFile,2_2_01652AD0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652AB0 NtWaitForSingleObject,2_2_01652AB0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652D30 NtUnmapViewOfSection,2_2_01652D30
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652D00 NtSetInformationFile,2_2_01652D00
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652D10 NtMapViewOfSection,2_2_01652D10
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652DD0 NtDelayExecution,2_2_01652DD0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652DB0 NtEnumerateKey,2_2_01652DB0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652C60 NtCreateKey,2_2_01652C60
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652C00 NtQueryInformationProcess,2_2_01652C00
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652CF0 NtOpenProcess,2_2_01652CF0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652CC0 NtQueryVirtualMemory,2_2_01652CC0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652CA0 NtQueryInformationToken,2_2_01652CA0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652F60 NtCreateProcessEx,2_2_01652F60
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652F30 NtCreateSection,2_2_01652F30
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652FE0 NtCreateFile,2_2_01652FE0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652FA0 NtQuerySection,2_2_01652FA0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652FB0 NtResumeThread,2_2_01652FB0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652F90 NtProtectVirtualMemory,2_2_01652F90
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652E30 NtWriteVirtualMemory,2_2_01652E30
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652EE0 NtQueueApcThread,2_2_01652EE0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652EA0 NtAdjustPrivilegesToken,2_2_01652EA0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652E80 NtReadVirtualMemory,2_2_01652E80
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01653010 NtOpenDirectoryObject,2_2_01653010
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01653090 NtSetValueKey,2_2_01653090
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016539B0 NtGetContextThread,2_2_016539B0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01653D70 NtOpenThread,2_2_01653D70
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01653D10 NtOpenProcessToken,2_2_01653D10
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB4650 NtSuspendThread,LdrInitializeThunk,10_2_04DB4650
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB4340 NtSetContextThread,LdrInitializeThunk,10_2_04DB4340
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB2CA0 NtQueryInformationToken,LdrInitializeThunk,10_2_04DB2CA0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB2C70 NtFreeVirtualMemory,LdrInitializeThunk,10_2_04DB2C70
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB2C60 NtCreateKey,LdrInitializeThunk,10_2_04DB2C60
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB2DD0 NtDelayExecution,LdrInitializeThunk,10_2_04DB2DD0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB2DF0 NtQuerySystemInformation,LdrInitializeThunk,10_2_04DB2DF0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB2D10 NtMapViewOfSection,LdrInitializeThunk,10_2_04DB2D10
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB2D30 NtUnmapViewOfSection,LdrInitializeThunk,10_2_04DB2D30
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB2EE0 NtQueueApcThread,LdrInitializeThunk,10_2_04DB2EE0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB2E80 NtReadVirtualMemory,LdrInitializeThunk,10_2_04DB2E80
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB2FE0 NtCreateFile,LdrInitializeThunk,10_2_04DB2FE0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB2FB0 NtResumeThread,LdrInitializeThunk,10_2_04DB2FB0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB2F30 NtCreateSection,LdrInitializeThunk,10_2_04DB2F30
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB2AD0 NtReadFile,LdrInitializeThunk,10_2_04DB2AD0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB2AF0 NtWriteFile,LdrInitializeThunk,10_2_04DB2AF0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB2BF0 NtAllocateVirtualMemory,LdrInitializeThunk,10_2_04DB2BF0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB2BE0 NtQueryValueKey,LdrInitializeThunk,10_2_04DB2BE0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB2BA0 NtEnumerateValueKey,LdrInitializeThunk,10_2_04DB2BA0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB2B60 NtClose,LdrInitializeThunk,10_2_04DB2B60
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB35C0 NtCreateMutant,LdrInitializeThunk,10_2_04DB35C0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB39B0 NtGetContextThread,LdrInitializeThunk,10_2_04DB39B0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB2CC0 NtQueryVirtualMemory,10_2_04DB2CC0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB2CF0 NtOpenProcess,10_2_04DB2CF0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB2C00 NtQueryInformationProcess,10_2_04DB2C00
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB2DB0 NtEnumerateKey,10_2_04DB2DB0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB2D00 NtSetInformationFile,10_2_04DB2D00
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB2EA0 NtAdjustPrivilegesToken,10_2_04DB2EA0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB2E30 NtWriteVirtualMemory,10_2_04DB2E30
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB2F90 NtProtectVirtualMemory,10_2_04DB2F90
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB2FA0 NtQuerySection,10_2_04DB2FA0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB2F60 NtCreateProcessEx,10_2_04DB2F60
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB2AB0 NtWaitForSingleObject,10_2_04DB2AB0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB2B80 NtQueryInformationFile,10_2_04DB2B80
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB3090 NtSetValueKey,10_2_04DB3090
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB3010 NtOpenDirectoryObject,10_2_04DB3010
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB3D70 NtOpenThread,10_2_04DB3D70
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB3D10 NtOpenProcessToken,10_2_04DB3D10
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_02B98E90 NtCreateFile,10_2_02B98E90
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_02B992F0 NtAllocateVirtualMemory,10_2_02B992F0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_02B990F0 NtDeleteFile,10_2_02B990F0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_02B99000 NtReadFile,10_2_02B99000
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_02B99190 NtClose,10_2_02B99190
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04C7F8D7 NtUnmapViewOfSection,NtClose,10_2_04C7F8D7
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04C7F95A NtUnmapViewOfSection,NtClose,10_2_04C7F95A
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04C7FB53 NtResumeThread,10_2_04C7FB53
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 0_2_013AE0540_2_013AE054
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 0_2_071E64200_2_071E6420
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 0_2_071E84D80_2_071E84D8
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 0_2_071E93A00_2_071E93A0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 0_2_071E64120_2_071E6412
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 0_2_071E5DDA0_2_071E5DDA
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 0_2_071E5DE80_2_071E5DE8
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 0_2_071EFB990_2_071EFB99
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 0_2_073AE0D00_2_073AE0D0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 0_2_073AE0C00_2_073AE0C0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 0_2_074417180_2_07441718
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 0_2_07441FF00_2_07441FF0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 0_2_07444FF00_2_07444FF0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 0_2_07446B980_2_07446B98
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 0_2_074400400_2_07440040
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 0_2_074404780_2_07440478
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 0_2_080100110_2_08010011
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 0_2_071ECF5A0_2_071ECF5A
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 0_2_071E93200_2_071E9320
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 0_2_071E00060_2_071E0006
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 0_2_071E00400_2_071E0040
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_004183532_2_00418353
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_004030A02_2_004030A0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0042EAE32_2_0042EAE3
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0040FAEF2_2_0040FAEF
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0040FAF32_2_0040FAF3
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0040231E2_2_0040231E
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_004023202_2_00402320
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_004024C22_2_004024C2
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_004024D02_2_004024D0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0040DCF32_2_0040DCF3
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_004165512_2_00416551
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_004165532_2_00416553
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0040FD132_2_0040FD13
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0040DE432_2_0040DE43
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0040DE382_2_0040DE38
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_004027602_2_00402760
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016A81582_2_016A8158
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016101002_2_01610100
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016BA1182_2_016BA118
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016D81CC2_2_016D81CC
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016E01AA2_2_016E01AA
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016D41A22_2_016D41A2
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016B20002_2_016B2000
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016DA3522_2_016DA352
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016E03E62_2_016E03E6
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0162E3F02_2_0162E3F0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016C02742_2_016C0274
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016A02C02_2_016A02C0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016205352_2_01620535
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016E05912_2_016E0591
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016D24462_2_016D2446
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016C44202_2_016C4420
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016CE4F62_2_016CE4F6
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016207702_2_01620770
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016447502_2_01644750
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161C7C02_2_0161C7C0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0163C6E02_2_0163C6E0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016369622_2_01636962
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016EA9A62_2_016EA9A6
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0162A8402_2_0162A840
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164E8F02_2_0164E8F0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016068B82_2_016068B8
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016DAB402_2_016DAB40
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016D6BD72_2_016D6BD7
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161EA802_2_0161EA80
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0162AD002_2_0162AD00
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016BCD1F2_2_016BCD1F
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161ADE02_2_0161ADE0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01638DBF2_2_01638DBF
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01620C002_2_01620C00
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01610CF22_2_01610CF2
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016C0CB52_2_016C0CB5
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01694F402_2_01694F40
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01662F282_2_01662F28
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01640F302_2_01640F30
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016C2F302_2_016C2F30
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0162CFE02_2_0162CFE0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01612FC82_2_01612FC8
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0169EFA02_2_0169EFA0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01620E592_2_01620E59
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016DEE262_2_016DEE26
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016DEEDB2_2_016DEEDB
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01632E902_2_01632E90
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016DCE932_2_016DCE93
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016EB16B2_2_016EB16B
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0165516C2_2_0165516C
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0160F1722_2_0160F172
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0162B1B02_2_0162B1B0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016D70E92_2_016D70E9
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016DF0E02_2_016DF0E0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016CF0CC2_2_016CF0CC
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0160D34C2_2_0160D34C
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016D132D2_2_016D132D
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0166739A2_2_0166739A
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016C12ED2_2_016C12ED
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0163B2C02_2_0163B2C0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016252A02_2_016252A0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016D75712_2_016D7571
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016E95C32_2_016E95C3
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016BD5B02_2_016BD5B0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016114602_2_01611460
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016DF43F2_2_016DF43F
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016DF7B02_2_016DF7B0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016656302_2_01665630
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016D16CC2_2_016D16CC
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016299502_2_01629950
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0163B9502_2_0163B950
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016B59102_2_016B5910
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0168D8002_2_0168D800
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016238E02_2_016238E0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016DFB762_2_016DFB76
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01695BF02_2_01695BF0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0165DBF92_2_0165DBF9
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0163FB802_2_0163FB80
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01693A6C2_2_01693A6C
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016DFA492_2_016DFA49
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016D7A462_2_016D7A46
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016CDAC62_2_016CDAC6
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01665AA02_2_01665AA0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016C1AA32_2_016C1AA3
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016D7D732_2_016D7D73
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01623D402_2_01623D40
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016D1D5A2_2_016D1D5A
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0163FDC02_2_0163FDC0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01699C322_2_01699C32
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016DFCF22_2_016DFCF2
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016DFF092_2_016DFF09
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016DFFB12_2_016DFFB1
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01621F922_2_01621F92
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01629EB02_2_01629EB0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E2E4F610_2_04E2E4F6
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E3244610_2_04E32446
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E2442010_2_04E24420
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E4059110_2_04E40591
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D8053510_2_04D80535
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D9C6E010_2_04D9C6E0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D7C7C010_2_04D7C7C0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DA475010_2_04DA4750
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D8077010_2_04D80770
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E1200010_2_04E12000
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E381CC10_2_04E381CC
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E341A210_2_04E341A2
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E401AA10_2_04E401AA
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E0815810_2_04E08158
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D7010010_2_04D70100
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E1A11810_2_04E1A118
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E002C010_2_04E002C0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E2027410_2_04E20274
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E403E610_2_04E403E6
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D8E3F010_2_04D8E3F0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E3A35210_2_04E3A352
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D70CF210_2_04D70CF2
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E20CB510_2_04E20CB5
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D80C0010_2_04D80C00
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D7ADE010_2_04D7ADE0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D98DBF10_2_04D98DBF
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D8AD0010_2_04D8AD00
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E1CD1F10_2_04E1CD1F
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E3EEDB10_2_04E3EEDB
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D92E9010_2_04D92E90
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E3CE9310_2_04E3CE93
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D80E5910_2_04D80E59
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E3EE2610_2_04E3EE26
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D72FC810_2_04D72FC8
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D8CFE010_2_04D8CFE0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DFEFA010_2_04DFEFA0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DF4F4010_2_04DF4F40
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E22F3010_2_04E22F30
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DA0F3010_2_04DA0F30
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DC2F2810_2_04DC2F28
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DAE8F010_2_04DAE8F0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D668B810_2_04D668B8
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D8A84010_2_04D8A840
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E4A9A610_2_04E4A9A6
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D9696210_2_04D96962
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D7EA8010_2_04D7EA80
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E36BD710_2_04E36BD7
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E3AB4010_2_04E3AB40
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D7146010_2_04D71460
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E3F43F10_2_04E3F43F
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E495C310_2_04E495C3
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E1D5B010_2_04E1D5B0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E3757110_2_04E37571
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E316CC10_2_04E316CC
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DC563010_2_04DC5630
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E3F7B010_2_04E3F7B0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E3F0E010_2_04E3F0E0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E370E910_2_04E370E9
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E2F0CC10_2_04E2F0CC
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D8B1B010_2_04D8B1B0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E4B16B10_2_04E4B16B
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D6F17210_2_04D6F172
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DB516C10_2_04DB516C
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E212ED10_2_04E212ED
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D9B2C010_2_04D9B2C0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D852A010_2_04D852A0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DC739A10_2_04DC739A
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D6D34C10_2_04D6D34C
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E3132D10_2_04E3132D
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E3FCF210_2_04E3FCF2
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DF9C3210_2_04DF9C32
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D9FDC010_2_04D9FDC0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E37D7310_2_04E37D73
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D83D4010_2_04D83D40
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E31D5A10_2_04E31D5A
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D89EB010_2_04D89EB0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D43FD510_2_04D43FD5
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D43FD210_2_04D43FD2
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D81F9210_2_04D81F92
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E3FFB110_2_04E3FFB1
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E3FF0910_2_04E3FF09
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D838E010_2_04D838E0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DED80010_2_04DED800
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D8995010_2_04D89950
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D9B95010_2_04D9B950
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E1591010_2_04E15910
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E2DAC610_2_04E2DAC6
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E21AA310_2_04E21AA3
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DC5AA010_2_04DC5AA0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E37A4610_2_04E37A46
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E3FA4910_2_04E3FA49
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DF3A6C10_2_04DF3A6C
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DBDBF910_2_04DBDBF9
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04DF5BF010_2_04DF5BF0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D9FB8010_2_04D9FB80
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04E3FB7610_2_04E3FB76
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_02B8194010_2_02B81940
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_02B7C7D010_2_02B7C7D0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_02B7C7CC10_2_02B7C7CC
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_02B7AB2010_2_02B7AB20
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_02B7AB1510_2_02B7AB15
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_02B7C9F010_2_02B7C9F0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_02B7A9D010_2_02B7A9D0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_02B8323010_2_02B83230
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_02B8322E10_2_02B8322E
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_02B8503010_2_02B85030
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_02B9B7C010_2_02B9B7C0
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04C7E77D10_2_04C7E77D
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04C7E2C510_2_04C7E2C5
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04C7E3E310_2_04C7E3E3
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04C7D84810_2_04C7D848
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04C7CAE810_2_04C7CAE8
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04C7CA4010_2_04C7CA40
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: String function: 01655130 appears 58 times
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: String function: 0168EA12 appears 86 times
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: String function: 0160B970 appears 250 times
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: String function: 01667E54 appears 110 times
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: String function: 0169F290 appears 105 times
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: String function: 04DEEA12 appears 86 times
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: String function: 04DFF290 appears 105 times
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: String function: 04DB5130 appears 58 times
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: String function: 04DC7E54 appears 109 times
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: String function: 04D6B970 appears 250 times
                Source: PO 768733 - 6750.exe, 00000000.00000002.1273230183.0000000007F80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs PO 768733 - 6750.exe
                Source: PO 768733 - 6750.exe, 00000000.00000000.1228955525.0000000000B84000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNXgv.exe* vs PO 768733 - 6750.exe
                Source: PO 768733 - 6750.exe, 00000000.00000002.1242897129.0000000000F7E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs PO 768733 - 6750.exe
                Source: PO 768733 - 6750.exe, 00000002.00000002.1561957739.0000000001188000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameutilman2.exej% vs PO 768733 - 6750.exe
                Source: PO 768733 - 6750.exe, 00000002.00000002.1562148524.000000000170D000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs PO 768733 - 6750.exe
                Source: PO 768733 - 6750.exeBinary or memory string: OriginalFilenameNXgv.exe* vs PO 768733 - 6750.exe
                Source: PO 768733 - 6750.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: PO 768733 - 6750.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 0.2.PO 768733 - 6750.exe.7f80000.4.raw.unpack, zAEmaMCbEjUsWenrKP.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.PO 768733 - 6750.exe.7f80000.4.raw.unpack, zAEmaMCbEjUsWenrKP.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.PO 768733 - 6750.exe.7f80000.4.raw.unpack, XbC8EkRmInwb6m3y8X.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.PO 768733 - 6750.exe.7f80000.4.raw.unpack, XbC8EkRmInwb6m3y8X.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.PO 768733 - 6750.exe.7f80000.4.raw.unpack, XbC8EkRmInwb6m3y8X.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/2@4/4
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO 768733 - 6750.exe.logJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeMutant created: NULL
                Source: C:\Windows\SysWOW64\Utilman.exeFile created: C:\Users\user\AppData\Local\Temp\1b71JpJump to behavior
                Source: PO 768733 - 6750.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: PO 768733 - 6750.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: Utilman.exe, 0000000A.00000003.1758664589.0000000002F19000.00000004.00000020.00020000.00000000.sdmp, Utilman.exe, 0000000A.00000002.2496001959.0000000002F47000.00000004.00000020.00020000.00000000.sdmp, Utilman.exe, 0000000A.00000003.1757805795.0000000002EF9000.00000004.00000020.00020000.00000000.sdmp, Utilman.exe, 0000000A.00000002.2496001959.0000000002F19000.00000004.00000020.00020000.00000000.sdmp, Utilman.exe, 0000000A.00000002.2496001959.0000000002F24000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: PO 768733 - 6750.exeVirustotal: Detection: 31%
                Source: PO 768733 - 6750.exeReversingLabs: Detection: 30%
                Source: unknownProcess created: C:\Users\user\Desktop\PO 768733 - 6750.exe "C:\Users\user\Desktop\PO 768733 - 6750.exe"
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess created: C:\Users\user\Desktop\PO 768733 - 6750.exe "C:\Users\user\Desktop\PO 768733 - 6750.exe"
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeProcess created: C:\Windows\SysWOW64\Utilman.exe "C:\Windows\SysWOW64\Utilman.exe"
                Source: C:\Windows\SysWOW64\Utilman.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess created: C:\Users\user\Desktop\PO 768733 - 6750.exe "C:\Users\user\Desktop\PO 768733 - 6750.exe"Jump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeProcess created: C:\Windows\SysWOW64\Utilman.exe "C:\Windows\SysWOW64\Utilman.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeSection loaded: oleacc.dllJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeSection loaded: duser.dllJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeSection loaded: dui70.dllJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeSection loaded: winsqlite3.dllJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                Source: PO 768733 - 6750.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: PO 768733 - 6750.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: PO 768733 - 6750.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: NXgv.pdb source: PO 768733 - 6750.exe
                Source: Binary string: Utilman.pdb source: PO 768733 - 6750.exe, 00000002.00000002.1561957739.0000000001188000.00000004.00000020.00020000.00000000.sdmp, qMWzFch3YSFcC7wtIS.exe, 00000009.00000002.2496896551.000000000114B000.00000004.00000020.00020000.00000000.sdmp, qMWzFch3YSFcC7wtIS.exe, 00000009.00000003.1499016137.0000000001134000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: PO 768733 - 6750.exe, 00000002.00000002.1562148524.00000000015E0000.00000040.00001000.00020000.00000000.sdmp, Utilman.exe, 0000000A.00000002.2498467153.0000000004EDE000.00000040.00001000.00020000.00000000.sdmp, Utilman.exe, 0000000A.00000002.2498467153.0000000004D40000.00000040.00001000.00020000.00000000.sdmp, Utilman.exe, 0000000A.00000003.1561756392.00000000049E6000.00000004.00000020.00020000.00000000.sdmp, Utilman.exe, 0000000A.00000003.1563615703.0000000004B90000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: PO 768733 - 6750.exe, PO 768733 - 6750.exe, 00000002.00000002.1562148524.00000000015E0000.00000040.00001000.00020000.00000000.sdmp, Utilman.exe, Utilman.exe, 0000000A.00000002.2498467153.0000000004EDE000.00000040.00001000.00020000.00000000.sdmp, Utilman.exe, 0000000A.00000002.2498467153.0000000004D40000.00000040.00001000.00020000.00000000.sdmp, Utilman.exe, 0000000A.00000003.1561756392.00000000049E6000.00000004.00000020.00020000.00000000.sdmp, Utilman.exe, 0000000A.00000003.1563615703.0000000004B90000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: NXgv.pdbSHA256 source: PO 768733 - 6750.exe
                Source: Binary string: Utilman.pdbGCTL source: PO 768733 - 6750.exe, 00000002.00000002.1561957739.0000000001188000.00000004.00000020.00020000.00000000.sdmp, qMWzFch3YSFcC7wtIS.exe, 00000009.00000002.2496896551.000000000114B000.00000004.00000020.00020000.00000000.sdmp, qMWzFch3YSFcC7wtIS.exe, 00000009.00000003.1499016137.0000000001134000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: C:\Work\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: qMWzFch3YSFcC7wtIS.exe, 00000009.00000002.2495623221.00000000009AF000.00000002.00000001.01000000.0000000A.sdmp, qMWzFch3YSFcC7wtIS.exe, 0000000B.00000002.2497055741.00000000009AF000.00000002.00000001.01000000.0000000A.sdmp

                Data Obfuscation

                barindex
                Source: 0.2.PO 768733 - 6750.exe.7f80000.4.raw.unpack, XbC8EkRmInwb6m3y8X.cs.Net Code: XGjklSFQXe System.Reflection.Assembly.Load(byte[])
                Source: 0.2.PO 768733 - 6750.exe.7330000.3.raw.unpack, gaWNLGnov1rlIG3v4D.cs.Net Code: R28xr4yyh System.Reflection.Assembly.Load(byte[])
                Source: 0.2.PO 768733 - 6750.exe.323c808.0.raw.unpack, gaWNLGnov1rlIG3v4D.cs.Net Code: R28xr4yyh System.Reflection.Assembly.Load(byte[])
                Source: PO 768733 - 6750.exeStatic PE information: 0xDEBD18E8 [Tue Jun 1 13:23:52 2088 UTC]
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 0_2_013ADA52 pushfd ; retf 0_2_013ADA81
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 0_2_073AE7A5 pushfd ; iretd 0_2_073AE7A6
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 0_2_073AE8DE pushfd ; iretd 0_2_073AE8DF
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 0_2_0801C602 pushad ; ret 0_2_0801C609
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0040A9ED push ebx; ret 2_2_0040A9EE
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0040D256 pushad ; ret 2_2_0040D259
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_00401ADF push edi; retf 2_2_00401B02
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_00403320 push eax; ret 2_2_00403322
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_00402DD3 pushad ; ret 2_2_00402DD4
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_004115DC push edi; ret 2_2_004115E6
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_004115DC push edx; retf 2_2_00411701
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_004085E2 push es; ret 2_2_004085F8
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_00408588 push esp; ret 2_2_0040858A
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_004085A0 push ss; iretd 2_2_004085E0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_00418E38 push ebx; iretd 2_2_00418E45
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_004116C1 push edx; retf 2_2_00411701
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016109AD push ecx; mov dword ptr [esp], ecx2_2_016109B6
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D427FA pushad ; ret 10_2_04D427F9
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D4225F pushad ; ret 10_2_04D427F9
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D4283D push eax; iretd 10_2_04D42858
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_04D709AD push ecx; mov dword ptr [esp], ecx10_2_04D709B6
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_02B7E2B9 push edi; ret 10_2_02B7E2C3
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_02B7E2B9 push edx; retf 10_2_02B7E3DE
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_02B7E39E push edx; retf 10_2_02B7E3DE
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_02B8832E push 26FEC064h; ret 10_2_02B8833A
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_02B8834C push 8FCC23F0h; iretd 10_2_02B8836E
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_02B8201D push edi; iretd 10_2_02B82025
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_02B752BF push es; ret 10_2_02B752D5
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_02B7527D push ss; iretd 10_2_02B752BD
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_02B75265 push esp; ret 10_2_02B75267
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_02B8B378 push edi; iretd 10_2_02B8B3A1
                Source: PO 768733 - 6750.exeStatic PE information: section name: .text entropy: 7.579282407917342
                Source: 0.2.PO 768733 - 6750.exe.7f80000.4.raw.unpack, D8D8XR6MVfhKcfmSYN.csHigh entropy of concatenated method names: 'vBurqRv7Pw', 'VdaroKvyvG', 'xRQrrvSphB', 'BDorhsLYM3', 'PP8rZoJA2C', 'ipmr22aKWu', 'Dispose', 'jPqUSFInmL', 'WSGU3YxWFh', 'kbDUKfLAKT'
                Source: 0.2.PO 768733 - 6750.exe.7f80000.4.raw.unpack, bmY1qLjij5QZpv7pUQ.csHigh entropy of concatenated method names: 'tacKHqoAVT', 'L6QKMGTkwE', 'cOoKC4d1HL', 'LbqKjRbcuq', 'bcfKqoqJeK', 'Pg6KBRtrmi', 'J0NKofBK4F', 'oBrKU6WnAl', 'uTCKrklfEe', 'cRqK8bUcef'
                Source: 0.2.PO 768733 - 6750.exe.7f80000.4.raw.unpack, gsUp5T01i3hSnGbdKoy.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'MCB85yNaPT', 'M0w8bMEDeK', 'zJV8L7D1G1', 'yAK8QFStnP', 'Ows8PIRgH9', 'N0F8INqrQ1', 'fEt8woEWcF'
                Source: 0.2.PO 768733 - 6750.exe.7f80000.4.raw.unpack, EGWy38LqbVR4rfS2q5.csHigh entropy of concatenated method names: 'rUBYCJRNgr', 'yAgYjVgkQ5', 'PCiYENklcw', 'wGlYxwP9ce', 'KmQYXHjhal', 'LcXYtH1EvL', 'BcKYdMa1vX', 'niQYgx4bQE', 'GoKYWVkpAv', 'G9kY5Tjk6E'
                Source: 0.2.PO 768733 - 6750.exe.7f80000.4.raw.unpack, bwmN1a0kjo9ysEEMmTF.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'TQevrpfjNs', 'lRHv8S5ZRW', 'IgkvhLrTbn', 'coXvvf27pc', 'OdRvZaIuxn', 'Sx2vyXMxHW', 'Kkqv2rSMcS'
                Source: 0.2.PO 768733 - 6750.exe.7f80000.4.raw.unpack, DiCurJzi7OnpTJZJs5.csHigh entropy of concatenated method names: 'xRr8MJIXmU', 'Rvi8CEqHMt', 'if88jq1foZ', 'jpk8E2ap3u', 'y878xwXV4n', 'P6V8XJLe4M', 'q2v8tEx7pH', 'HLg821lUkT', 'Oa88uUCbqK', 'eZ08aX7P8o'
                Source: 0.2.PO 768733 - 6750.exe.7f80000.4.raw.unpack, C3Qq4G003JiwkAudo6B.csHigh entropy of concatenated method names: 'pIQ8fINmrt', 'hAo8zNNSdT', 'KWhh1GAJsJ', 'tHuh06TwYa', 'DQRhO26ukV', 'pJwhivqnny', 'DjdhkmlcFD', 'tDhhpWBecy', 'Ls5hSvpUm8', 'wEHh3nKwgB'
                Source: 0.2.PO 768733 - 6750.exe.7f80000.4.raw.unpack, XbC8EkRmInwb6m3y8X.csHigh entropy of concatenated method names: 'a9QipFKyaN', 'luIiSdc4Nq', 'afRi32Ip1D', 'M6wiKIuCxF', 'N5UicBjKCw', 'JUriVQtfBm', 'n2Ti7vSqw3', 'MgeiRlJES5', 'g0XiA2p3ct', 'tefiTVkAJ1'
                Source: 0.2.PO 768733 - 6750.exe.7f80000.4.raw.unpack, DT8D5XOG779NFQvuS8.csHigh entropy of concatenated method names: 'rG2lJtE1C', 'tKQHIw6nI', 'p6FM0pC9Q', 'mFJeGHByR', 'AoUjKh57h', 'nLwFhKdGd', 'q45Kpitbub7j94fT8E', 'nFUW1cQR8nISHcK15b', 'pxsUXfsyP', 'dUx8ML6tQ'
                Source: 0.2.PO 768733 - 6750.exe.7f80000.4.raw.unpack, K9AAU7EpJFqQqPvwPT.csHigh entropy of concatenated method names: 'Tp2VptBnia', 'GemV3haWdn', 'eGdVcimjHL', 'mkCV7sDgyo', 'spVVRqIC1W', 'VQwcGxcgdA', 'K6lcNSChdW', 'u94c6A0GAt', 'b02c4OPR0P', 'qnUcs5u1ZG'
                Source: 0.2.PO 768733 - 6750.exe.7f80000.4.raw.unpack, WrdxTXFvAmlUQRIrOU.csHigh entropy of concatenated method names: 'YY6cnllqW8', 'qkyceFVpJB', 'e0yKJNhKwD', 'k3jKX1Y4yV', 'dD4KtSTwXb', 'UEwKDK1HKp', 'PSKKdZdRPB', 'DxNKge21b9', 'svXKmWf8g8', 'HVHKWZEk44'
                Source: 0.2.PO 768733 - 6750.exe.7f80000.4.raw.unpack, AygVyfkkqL8H17BxlE.csHigh entropy of concatenated method names: 'BRl07AEmaM', 'PEj0RUsWen', 'Qij0T5QZpv', 'jpU09Q6rdx', 'kIr0qOUD9A', 'lU70BpJFqQ', 'V6ew2Sv3qaXFlQr9Ir', 'A1piDnWY3mWeSYLL6N', 'q3G00SLctC', 'qYw0i3XPyT'
                Source: 0.2.PO 768733 - 6750.exe.7f80000.4.raw.unpack, R7wCMy390UlOJBkyiZ.csHigh entropy of concatenated method names: 'Dispose', 'YhK0scfmSY', 'h0EOxpXcPR', 'dcdvGulndZ', 'UGG0ftIpww', 'FC10zFG6FH', 'ProcessDialogKey', 'MCJO1QRPZH', 'JryO0NExaM', 'lNeOORDpYF'
                Source: 0.2.PO 768733 - 6750.exe.7f80000.4.raw.unpack, zAEmaMCbEjUsWenrKP.csHigh entropy of concatenated method names: 'KWI3QMgRn5', 'O1u3P2m87m', 'WfS3I3egrQ', 'J3o3wGJR3T', 'dxb3GlmskQ', 'hkt3NSVV99', 'B3m36dXaiX', 'qgk34dlwZi', 'Id93sH8wti', 'e943fojeI6'
                Source: 0.2.PO 768733 - 6750.exe.7f80000.4.raw.unpack, WRrmI9deYLLO69OLFt.csHigh entropy of concatenated method names: 'QPK7SqZk90', 'nMZ7KCgAwJ', 'Npq7VuXNdW', 'yKAVf6LqDk', 'WEZVzcbyRQ', 'O7V71HgcFC', 'kpu70mEsp3', 'btP7O4qMVj', 'Toh7iyWYN5', 'Pbu7kFguOU'
                Source: 0.2.PO 768733 - 6750.exe.7f80000.4.raw.unpack, kT5QqGXAK94xHOeIXD.csHigh entropy of concatenated method names: 'VG8V2XkcHr', 'CaJVujwpae', 'hnWVlMqbK6', 'iQmVHSrWsm', 'RcEVMBBtir', 'ExfVekWiq3', 'RAYVjH99ph', 'zNFVFNwQ58', 'Qh5ZWyXILh1I0ZQWSSX', 'cpm4L4XM17Ud44gmuKi'
                Source: 0.2.PO 768733 - 6750.exe.7f80000.4.raw.unpack, PnZZR4KClw0TF9pimn.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'XGxOs5chX8', 'rZrOfCSkl0', 'RBPOzjCttJ', 'Dwri1Y3AB1', 'EF9i0i8VeX', 'PQCiOjOPZL', 'zsOiiioek5', 'XmWEj7DCEX0qG6mYo87'
                Source: 0.2.PO 768733 - 6750.exe.7f80000.4.raw.unpack, CXYNmeNSHp1qyy5SKX.csHigh entropy of concatenated method names: 'n1bo4OmHrD', 'EZBofV2fC0', 'UWkU16ayVx', 'F80U0p9nK3', 'Njwo5EOjS6', 'PQAobb5hLH', 'YKdoLUOxM9', 'b7RoQ7s40Q', 'DfloPK0JHl', 'j9woIKTVwh'
                Source: 0.2.PO 768733 - 6750.exe.7f80000.4.raw.unpack, eLwKn00O2A52U8647X1.csHigh entropy of concatenated method names: 'ToString', 's3HhCfC5kM', 'ApJhjPd91J', 'JcAhFVWgJv', 'iJihEfjlKT', 'qX8hxAQkV1', 'dO4hJpfJPs', 'qmXhX4IuZR', 'JTfaPvhDg1qiE4ACRQT', 'S22kcZhX5NeEKYF806V'
                Source: 0.2.PO 768733 - 6750.exe.7f80000.4.raw.unpack, VBEp6gmlLlctvxLqHf.csHigh entropy of concatenated method names: 'Mfi7utRTtK', 'Id37abDIXm', 'V4a7lWfUYj', 'sBU7H2RWN8', 'nLQ7n5yPhL', 'lBt7MHcnev', 'ike7eSIrjK', 'PQT7C0ct9f', 'bmP7jEOioo', 'jGG7FLYLjf'
                Source: 0.2.PO 768733 - 6750.exe.7f80000.4.raw.unpack, HQRPZHstryNExaMANe.csHigh entropy of concatenated method names: 'gVdrEoIikj', 'RUlrxHOMuF', 'hM1rJ24iZY', 'gjprXot9uG', 'q2ortXdoQ5', 'kSvrDp6tHr', 'weJrd3x7PR', 'fq9rg7sYvB', 'OdGrm7OZJG', 'hprrWRQxva'
                Source: 0.2.PO 768733 - 6750.exe.7f80000.4.raw.unpack, kDpYFEfYGxJiucY4DV.csHigh entropy of concatenated method names: 'tYj8KSFADv', 'qAP8cR0OQ3', 'uqq8V0PSqI', 'vXm87MVidy', 'ta38r8E05K', 'MNg8RWPuaH', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.PO 768733 - 6750.exe.7330000.3.raw.unpack, RXv2gXFWfOHdOu5o4x.csHigh entropy of concatenated method names: 'Dispose', 'RXvF2gXWf', 'n2Bp3KX6LyhTbP96rs', 'HAstR11TVar3Xj672y', 'xsAVXGkykj1GusshJD', 'JGFM2jecZvOttkGp4k', 'HHpSMXNqrPUQ9uRakI', 'ranpYVVsY7udN56k77', 'p5pu9YMFbrUFoKYFkw', 'AbP9nkAg30G7nF7ARo'
                Source: 0.2.PO 768733 - 6750.exe.7330000.3.raw.unpack, gaWNLGnov1rlIG3v4D.csHigh entropy of concatenated method names: 'RQZhEfdal', 'elpwuw9vg', 'C7SvONiOb', 'aZJEKrY9W', 'sgWQQRlj4', 'RrdjBPCmS', 'Sy8pMxXYf', 'wHiomWuqF', 'Mi7rXdWnP', 'uih5bqCV1'
                Source: 0.2.PO 768733 - 6750.exe.323c808.0.raw.unpack, RXv2gXFWfOHdOu5o4x.csHigh entropy of concatenated method names: 'Dispose', 'RXvF2gXWf', 'n2Bp3KX6LyhTbP96rs', 'HAstR11TVar3Xj672y', 'xsAVXGkykj1GusshJD', 'JGFM2jecZvOttkGp4k', 'HHpSMXNqrPUQ9uRakI', 'ranpYVVsY7udN56k77', 'p5pu9YMFbrUFoKYFkw', 'AbP9nkAg30G7nF7ARo'
                Source: 0.2.PO 768733 - 6750.exe.323c808.0.raw.unpack, gaWNLGnov1rlIG3v4D.csHigh entropy of concatenated method names: 'RQZhEfdal', 'elpwuw9vg', 'C7SvONiOb', 'aZJEKrY9W', 'sgWQQRlj4', 'RrdjBPCmS', 'Sy8pMxXYf', 'wHiomWuqF', 'Mi7rXdWnP', 'uih5bqCV1'
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\SysWOW64\Utilman.exeAPI/Special instruction interceptor: Address: 7FF9105CD324
                Source: C:\Windows\SysWOW64\Utilman.exeAPI/Special instruction interceptor: Address: 7FF9105CD7E4
                Source: C:\Windows\SysWOW64\Utilman.exeAPI/Special instruction interceptor: Address: 7FF9105CD944
                Source: C:\Windows\SysWOW64\Utilman.exeAPI/Special instruction interceptor: Address: 7FF9105CD504
                Source: C:\Windows\SysWOW64\Utilman.exeAPI/Special instruction interceptor: Address: 7FF9105CD544
                Source: C:\Windows\SysWOW64\Utilman.exeAPI/Special instruction interceptor: Address: 7FF9105CD1E4
                Source: C:\Windows\SysWOW64\Utilman.exeAPI/Special instruction interceptor: Address: 7FF9105D0154
                Source: C:\Windows\SysWOW64\Utilman.exeAPI/Special instruction interceptor: Address: 7FF9105CDA44
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeMemory allocated: 13A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeMemory allocated: 2FE0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeMemory allocated: 2E10000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeMemory allocated: 9490000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeMemory allocated: A490000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeMemory allocated: A6A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeMemory allocated: B6A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0165096E rdtsc 2_2_0165096E
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeWindow / User API: threadDelayed 1522Jump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeWindow / User API: threadDelayed 8449Jump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeAPI coverage: 0.7 %
                Source: C:\Windows\SysWOW64\Utilman.exeAPI coverage: 2.7 %
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exe TID: 6776Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exe TID: 6816Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exe TID: 4556Thread sleep count: 1522 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exe TID: 4556Thread sleep time: -3044000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exe TID: 4556Thread sleep count: 8449 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exe TID: 4556Thread sleep time: -16898000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\Utilman.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\Utilman.exeCode function: 10_2_02B8C2B0 FindFirstFileW,FindNextFileW,FindClose,10_2_02B8C2B0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeThread delayed: delay time: 30000Jump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: Utilman.exe, 0000000A.00000002.2500686686.000000000816F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: zure.comVMware20,11696487552j
                Source: 1b71Jp.10.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
                Source: 1b71Jp.10.drBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
                Source: 1b71Jp.10.drBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
                Source: 1b71Jp.10.drBinary or memory string: discord.comVMware20,11696487552f
                Source: Utilman.exe, 0000000A.00000002.2500686686.000000000816F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11B
                Source: 1b71Jp.10.drBinary or memory string: bankofamerica.comVMware20,11696487552x
                Source: 1b71Jp.10.drBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
                Source: 1b71Jp.10.drBinary or memory string: ms.portal.azure.comVMware20,11696487552
                Source: 1b71Jp.10.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
                Source: 1b71Jp.10.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
                Source: 1b71Jp.10.drBinary or memory string: global block list test formVMware20,11696487552
                Source: 1b71Jp.10.drBinary or memory string: tasks.office.comVMware20,11696487552o
                Source: Utilman.exe, 0000000A.00000002.2500686686.000000000816F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,116
                Source: Utilman.exe, 0000000A.00000002.2500686686.000000000816F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696S
                Source: 1b71Jp.10.drBinary or memory string: AMC password management pageVMware20,11696487552
                Source: Utilman.exe, 0000000A.00000002.2496001959.0000000002EAE000.00000004.00000020.00020000.00000000.sdmp, qMWzFch3YSFcC7wtIS.exe, 0000000B.00000002.2497807132.0000000000BEA000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000C.00000002.1879822737.000001F74F59E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: 1b71Jp.10.drBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
                Source: 1b71Jp.10.drBinary or memory string: interactivebrokers.comVMware20,11696487552
                Source: 1b71Jp.10.drBinary or memory string: dev.azure.comVMware20,11696487552j
                Source: 1b71Jp.10.drBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
                Source: 1b71Jp.10.drBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
                Source: 1b71Jp.10.drBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
                Source: 1b71Jp.10.drBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
                Source: 1b71Jp.10.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
                Source: 1b71Jp.10.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
                Source: 1b71Jp.10.drBinary or memory string: outlook.office365.comVMware20,11696487552t
                Source: 1b71Jp.10.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
                Source: 1b71Jp.10.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
                Source: 1b71Jp.10.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
                Source: 1b71Jp.10.drBinary or memory string: outlook.office.comVMware20,11696487552s
                Source: 1b71Jp.10.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
                Source: 1b71Jp.10.drBinary or memory string: turbotax.intuit.comVMware20,11696487552t
                Source: 1b71Jp.10.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
                Source: Utilman.exe, 0000000A.00000002.2500686686.000000000816F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,1169648
                Source: 1b71Jp.10.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
                Source: Utilman.exe, 0000000A.00000002.2500686686.000000000816F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: active Brokers - COM.HKVMware20,11696487552
                Source: 1b71Jp.10.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0165096E rdtsc 2_2_0165096E
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_004174E3 LdrLoadDll,2_2_004174E3
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016E4164 mov eax, dword ptr fs:[00000030h]2_2_016E4164
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016E4164 mov eax, dword ptr fs:[00000030h]2_2_016E4164
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016A4144 mov eax, dword ptr fs:[00000030h]2_2_016A4144
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016A4144 mov eax, dword ptr fs:[00000030h]2_2_016A4144
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016A4144 mov ecx, dword ptr fs:[00000030h]2_2_016A4144
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016A4144 mov eax, dword ptr fs:[00000030h]2_2_016A4144
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016A4144 mov eax, dword ptr fs:[00000030h]2_2_016A4144
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016A8158 mov eax, dword ptr fs:[00000030h]2_2_016A8158
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01616154 mov eax, dword ptr fs:[00000030h]2_2_01616154
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01616154 mov eax, dword ptr fs:[00000030h]2_2_01616154
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0160C156 mov eax, dword ptr fs:[00000030h]2_2_0160C156
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01640124 mov eax, dword ptr fs:[00000030h]2_2_01640124
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016BE10E mov eax, dword ptr fs:[00000030h]2_2_016BE10E
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016BE10E mov ecx, dword ptr fs:[00000030h]2_2_016BE10E
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016BE10E mov eax, dword ptr fs:[00000030h]2_2_016BE10E
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016BE10E mov eax, dword ptr fs:[00000030h]2_2_016BE10E
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016BE10E mov ecx, dword ptr fs:[00000030h]2_2_016BE10E
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016BE10E mov eax, dword ptr fs:[00000030h]2_2_016BE10E
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016BE10E mov eax, dword ptr fs:[00000030h]2_2_016BE10E
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016BE10E mov ecx, dword ptr fs:[00000030h]2_2_016BE10E
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016BE10E mov eax, dword ptr fs:[00000030h]2_2_016BE10E
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016BE10E mov ecx, dword ptr fs:[00000030h]2_2_016BE10E
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016BA118 mov ecx, dword ptr fs:[00000030h]2_2_016BA118
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016BA118 mov eax, dword ptr fs:[00000030h]2_2_016BA118
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016BA118 mov eax, dword ptr fs:[00000030h]2_2_016BA118
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016BA118 mov eax, dword ptr fs:[00000030h]2_2_016BA118
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016D0115 mov eax, dword ptr fs:[00000030h]2_2_016D0115
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016E61E5 mov eax, dword ptr fs:[00000030h]2_2_016E61E5
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016401F8 mov eax, dword ptr fs:[00000030h]2_2_016401F8
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016D61C3 mov eax, dword ptr fs:[00000030h]2_2_016D61C3
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016D61C3 mov eax, dword ptr fs:[00000030h]2_2_016D61C3
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0168E1D0 mov eax, dword ptr fs:[00000030h]2_2_0168E1D0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0168E1D0 mov eax, dword ptr fs:[00000030h]2_2_0168E1D0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0168E1D0 mov ecx, dword ptr fs:[00000030h]2_2_0168E1D0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0168E1D0 mov eax, dword ptr fs:[00000030h]2_2_0168E1D0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0168E1D0 mov eax, dword ptr fs:[00000030h]2_2_0168E1D0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01650185 mov eax, dword ptr fs:[00000030h]2_2_01650185
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016CC188 mov eax, dword ptr fs:[00000030h]2_2_016CC188
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016CC188 mov eax, dword ptr fs:[00000030h]2_2_016CC188
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016B4180 mov eax, dword ptr fs:[00000030h]2_2_016B4180
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016B4180 mov eax, dword ptr fs:[00000030h]2_2_016B4180
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0169019F mov eax, dword ptr fs:[00000030h]2_2_0169019F
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0169019F mov eax, dword ptr fs:[00000030h]2_2_0169019F
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0169019F mov eax, dword ptr fs:[00000030h]2_2_0169019F
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0169019F mov eax, dword ptr fs:[00000030h]2_2_0169019F
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0160A197 mov eax, dword ptr fs:[00000030h]2_2_0160A197
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0160A197 mov eax, dword ptr fs:[00000030h]2_2_0160A197
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0160A197 mov eax, dword ptr fs:[00000030h]2_2_0160A197
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0163C073 mov eax, dword ptr fs:[00000030h]2_2_0163C073
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01612050 mov eax, dword ptr fs:[00000030h]2_2_01612050
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01696050 mov eax, dword ptr fs:[00000030h]2_2_01696050
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0160A020 mov eax, dword ptr fs:[00000030h]2_2_0160A020
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0160C020 mov eax, dword ptr fs:[00000030h]2_2_0160C020
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016A6030 mov eax, dword ptr fs:[00000030h]2_2_016A6030
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01694000 mov ecx, dword ptr fs:[00000030h]2_2_01694000
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016B2000 mov eax, dword ptr fs:[00000030h]2_2_016B2000
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016B2000 mov eax, dword ptr fs:[00000030h]2_2_016B2000
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016B2000 mov eax, dword ptr fs:[00000030h]2_2_016B2000
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016B2000 mov eax, dword ptr fs:[00000030h]2_2_016B2000
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016B2000 mov eax, dword ptr fs:[00000030h]2_2_016B2000
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016B2000 mov eax, dword ptr fs:[00000030h]2_2_016B2000
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016B2000 mov eax, dword ptr fs:[00000030h]2_2_016B2000
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016B2000 mov eax, dword ptr fs:[00000030h]2_2_016B2000
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0162E016 mov eax, dword ptr fs:[00000030h]2_2_0162E016
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0162E016 mov eax, dword ptr fs:[00000030h]2_2_0162E016
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0162E016 mov eax, dword ptr fs:[00000030h]2_2_0162E016
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0162E016 mov eax, dword ptr fs:[00000030h]2_2_0162E016
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0160A0E3 mov ecx, dword ptr fs:[00000030h]2_2_0160A0E3
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016180E9 mov eax, dword ptr fs:[00000030h]2_2_016180E9
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016960E0 mov eax, dword ptr fs:[00000030h]2_2_016960E0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0160C0F0 mov eax, dword ptr fs:[00000030h]2_2_0160C0F0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016520F0 mov ecx, dword ptr fs:[00000030h]2_2_016520F0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016920DE mov eax, dword ptr fs:[00000030h]2_2_016920DE
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016080A0 mov eax, dword ptr fs:[00000030h]2_2_016080A0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016A80A8 mov eax, dword ptr fs:[00000030h]2_2_016A80A8
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016D60B8 mov eax, dword ptr fs:[00000030h]2_2_016D60B8
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016D60B8 mov ecx, dword ptr fs:[00000030h]2_2_016D60B8
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161208A mov eax, dword ptr fs:[00000030h]2_2_0161208A
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016B437C mov eax, dword ptr fs:[00000030h]2_2_016B437C
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01692349 mov eax, dword ptr fs:[00000030h]2_2_01692349
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01692349 mov eax, dword ptr fs:[00000030h]2_2_01692349
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01692349 mov eax, dword ptr fs:[00000030h]2_2_01692349
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01692349 mov eax, dword ptr fs:[00000030h]2_2_01692349
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01692349 mov eax, dword ptr fs:[00000030h]2_2_01692349
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01692349 mov eax, dword ptr fs:[00000030h]2_2_01692349
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01692349 mov eax, dword ptr fs:[00000030h]2_2_01692349
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01692349 mov eax, dword ptr fs:[00000030h]2_2_01692349
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01692349 mov eax, dword ptr fs:[00000030h]2_2_01692349
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01692349 mov eax, dword ptr fs:[00000030h]2_2_01692349
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01692349 mov eax, dword ptr fs:[00000030h]2_2_01692349
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01692349 mov eax, dword ptr fs:[00000030h]2_2_01692349
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01692349 mov eax, dword ptr fs:[00000030h]2_2_01692349
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01692349 mov eax, dword ptr fs:[00000030h]2_2_01692349
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01692349 mov eax, dword ptr fs:[00000030h]2_2_01692349
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016E634F mov eax, dword ptr fs:[00000030h]2_2_016E634F
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0169035C mov eax, dword ptr fs:[00000030h]2_2_0169035C
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0169035C mov eax, dword ptr fs:[00000030h]2_2_0169035C
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0169035C mov eax, dword ptr fs:[00000030h]2_2_0169035C
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0169035C mov ecx, dword ptr fs:[00000030h]2_2_0169035C
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0169035C mov eax, dword ptr fs:[00000030h]2_2_0169035C
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0169035C mov eax, dword ptr fs:[00000030h]2_2_0169035C
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016DA352 mov eax, dword ptr fs:[00000030h]2_2_016DA352
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164A30B mov eax, dword ptr fs:[00000030h]2_2_0164A30B
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164A30B mov eax, dword ptr fs:[00000030h]2_2_0164A30B
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164A30B mov eax, dword ptr fs:[00000030h]2_2_0164A30B
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0160C310 mov ecx, dword ptr fs:[00000030h]2_2_0160C310
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01630310 mov ecx, dword ptr fs:[00000030h]2_2_01630310
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016203E9 mov eax, dword ptr fs:[00000030h]2_2_016203E9
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016203E9 mov eax, dword ptr fs:[00000030h]2_2_016203E9
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016203E9 mov eax, dword ptr fs:[00000030h]2_2_016203E9
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016203E9 mov eax, dword ptr fs:[00000030h]2_2_016203E9
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016203E9 mov eax, dword ptr fs:[00000030h]2_2_016203E9
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016203E9 mov eax, dword ptr fs:[00000030h]2_2_016203E9
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016203E9 mov eax, dword ptr fs:[00000030h]2_2_016203E9
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016203E9 mov eax, dword ptr fs:[00000030h]2_2_016203E9
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0162E3F0 mov eax, dword ptr fs:[00000030h]2_2_0162E3F0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0162E3F0 mov eax, dword ptr fs:[00000030h]2_2_0162E3F0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0162E3F0 mov eax, dword ptr fs:[00000030h]2_2_0162E3F0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016463FF mov eax, dword ptr fs:[00000030h]2_2_016463FF
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016CC3CD mov eax, dword ptr fs:[00000030h]2_2_016CC3CD
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161A3C0 mov eax, dword ptr fs:[00000030h]2_2_0161A3C0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161A3C0 mov eax, dword ptr fs:[00000030h]2_2_0161A3C0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161A3C0 mov eax, dword ptr fs:[00000030h]2_2_0161A3C0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161A3C0 mov eax, dword ptr fs:[00000030h]2_2_0161A3C0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161A3C0 mov eax, dword ptr fs:[00000030h]2_2_0161A3C0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161A3C0 mov eax, dword ptr fs:[00000030h]2_2_0161A3C0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016183C0 mov eax, dword ptr fs:[00000030h]2_2_016183C0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016183C0 mov eax, dword ptr fs:[00000030h]2_2_016183C0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016183C0 mov eax, dword ptr fs:[00000030h]2_2_016183C0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016183C0 mov eax, dword ptr fs:[00000030h]2_2_016183C0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016963C0 mov eax, dword ptr fs:[00000030h]2_2_016963C0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016BE3DB mov eax, dword ptr fs:[00000030h]2_2_016BE3DB
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016BE3DB mov eax, dword ptr fs:[00000030h]2_2_016BE3DB
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016BE3DB mov ecx, dword ptr fs:[00000030h]2_2_016BE3DB
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016BE3DB mov eax, dword ptr fs:[00000030h]2_2_016BE3DB
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016B43D4 mov eax, dword ptr fs:[00000030h]2_2_016B43D4
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016B43D4 mov eax, dword ptr fs:[00000030h]2_2_016B43D4
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0160E388 mov eax, dword ptr fs:[00000030h]2_2_0160E388
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0160E388 mov eax, dword ptr fs:[00000030h]2_2_0160E388
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0160E388 mov eax, dword ptr fs:[00000030h]2_2_0160E388
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0163438F mov eax, dword ptr fs:[00000030h]2_2_0163438F
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0163438F mov eax, dword ptr fs:[00000030h]2_2_0163438F
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01608397 mov eax, dword ptr fs:[00000030h]2_2_01608397
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01608397 mov eax, dword ptr fs:[00000030h]2_2_01608397
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01608397 mov eax, dword ptr fs:[00000030h]2_2_01608397
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01614260 mov eax, dword ptr fs:[00000030h]2_2_01614260
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01614260 mov eax, dword ptr fs:[00000030h]2_2_01614260
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01614260 mov eax, dword ptr fs:[00000030h]2_2_01614260
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0160826B mov eax, dword ptr fs:[00000030h]2_2_0160826B
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016C0274 mov eax, dword ptr fs:[00000030h]2_2_016C0274
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016C0274 mov eax, dword ptr fs:[00000030h]2_2_016C0274
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016C0274 mov eax, dword ptr fs:[00000030h]2_2_016C0274
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016C0274 mov eax, dword ptr fs:[00000030h]2_2_016C0274
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016C0274 mov eax, dword ptr fs:[00000030h]2_2_016C0274
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016C0274 mov eax, dword ptr fs:[00000030h]2_2_016C0274
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016C0274 mov eax, dword ptr fs:[00000030h]2_2_016C0274
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016C0274 mov eax, dword ptr fs:[00000030h]2_2_016C0274
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016C0274 mov eax, dword ptr fs:[00000030h]2_2_016C0274
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016C0274 mov eax, dword ptr fs:[00000030h]2_2_016C0274
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016C0274 mov eax, dword ptr fs:[00000030h]2_2_016C0274
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016C0274 mov eax, dword ptr fs:[00000030h]2_2_016C0274
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01698243 mov eax, dword ptr fs:[00000030h]2_2_01698243
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01698243 mov ecx, dword ptr fs:[00000030h]2_2_01698243
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0160A250 mov eax, dword ptr fs:[00000030h]2_2_0160A250
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016E625D mov eax, dword ptr fs:[00000030h]2_2_016E625D
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01616259 mov eax, dword ptr fs:[00000030h]2_2_01616259
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016CA250 mov eax, dword ptr fs:[00000030h]2_2_016CA250
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016CA250 mov eax, dword ptr fs:[00000030h]2_2_016CA250
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0160823B mov eax, dword ptr fs:[00000030h]2_2_0160823B
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016202E1 mov eax, dword ptr fs:[00000030h]2_2_016202E1
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016202E1 mov eax, dword ptr fs:[00000030h]2_2_016202E1
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016202E1 mov eax, dword ptr fs:[00000030h]2_2_016202E1
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161A2C3 mov eax, dword ptr fs:[00000030h]2_2_0161A2C3
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161A2C3 mov eax, dword ptr fs:[00000030h]2_2_0161A2C3
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161A2C3 mov eax, dword ptr fs:[00000030h]2_2_0161A2C3
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161A2C3 mov eax, dword ptr fs:[00000030h]2_2_0161A2C3
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161A2C3 mov eax, dword ptr fs:[00000030h]2_2_0161A2C3
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016E62D6 mov eax, dword ptr fs:[00000030h]2_2_016E62D6
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016202A0 mov eax, dword ptr fs:[00000030h]2_2_016202A0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016202A0 mov eax, dword ptr fs:[00000030h]2_2_016202A0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016A62A0 mov eax, dword ptr fs:[00000030h]2_2_016A62A0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016A62A0 mov ecx, dword ptr fs:[00000030h]2_2_016A62A0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016A62A0 mov eax, dword ptr fs:[00000030h]2_2_016A62A0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016A62A0 mov eax, dword ptr fs:[00000030h]2_2_016A62A0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016A62A0 mov eax, dword ptr fs:[00000030h]2_2_016A62A0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016A62A0 mov eax, dword ptr fs:[00000030h]2_2_016A62A0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164E284 mov eax, dword ptr fs:[00000030h]2_2_0164E284
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164E284 mov eax, dword ptr fs:[00000030h]2_2_0164E284
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01690283 mov eax, dword ptr fs:[00000030h]2_2_01690283
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01690283 mov eax, dword ptr fs:[00000030h]2_2_01690283
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01690283 mov eax, dword ptr fs:[00000030h]2_2_01690283
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164656A mov eax, dword ptr fs:[00000030h]2_2_0164656A
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164656A mov eax, dword ptr fs:[00000030h]2_2_0164656A
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164656A mov eax, dword ptr fs:[00000030h]2_2_0164656A
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01618550 mov eax, dword ptr fs:[00000030h]2_2_01618550
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01618550 mov eax, dword ptr fs:[00000030h]2_2_01618550
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01620535 mov eax, dword ptr fs:[00000030h]2_2_01620535
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01620535 mov eax, dword ptr fs:[00000030h]2_2_01620535
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01620535 mov eax, dword ptr fs:[00000030h]2_2_01620535
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01620535 mov eax, dword ptr fs:[00000030h]2_2_01620535
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01620535 mov eax, dword ptr fs:[00000030h]2_2_01620535
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01620535 mov eax, dword ptr fs:[00000030h]2_2_01620535
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0163E53E mov eax, dword ptr fs:[00000030h]2_2_0163E53E
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0163E53E mov eax, dword ptr fs:[00000030h]2_2_0163E53E
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0163E53E mov eax, dword ptr fs:[00000030h]2_2_0163E53E
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0163E53E mov eax, dword ptr fs:[00000030h]2_2_0163E53E
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0163E53E mov eax, dword ptr fs:[00000030h]2_2_0163E53E
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016A6500 mov eax, dword ptr fs:[00000030h]2_2_016A6500
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016E4500 mov eax, dword ptr fs:[00000030h]2_2_016E4500
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016E4500 mov eax, dword ptr fs:[00000030h]2_2_016E4500
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016E4500 mov eax, dword ptr fs:[00000030h]2_2_016E4500
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016E4500 mov eax, dword ptr fs:[00000030h]2_2_016E4500
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016E4500 mov eax, dword ptr fs:[00000030h]2_2_016E4500
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016E4500 mov eax, dword ptr fs:[00000030h]2_2_016E4500
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016E4500 mov eax, dword ptr fs:[00000030h]2_2_016E4500
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016125E0 mov eax, dword ptr fs:[00000030h]2_2_016125E0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0163E5E7 mov eax, dword ptr fs:[00000030h]2_2_0163E5E7
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0163E5E7 mov eax, dword ptr fs:[00000030h]2_2_0163E5E7
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0163E5E7 mov eax, dword ptr fs:[00000030h]2_2_0163E5E7
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0163E5E7 mov eax, dword ptr fs:[00000030h]2_2_0163E5E7
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0163E5E7 mov eax, dword ptr fs:[00000030h]2_2_0163E5E7
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0163E5E7 mov eax, dword ptr fs:[00000030h]2_2_0163E5E7
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0163E5E7 mov eax, dword ptr fs:[00000030h]2_2_0163E5E7
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0163E5E7 mov eax, dword ptr fs:[00000030h]2_2_0163E5E7
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164C5ED mov eax, dword ptr fs:[00000030h]2_2_0164C5ED
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164C5ED mov eax, dword ptr fs:[00000030h]2_2_0164C5ED
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164E5CF mov eax, dword ptr fs:[00000030h]2_2_0164E5CF
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164E5CF mov eax, dword ptr fs:[00000030h]2_2_0164E5CF
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016165D0 mov eax, dword ptr fs:[00000030h]2_2_016165D0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164A5D0 mov eax, dword ptr fs:[00000030h]2_2_0164A5D0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164A5D0 mov eax, dword ptr fs:[00000030h]2_2_0164A5D0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016905A7 mov eax, dword ptr fs:[00000030h]2_2_016905A7
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016905A7 mov eax, dword ptr fs:[00000030h]2_2_016905A7
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016905A7 mov eax, dword ptr fs:[00000030h]2_2_016905A7
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016345B1 mov eax, dword ptr fs:[00000030h]2_2_016345B1
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016345B1 mov eax, dword ptr fs:[00000030h]2_2_016345B1
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01612582 mov eax, dword ptr fs:[00000030h]2_2_01612582
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01612582 mov ecx, dword ptr fs:[00000030h]2_2_01612582
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01644588 mov eax, dword ptr fs:[00000030h]2_2_01644588
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164E59C mov eax, dword ptr fs:[00000030h]2_2_0164E59C
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0169C460 mov ecx, dword ptr fs:[00000030h]2_2_0169C460
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0163A470 mov eax, dword ptr fs:[00000030h]2_2_0163A470
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0163A470 mov eax, dword ptr fs:[00000030h]2_2_0163A470
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0163A470 mov eax, dword ptr fs:[00000030h]2_2_0163A470
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164E443 mov eax, dword ptr fs:[00000030h]2_2_0164E443
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164E443 mov eax, dword ptr fs:[00000030h]2_2_0164E443
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164E443 mov eax, dword ptr fs:[00000030h]2_2_0164E443
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164E443 mov eax, dword ptr fs:[00000030h]2_2_0164E443
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164E443 mov eax, dword ptr fs:[00000030h]2_2_0164E443
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164E443 mov eax, dword ptr fs:[00000030h]2_2_0164E443
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164E443 mov eax, dword ptr fs:[00000030h]2_2_0164E443
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164E443 mov eax, dword ptr fs:[00000030h]2_2_0164E443
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0163245A mov eax, dword ptr fs:[00000030h]2_2_0163245A
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016CA456 mov eax, dword ptr fs:[00000030h]2_2_016CA456
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0160645D mov eax, dword ptr fs:[00000030h]2_2_0160645D
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0160E420 mov eax, dword ptr fs:[00000030h]2_2_0160E420
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0160E420 mov eax, dword ptr fs:[00000030h]2_2_0160E420
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0160E420 mov eax, dword ptr fs:[00000030h]2_2_0160E420
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0160C427 mov eax, dword ptr fs:[00000030h]2_2_0160C427
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01696420 mov eax, dword ptr fs:[00000030h]2_2_01696420
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01696420 mov eax, dword ptr fs:[00000030h]2_2_01696420
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01696420 mov eax, dword ptr fs:[00000030h]2_2_01696420
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01696420 mov eax, dword ptr fs:[00000030h]2_2_01696420
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01696420 mov eax, dword ptr fs:[00000030h]2_2_01696420
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01696420 mov eax, dword ptr fs:[00000030h]2_2_01696420
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01696420 mov eax, dword ptr fs:[00000030h]2_2_01696420
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164A430 mov eax, dword ptr fs:[00000030h]2_2_0164A430
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01648402 mov eax, dword ptr fs:[00000030h]2_2_01648402
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01648402 mov eax, dword ptr fs:[00000030h]2_2_01648402
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01648402 mov eax, dword ptr fs:[00000030h]2_2_01648402
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016104E5 mov ecx, dword ptr fs:[00000030h]2_2_016104E5
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016164AB mov eax, dword ptr fs:[00000030h]2_2_016164AB
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016444B0 mov ecx, dword ptr fs:[00000030h]2_2_016444B0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0169A4B0 mov eax, dword ptr fs:[00000030h]2_2_0169A4B0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016CA49A mov eax, dword ptr fs:[00000030h]2_2_016CA49A
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01618770 mov eax, dword ptr fs:[00000030h]2_2_01618770
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01620770 mov eax, dword ptr fs:[00000030h]2_2_01620770
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01620770 mov eax, dword ptr fs:[00000030h]2_2_01620770
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01620770 mov eax, dword ptr fs:[00000030h]2_2_01620770
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01620770 mov eax, dword ptr fs:[00000030h]2_2_01620770
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01620770 mov eax, dword ptr fs:[00000030h]2_2_01620770
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01620770 mov eax, dword ptr fs:[00000030h]2_2_01620770
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01620770 mov eax, dword ptr fs:[00000030h]2_2_01620770
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01620770 mov eax, dword ptr fs:[00000030h]2_2_01620770
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01620770 mov eax, dword ptr fs:[00000030h]2_2_01620770
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01620770 mov eax, dword ptr fs:[00000030h]2_2_01620770
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01620770 mov eax, dword ptr fs:[00000030h]2_2_01620770
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01620770 mov eax, dword ptr fs:[00000030h]2_2_01620770
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164674D mov esi, dword ptr fs:[00000030h]2_2_0164674D
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164674D mov eax, dword ptr fs:[00000030h]2_2_0164674D
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164674D mov eax, dword ptr fs:[00000030h]2_2_0164674D
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01610750 mov eax, dword ptr fs:[00000030h]2_2_01610750
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0169E75D mov eax, dword ptr fs:[00000030h]2_2_0169E75D
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652750 mov eax, dword ptr fs:[00000030h]2_2_01652750
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652750 mov eax, dword ptr fs:[00000030h]2_2_01652750
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01694755 mov eax, dword ptr fs:[00000030h]2_2_01694755
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164C720 mov eax, dword ptr fs:[00000030h]2_2_0164C720
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164C720 mov eax, dword ptr fs:[00000030h]2_2_0164C720
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164273C mov eax, dword ptr fs:[00000030h]2_2_0164273C
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164273C mov ecx, dword ptr fs:[00000030h]2_2_0164273C
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164273C mov eax, dword ptr fs:[00000030h]2_2_0164273C
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0168C730 mov eax, dword ptr fs:[00000030h]2_2_0168C730
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164C700 mov eax, dword ptr fs:[00000030h]2_2_0164C700
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01610710 mov eax, dword ptr fs:[00000030h]2_2_01610710
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01640710 mov eax, dword ptr fs:[00000030h]2_2_01640710
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0169E7E1 mov eax, dword ptr fs:[00000030h]2_2_0169E7E1
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016327ED mov eax, dword ptr fs:[00000030h]2_2_016327ED
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016327ED mov eax, dword ptr fs:[00000030h]2_2_016327ED
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016327ED mov eax, dword ptr fs:[00000030h]2_2_016327ED
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016147FB mov eax, dword ptr fs:[00000030h]2_2_016147FB
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016147FB mov eax, dword ptr fs:[00000030h]2_2_016147FB
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161C7C0 mov eax, dword ptr fs:[00000030h]2_2_0161C7C0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016907C3 mov eax, dword ptr fs:[00000030h]2_2_016907C3
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016C47A0 mov eax, dword ptr fs:[00000030h]2_2_016C47A0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016107AF mov eax, dword ptr fs:[00000030h]2_2_016107AF
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016B678E mov eax, dword ptr fs:[00000030h]2_2_016B678E
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016D866E mov eax, dword ptr fs:[00000030h]2_2_016D866E
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016D866E mov eax, dword ptr fs:[00000030h]2_2_016D866E
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164A660 mov eax, dword ptr fs:[00000030h]2_2_0164A660
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164A660 mov eax, dword ptr fs:[00000030h]2_2_0164A660
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01642674 mov eax, dword ptr fs:[00000030h]2_2_01642674
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0162C640 mov eax, dword ptr fs:[00000030h]2_2_0162C640
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01646620 mov eax, dword ptr fs:[00000030h]2_2_01646620
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01648620 mov eax, dword ptr fs:[00000030h]2_2_01648620
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0162E627 mov eax, dword ptr fs:[00000030h]2_2_0162E627
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161262C mov eax, dword ptr fs:[00000030h]2_2_0161262C
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0168E609 mov eax, dword ptr fs:[00000030h]2_2_0168E609
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0162260B mov eax, dword ptr fs:[00000030h]2_2_0162260B
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0162260B mov eax, dword ptr fs:[00000030h]2_2_0162260B
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0162260B mov eax, dword ptr fs:[00000030h]2_2_0162260B
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0162260B mov eax, dword ptr fs:[00000030h]2_2_0162260B
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0162260B mov eax, dword ptr fs:[00000030h]2_2_0162260B
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0162260B mov eax, dword ptr fs:[00000030h]2_2_0162260B
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0162260B mov eax, dword ptr fs:[00000030h]2_2_0162260B
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01652619 mov eax, dword ptr fs:[00000030h]2_2_01652619
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016906F1 mov eax, dword ptr fs:[00000030h]2_2_016906F1
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016906F1 mov eax, dword ptr fs:[00000030h]2_2_016906F1
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0168E6F2 mov eax, dword ptr fs:[00000030h]2_2_0168E6F2
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0168E6F2 mov eax, dword ptr fs:[00000030h]2_2_0168E6F2
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0168E6F2 mov eax, dword ptr fs:[00000030h]2_2_0168E6F2
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0168E6F2 mov eax, dword ptr fs:[00000030h]2_2_0168E6F2
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164A6C7 mov ebx, dword ptr fs:[00000030h]2_2_0164A6C7
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164A6C7 mov eax, dword ptr fs:[00000030h]2_2_0164A6C7
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164C6A6 mov eax, dword ptr fs:[00000030h]2_2_0164C6A6
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016466B0 mov eax, dword ptr fs:[00000030h]2_2_016466B0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01614690 mov eax, dword ptr fs:[00000030h]2_2_01614690
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01614690 mov eax, dword ptr fs:[00000030h]2_2_01614690
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01636962 mov eax, dword ptr fs:[00000030h]2_2_01636962
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01636962 mov eax, dword ptr fs:[00000030h]2_2_01636962
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01636962 mov eax, dword ptr fs:[00000030h]2_2_01636962
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0165096E mov eax, dword ptr fs:[00000030h]2_2_0165096E
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0165096E mov edx, dword ptr fs:[00000030h]2_2_0165096E
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0165096E mov eax, dword ptr fs:[00000030h]2_2_0165096E
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016B4978 mov eax, dword ptr fs:[00000030h]2_2_016B4978
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016B4978 mov eax, dword ptr fs:[00000030h]2_2_016B4978
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0169C97C mov eax, dword ptr fs:[00000030h]2_2_0169C97C
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016E4940 mov eax, dword ptr fs:[00000030h]2_2_016E4940
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01690946 mov eax, dword ptr fs:[00000030h]2_2_01690946
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016A892B mov eax, dword ptr fs:[00000030h]2_2_016A892B
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0169892A mov eax, dword ptr fs:[00000030h]2_2_0169892A
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0168E908 mov eax, dword ptr fs:[00000030h]2_2_0168E908
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0168E908 mov eax, dword ptr fs:[00000030h]2_2_0168E908
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01608918 mov eax, dword ptr fs:[00000030h]2_2_01608918
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01608918 mov eax, dword ptr fs:[00000030h]2_2_01608918
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0169C912 mov eax, dword ptr fs:[00000030h]2_2_0169C912
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0169E9E0 mov eax, dword ptr fs:[00000030h]2_2_0169E9E0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016429F9 mov eax, dword ptr fs:[00000030h]2_2_016429F9
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016429F9 mov eax, dword ptr fs:[00000030h]2_2_016429F9
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016A69C0 mov eax, dword ptr fs:[00000030h]2_2_016A69C0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161A9D0 mov eax, dword ptr fs:[00000030h]2_2_0161A9D0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161A9D0 mov eax, dword ptr fs:[00000030h]2_2_0161A9D0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161A9D0 mov eax, dword ptr fs:[00000030h]2_2_0161A9D0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161A9D0 mov eax, dword ptr fs:[00000030h]2_2_0161A9D0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161A9D0 mov eax, dword ptr fs:[00000030h]2_2_0161A9D0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161A9D0 mov eax, dword ptr fs:[00000030h]2_2_0161A9D0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016449D0 mov eax, dword ptr fs:[00000030h]2_2_016449D0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016DA9D3 mov eax, dword ptr fs:[00000030h]2_2_016DA9D3
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016109AD mov eax, dword ptr fs:[00000030h]2_2_016109AD
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016109AD mov eax, dword ptr fs:[00000030h]2_2_016109AD
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016989B3 mov esi, dword ptr fs:[00000030h]2_2_016989B3
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016989B3 mov eax, dword ptr fs:[00000030h]2_2_016989B3
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016989B3 mov eax, dword ptr fs:[00000030h]2_2_016989B3
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016A6870 mov eax, dword ptr fs:[00000030h]2_2_016A6870
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016A6870 mov eax, dword ptr fs:[00000030h]2_2_016A6870
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0169E872 mov eax, dword ptr fs:[00000030h]2_2_0169E872
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0169E872 mov eax, dword ptr fs:[00000030h]2_2_0169E872
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01640854 mov eax, dword ptr fs:[00000030h]2_2_01640854
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01614859 mov eax, dword ptr fs:[00000030h]2_2_01614859
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01614859 mov eax, dword ptr fs:[00000030h]2_2_01614859
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016B483A mov eax, dword ptr fs:[00000030h]2_2_016B483A
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016B483A mov eax, dword ptr fs:[00000030h]2_2_016B483A
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164A830 mov eax, dword ptr fs:[00000030h]2_2_0164A830
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01632835 mov eax, dword ptr fs:[00000030h]2_2_01632835
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01632835 mov eax, dword ptr fs:[00000030h]2_2_01632835
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01632835 mov eax, dword ptr fs:[00000030h]2_2_01632835
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01632835 mov ecx, dword ptr fs:[00000030h]2_2_01632835
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01632835 mov eax, dword ptr fs:[00000030h]2_2_01632835
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01632835 mov eax, dword ptr fs:[00000030h]2_2_01632835
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0169C810 mov eax, dword ptr fs:[00000030h]2_2_0169C810
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016DA8E4 mov eax, dword ptr fs:[00000030h]2_2_016DA8E4
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164C8F9 mov eax, dword ptr fs:[00000030h]2_2_0164C8F9
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164C8F9 mov eax, dword ptr fs:[00000030h]2_2_0164C8F9
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0163E8C0 mov eax, dword ptr fs:[00000030h]2_2_0163E8C0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016E08C0 mov eax, dword ptr fs:[00000030h]2_2_016E08C0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01610887 mov eax, dword ptr fs:[00000030h]2_2_01610887
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0169C89D mov eax, dword ptr fs:[00000030h]2_2_0169C89D
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0160CB7E mov eax, dword ptr fs:[00000030h]2_2_0160CB7E
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016C4B4B mov eax, dword ptr fs:[00000030h]2_2_016C4B4B
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016C4B4B mov eax, dword ptr fs:[00000030h]2_2_016C4B4B
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016B8B42 mov eax, dword ptr fs:[00000030h]2_2_016B8B42
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016A6B40 mov eax, dword ptr fs:[00000030h]2_2_016A6B40
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016A6B40 mov eax, dword ptr fs:[00000030h]2_2_016A6B40
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016DAB40 mov eax, dword ptr fs:[00000030h]2_2_016DAB40
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01608B50 mov eax, dword ptr fs:[00000030h]2_2_01608B50
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016E2B57 mov eax, dword ptr fs:[00000030h]2_2_016E2B57
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016E2B57 mov eax, dword ptr fs:[00000030h]2_2_016E2B57
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016E2B57 mov eax, dword ptr fs:[00000030h]2_2_016E2B57
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016E2B57 mov eax, dword ptr fs:[00000030h]2_2_016E2B57
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016BEB50 mov eax, dword ptr fs:[00000030h]2_2_016BEB50
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0163EB20 mov eax, dword ptr fs:[00000030h]2_2_0163EB20
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0163EB20 mov eax, dword ptr fs:[00000030h]2_2_0163EB20
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016D8B28 mov eax, dword ptr fs:[00000030h]2_2_016D8B28
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016D8B28 mov eax, dword ptr fs:[00000030h]2_2_016D8B28
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016E4B00 mov eax, dword ptr fs:[00000030h]2_2_016E4B00
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0168EB1D mov eax, dword ptr fs:[00000030h]2_2_0168EB1D
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0168EB1D mov eax, dword ptr fs:[00000030h]2_2_0168EB1D
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0168EB1D mov eax, dword ptr fs:[00000030h]2_2_0168EB1D
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0168EB1D mov eax, dword ptr fs:[00000030h]2_2_0168EB1D
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0168EB1D mov eax, dword ptr fs:[00000030h]2_2_0168EB1D
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0168EB1D mov eax, dword ptr fs:[00000030h]2_2_0168EB1D
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0168EB1D mov eax, dword ptr fs:[00000030h]2_2_0168EB1D
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0168EB1D mov eax, dword ptr fs:[00000030h]2_2_0168EB1D
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0168EB1D mov eax, dword ptr fs:[00000030h]2_2_0168EB1D
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01618BF0 mov eax, dword ptr fs:[00000030h]2_2_01618BF0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01618BF0 mov eax, dword ptr fs:[00000030h]2_2_01618BF0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01618BF0 mov eax, dword ptr fs:[00000030h]2_2_01618BF0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0169CBF0 mov eax, dword ptr fs:[00000030h]2_2_0169CBF0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0163EBFC mov eax, dword ptr fs:[00000030h]2_2_0163EBFC
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01630BCB mov eax, dword ptr fs:[00000030h]2_2_01630BCB
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01630BCB mov eax, dword ptr fs:[00000030h]2_2_01630BCB
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01630BCB mov eax, dword ptr fs:[00000030h]2_2_01630BCB
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01610BCD mov eax, dword ptr fs:[00000030h]2_2_01610BCD
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01610BCD mov eax, dword ptr fs:[00000030h]2_2_01610BCD
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01610BCD mov eax, dword ptr fs:[00000030h]2_2_01610BCD
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016BEBD0 mov eax, dword ptr fs:[00000030h]2_2_016BEBD0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01620BBE mov eax, dword ptr fs:[00000030h]2_2_01620BBE
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01620BBE mov eax, dword ptr fs:[00000030h]2_2_01620BBE
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016C4BB0 mov eax, dword ptr fs:[00000030h]2_2_016C4BB0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016C4BB0 mov eax, dword ptr fs:[00000030h]2_2_016C4BB0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164CA6F mov eax, dword ptr fs:[00000030h]2_2_0164CA6F
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164CA6F mov eax, dword ptr fs:[00000030h]2_2_0164CA6F
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164CA6F mov eax, dword ptr fs:[00000030h]2_2_0164CA6F
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016BEA60 mov eax, dword ptr fs:[00000030h]2_2_016BEA60
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0168CA72 mov eax, dword ptr fs:[00000030h]2_2_0168CA72
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0168CA72 mov eax, dword ptr fs:[00000030h]2_2_0168CA72
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01616A50 mov eax, dword ptr fs:[00000030h]2_2_01616A50
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01616A50 mov eax, dword ptr fs:[00000030h]2_2_01616A50
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01616A50 mov eax, dword ptr fs:[00000030h]2_2_01616A50
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01616A50 mov eax, dword ptr fs:[00000030h]2_2_01616A50
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01616A50 mov eax, dword ptr fs:[00000030h]2_2_01616A50
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01616A50 mov eax, dword ptr fs:[00000030h]2_2_01616A50
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01616A50 mov eax, dword ptr fs:[00000030h]2_2_01616A50
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01620A5B mov eax, dword ptr fs:[00000030h]2_2_01620A5B
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01620A5B mov eax, dword ptr fs:[00000030h]2_2_01620A5B
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164CA24 mov eax, dword ptr fs:[00000030h]2_2_0164CA24
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0163EA2E mov eax, dword ptr fs:[00000030h]2_2_0163EA2E
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01634A35 mov eax, dword ptr fs:[00000030h]2_2_01634A35
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01634A35 mov eax, dword ptr fs:[00000030h]2_2_01634A35
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164CA38 mov eax, dword ptr fs:[00000030h]2_2_0164CA38
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0169CA11 mov eax, dword ptr fs:[00000030h]2_2_0169CA11
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164AAEE mov eax, dword ptr fs:[00000030h]2_2_0164AAEE
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0164AAEE mov eax, dword ptr fs:[00000030h]2_2_0164AAEE
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01666ACC mov eax, dword ptr fs:[00000030h]2_2_01666ACC
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01666ACC mov eax, dword ptr fs:[00000030h]2_2_01666ACC
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01666ACC mov eax, dword ptr fs:[00000030h]2_2_01666ACC
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01610AD0 mov eax, dword ptr fs:[00000030h]2_2_01610AD0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01644AD0 mov eax, dword ptr fs:[00000030h]2_2_01644AD0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01644AD0 mov eax, dword ptr fs:[00000030h]2_2_01644AD0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01618AA0 mov eax, dword ptr fs:[00000030h]2_2_01618AA0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01618AA0 mov eax, dword ptr fs:[00000030h]2_2_01618AA0
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01666AA4 mov eax, dword ptr fs:[00000030h]2_2_01666AA4
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161EA80 mov eax, dword ptr fs:[00000030h]2_2_0161EA80
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161EA80 mov eax, dword ptr fs:[00000030h]2_2_0161EA80
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161EA80 mov eax, dword ptr fs:[00000030h]2_2_0161EA80
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161EA80 mov eax, dword ptr fs:[00000030h]2_2_0161EA80
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161EA80 mov eax, dword ptr fs:[00000030h]2_2_0161EA80
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161EA80 mov eax, dword ptr fs:[00000030h]2_2_0161EA80
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161EA80 mov eax, dword ptr fs:[00000030h]2_2_0161EA80
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161EA80 mov eax, dword ptr fs:[00000030h]2_2_0161EA80
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_0161EA80 mov eax, dword ptr fs:[00000030h]2_2_0161EA80
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016E4A80 mov eax, dword ptr fs:[00000030h]2_2_016E4A80
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01648A90 mov edx, dword ptr fs:[00000030h]2_2_01648A90
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_016A8D6B mov eax, dword ptr fs:[00000030h]2_2_016A8D6B
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01610D59 mov eax, dword ptr fs:[00000030h]2_2_01610D59
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01610D59 mov eax, dword ptr fs:[00000030h]2_2_01610D59
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01610D59 mov eax, dword ptr fs:[00000030h]2_2_01610D59
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01618D59 mov eax, dword ptr fs:[00000030h]2_2_01618D59
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01618D59 mov eax, dword ptr fs:[00000030h]2_2_01618D59
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01618D59 mov eax, dword ptr fs:[00000030h]2_2_01618D59
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeCode function: 2_2_01618D59 mov eax, dword ptr fs:[00000030h]2_2_01618D59
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtAllocateVirtualMemory: Direct from: 0x77172BFCJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtDelayExecution: Direct from: 0x77172DDCJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtProtectVirtualMemory: Direct from: 0x77167B2EJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtQuerySystemInformation: Direct from: 0x77172DFCJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtReadFile: Direct from: 0x77172ADCJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtQueryInformationProcess: Direct from: 0x77172C26Jump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtResumeThread: Direct from: 0x77172FBCJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtWriteVirtualMemory: Direct from: 0x7717490CJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtCreateUserProcess: Direct from: 0x7717371CJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtOpenKeyEx: Direct from: 0x77172B9CJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtNotifyChangeKey: Direct from: 0x77173C2CJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtSetInformationProcess: Direct from: 0x77172C5CJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtProtectVirtualMemory: Direct from: 0x77172F9CJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtResumeThread: Direct from: 0x771736ACJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtMapViewOfSection: Direct from: 0x77172D1CJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtWriteVirtualMemory: Direct from: 0x77172E3CJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtCreateMutant: Direct from: 0x771735CCJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtDeviceIoControlFile: Direct from: 0x77172AECJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtAllocateVirtualMemory: Direct from: 0x77172BECJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtTerminateThread: Direct from: 0x77172FCCJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtQueryInformationToken: Direct from: 0x77172CACJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtCreateFile: Direct from: 0x77172FECJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtOpenFile: Direct from: 0x77172DCCJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtClose: Direct from: 0x77172B6C
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtSetInformationThread: Direct from: 0x771663F9Jump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtAllocateVirtualMemory: Direct from: 0x77173C9CJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtQueryAttributesFile: Direct from: 0x77172E6CJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtSetInformationThread: Direct from: 0x77172B4CJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtReadVirtualMemory: Direct from: 0x77172E8CJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtCreateKey: Direct from: 0x77172C6CJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtQueryVolumeInformationFile: Direct from: 0x77172F2CJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtAllocateVirtualMemory: Direct from: 0x771748ECJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtQuerySystemInformation: Direct from: 0x771748CCJump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeNtOpenSection: Direct from: 0x77172E0CJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeMemory written: C:\Users\user\Desktop\PO 768733 - 6750.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeSection loaded: NULL target: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeSection loaded: NULL target: C:\Windows\SysWOW64\Utilman.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeSection loaded: NULL target: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeSection loaded: NULL target: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeThread register set: target process: 1064Jump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeThread APC queued: target process: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeProcess created: C:\Users\user\Desktop\PO 768733 - 6750.exe "C:\Users\user\Desktop\PO 768733 - 6750.exe"Jump to behavior
                Source: C:\Program Files (x86)\tUxnUyYKLghSnxOGjzIasEizeWNFBOJVchxRrKtIVyxmJEkHevUiLgjQXPcuSrlyaJLYV\qMWzFch3YSFcC7wtIS.exeProcess created: C:\Windows\SysWOW64\Utilman.exe "C:\Windows\SysWOW64\Utilman.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: qMWzFch3YSFcC7wtIS.exe, 00000009.00000002.2497343504.00000000016A1000.00000002.00000001.00040000.00000000.sdmp, qMWzFch3YSFcC7wtIS.exe, 00000009.00000000.1482660770.00000000016A1000.00000002.00000001.00040000.00000000.sdmp, qMWzFch3YSFcC7wtIS.exe, 0000000B.00000000.1646384530.0000000001151000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: qMWzFch3YSFcC7wtIS.exe, 00000009.00000002.2497343504.00000000016A1000.00000002.00000001.00040000.00000000.sdmp, qMWzFch3YSFcC7wtIS.exe, 00000009.00000000.1482660770.00000000016A1000.00000002.00000001.00040000.00000000.sdmp, qMWzFch3YSFcC7wtIS.exe, 0000000B.00000000.1646384530.0000000001151000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: qMWzFch3YSFcC7wtIS.exe, 00000009.00000002.2497343504.00000000016A1000.00000002.00000001.00040000.00000000.sdmp, qMWzFch3YSFcC7wtIS.exe, 00000009.00000000.1482660770.00000000016A1000.00000002.00000001.00040000.00000000.sdmp, qMWzFch3YSFcC7wtIS.exe, 0000000B.00000000.1646384530.0000000001151000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program ManagerW
                Source: qMWzFch3YSFcC7wtIS.exe, 00000009.00000002.2497343504.00000000016A1000.00000002.00000001.00040000.00000000.sdmp, qMWzFch3YSFcC7wtIS.exe, 00000009.00000000.1482660770.00000000016A1000.00000002.00000001.00040000.00000000.sdmp, qMWzFch3YSFcC7wtIS.exe, 0000000B.00000000.1646384530.0000000001151000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeQueries volume information: C:\Users\user\Desktop\PO 768733 - 6750.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeQueries volume information: C:\Windows\Fonts\GILSANUB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO 768733 - 6750.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 2.2.PO 768733 - 6750.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.PO 768733 - 6750.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000A.00000002.2495622349.0000000002B70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1561829996.0000000001090000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2497896046.00000000031C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2497730850.0000000003170000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1563152160.0000000002D30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1561491598.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2498125651.0000000004260000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\Utilman.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\Utilman.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 2.2.PO 768733 - 6750.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.PO 768733 - 6750.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000A.00000002.2495622349.0000000002B70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1561829996.0000000001090000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2497896046.00000000031C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2497730850.0000000003170000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1563152160.0000000002D30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1561491598.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.2498125651.0000000004260000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                DLL Side-Loading
                412
                Process Injection
                1
                Masquerading
                1
                OS Credential Dumping
                121
                Security Software Discovery
                Remote Services1
                Email Collection
                1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                Abuse Elevation Control Mechanism
                1
                Disable or Modify Tools
                LSASS Memory2
                Process Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                3
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                41
                Virtualization/Sandbox Evasion
                Security Account Manager41
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares1
                Data from Local System
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook412
                Process Injection
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput Capture4
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets2
                File and Directory Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Abuse Elevation Control Mechanism
                Cached Domain Credentials113
                System Information Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items4
                Obfuscated Files or Information
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job12
                Software Packing
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                Timestomp
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                DLL Side-Loading
                Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1665582 Sample: PO 768733 - 6750.exe Startdate: 15/04/2025 Architecture: WINDOWS Score: 100 31 www.xxxvideosbox.xyz 2->31 33 www.mslgdkor.xyz 2->33 35 3 other IPs or domains 2->35 45 Antivirus detection for URL or domain 2->45 47 Multi AV Scanner detection for submitted file 2->47 49 Yara detected FormBook 2->49 53 2 other signatures 2->53 10 PO 768733 - 6750.exe 3 2->10         started        signatures3 51 Performs DNS queries to domains with low reputation 33->51 process4 file5 29 C:\Users\user\...\PO 768733 - 6750.exe.log, ASCII 10->29 dropped 65 Injects a PE file into a foreign processes 10->65 14 PO 768733 - 6750.exe 10->14         started        signatures6 process7 signatures8 67 Maps a DLL or memory area into another process 14->67 17 qMWzFch3YSFcC7wtIS.exe 14->17 injected process9 signatures10 43 Found direct / indirect Syscall (likely to bypass EDR) 17->43 20 Utilman.exe 13 17->20         started        process11 signatures12 55 Tries to steal Mail credentials (via file / registry access) 20->55 57 Tries to harvest and steal browser information (history, passwords, etc) 20->57 59 Modifies the context of a thread in another process (thread injection) 20->59 61 3 other signatures 20->61 23 qMWzFch3YSFcC7wtIS.exe 20->23 injected 27 firefox.exe 20->27         started        process13 dnsIp14 37 www.xxxvideosbox.xyz 91.216.220.20, 49692, 80 OLIMPKZ-NETKZ Kazakhstan 23->37 39 031234912.xyz 144.76.229.203, 49698, 49699, 49700 HETZNER-ASDE Germany 23->39 41 2 other IPs or domains 23->41 63 Found direct / indirect Syscall (likely to bypass EDR) 23->63 signatures15

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.