Analysis Report New Order PO20011046.exe

Overview

General Information

Sample Name: New Order PO20011046.exe
Analysis ID: 324078
MD5: 310a7ca550b9997d0e0bcaf645530303
SHA1: 5617d1e233381ea3fd6ab796fcc6a2de66137c51
SHA256: 0ee90c988386390753a1954692a658e393d761887ecfbfd100105c365a3ebc34
Tags: ESPexegeo

Most interesting Screenshot:

Detection

AgentTesla
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Allocates memory in foreign processes
Creates a thread in another existing process (thread injection)
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Suspicious Svchost Process
Writes to foreign memory regions
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

AV Detection:

barindex
Multi AV Scanner detection for dropped file
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Evvudrv.exe ReversingLabs: Detection: 68%
Multi AV Scanner detection for submitted file
Source: New Order PO20011046.exe Virustotal: Detection: 32% Perma Link
Source: New Order PO20011046.exe ReversingLabs: Detection: 68%
Machine Learning detection for dropped file
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Evvudrv.exe Joe Sandbox ML: detected
Machine Learning detection for sample
Source: New Order PO20011046.exe Joe Sandbox ML: detected
Source: C:\Windows\SysWOW64\svchost.exe Code function: 5_2_504851E0 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn, 5_2_504851E0

Software Vulnerabilities:

barindex
Found inlined nop instructions (likely shell or obfuscated code)
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 4x nop then mov eax, dword ptr [00460BCCh] 0_3_02BE896C
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 4x nop then mov eax, ecx 0_3_02BE8C98
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Evvudrv.exe Code function: 4x nop then mov eax, dword ptr [00460BCCh] 16_3_02D2896C
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Evvudrv.exe Code function: 4x nop then mov eax, ecx 16_3_02D28C98

Networking:

barindex
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 162.159.136.232 162.159.136.232
Source: Joe Sandbox View IP Address: 162.159.130.233 162.159.130.233
JA3 SSL client fingerprint seen in connection with other malware
Source: Joe Sandbox View JA3 fingerprint: ce5f3254611a8c095a3d821d44539877
Source: unknown DNS traffic detected: queries for: discord.com
Source: New Order PO20011046.exe, 0000000B.00000002.920637120.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://127.0.0.1:HTTP/1.1
Source: New Order PO20011046.exe, 0000000B.00000002.920637120.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://DynDns.comDynDNS
Source: New Order PO20011046.exe, 0000000B.00000002.920637120.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: http://hltGXE.com
Source: New Order PO20011046.exe, 0000000B.00000002.920637120.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: https://api.ipify.orgGETMozilla/5.0
Source: New Order PO20011046.exe, 0000000B.00000002.920637120.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------x
Source: Evvudrv.exe, 00000012.00000002.921664541.0000000002FE0000.00000004.00000001.sdmp String found in binary or memory: https://cdn.discordapp.com/attachments/781759014248775694/781759240837791774/Evvured
Source: Evvudrv.exe, 00000012.00000002.921664541.0000000002FE0000.00000004.00000001.sdmp String found in binary or memory: https://discord.com/
Source: Evvudrv.exe, 00000012.00000002.921664541.0000000002FE0000.00000004.00000001.sdmp String found in binary or memory: https://discord.com/J
Source: New Order PO20011046.exe, 0000000B.00000002.920637120.00000000028E1000.00000004.00000001.sdmp String found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49755
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49732
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49754
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49731
Source: unknown Network traffic detected: HTTP traffic on port 49731 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49732 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49762
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49761
Source: unknown Network traffic detected: HTTP traffic on port 49761 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49762 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49754 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49755 -> 443

System Summary:

barindex
Initial sample is a PE file and has a suspicious name
Source: initial sample Static PE information: Filename: New Order PO20011046.exe
Contains functionality to call native functions
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_020DB9BA NtQuerySystemInformation, 11_2_020DB9BA
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_020DB97F NtQuerySystemInformation, 11_2_020DB97F
Creates files inside the system directory
Source: C:\Users\user\Desktop\New Order PO20011046.exe File created: C:\Windows\assembly\Desktop.ini Jump to behavior
Detected potential crypto function
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_02BDA4F4 0_3_02BDA4F4
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_00406C50 11_2_00406C50
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_00402860 11_2_00402860
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_0041A47E 11_2_0041A47E
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_00408C10 11_2_00408C10
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_00418C8C 11_2_00418C8C
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_00401650 11_2_00401650
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_00418204 11_2_00418204
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_00402ED0 11_2_00402ED0
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_00402B40 11_2_00402B40
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_00418748 11_2_00418748
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_00407350 11_2_00407350
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_00402F39 11_2_00402F39
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_0040DBD1 11_2_0040DBD1
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_00407BEF 11_2_00407BEF
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_00419384 11_2_00419384
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Evvudrv.exe Code function: 16_3_02D1A4F4 16_3_02D1A4F4
Found potential string decryption / allocating functions
Source: C:\Windows\SysWOW64\svchost.exe Code function: String function: 50484278 appears 51 times
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: String function: 0040E198 appears 44 times
PE / OLE file has an invalid certificate
Source: New Order PO20011046.exe Static PE information: invalid certificate
PE file contains strange resources
Source: New Order PO20011046.exe Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: New Order PO20011046.exe Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: Evvudrv.exe.0.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: Evvudrv.exe.0.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Sample file is different than original file name gathered from version info
Source: New Order PO20011046.exe, 0000000B.00000001.758964598.0000000000448000.00000040.00020000.sdmp Binary or memory string: OriginalFilenameuszkpYZrHmwlxpeBdJLqZbZT.exe4 vs New Order PO20011046.exe
Source: New Order PO20011046.exe, 0000000B.00000002.920852349.00000000038E1000.00000004.00000001.sdmp Binary or memory string: OriginalFilename_.dll4 vs New Order PO20011046.exe
Source: New Order PO20011046.exe, 0000000B.00000002.922266457.0000000005310000.00000002.00000001.sdmp Binary or memory string: OriginalFilenameKernelbase.dll.muij% vs New Order PO20011046.exe
Source: New Order PO20011046.exe, 0000000B.00000002.922240026.0000000005300000.00000002.00000001.sdmp Binary or memory string: OriginalFilenamewbemdisp.tlbj% vs New Order PO20011046.exe
Yara signature match
Source: C:\Users\user\AppData\Local\uvvE.url, type: DROPPED Matched rule: Methodology_Shortcut_HotKey author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, reference = https://twitter.com/cglyer/status/1176184798248919044, score = 27.09.2019
Source: C:\Users\user\AppData\Local\uvvE.url, type: DROPPED Matched rule: Methodology_Contains_Shortcut_OtherURIhandlers author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, reference = https://twitter.com/cglyer/status/1176184798248919044, score = 27.09.2019
Source: C:\Users\user\AppData\Local\uvvE.url, type: DROPPED Matched rule: Methodology_Suspicious_Shortcut_IconNotFromExeOrDLLOrICO author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, reference = https://twitter.com/ItsReallyNick/status/1176229087196696577, score = 27.09.2019
Source: classification engine Classification label: mal100.troj.evad.winEXE@15/7@6/4
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_020DA9DA AdjustTokenPrivileges, 11_2_020DA9DA
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_020DA9A3 AdjustTokenPrivileges, 11_2_020DA9A3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 5_2_5048789A GetDiskFreeSpaceA, 5_2_5048789A
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_00401980 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,CorBindToRuntimeEx,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,InterlockedDecrement,InterlockedDecrement,SysFreeString,VariantClear,InterlockedDecrement,SysFreeString, 11_2_00401980
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_00401980 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,CorBindToRuntimeEx,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,InterlockedDecrement,InterlockedDecrement,SysFreeString,VariantClear,InterlockedDecrement,SysFreeString, 11_2_00401980
Source: C:\Users\user\Desktop\New Order PO20011046.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\Evvudrv.exe Jump to behavior
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6952:120:WilError_01
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5952:120:WilError_01
Source: unknown Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ''C:\Users\Public\Xzqvptso.bat' '
Source: C:\Users\user\Desktop\New Order PO20011046.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Evvudrv.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Evvudrv.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Evvudrv.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Evvudrv.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Section loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\SysWOW64\svchost.exe File read: C:\Users\user\Desktop\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Evvudrv.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Evvudrv.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Evvudrv.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Evvudrv.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Evvudrv.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Evvudrv.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: New Order PO20011046.exe Virustotal: Detection: 32%
Source: New Order PO20011046.exe ReversingLabs: Detection: 68%
Source: C:\Users\user\Desktop\New Order PO20011046.exe File read: C:\Users\user\Desktop\New Order PO20011046.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\New Order PO20011046.exe 'C:\Users\user\Desktop\New Order PO20011046.exe'
Source: unknown Process created: C:\Windows\SysWOW64\svchost.exe C:\Windows\System32\svchost.exe
Source: unknown Process created: C:\Users\user\Desktop\New Order PO20011046.exe C:\Users\user\Desktop\New Order PO20011046.exe
Source: unknown Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ''C:\Users\Public\Xzqvptso.bat' '
Source: unknown Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknown Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ''C:\Users\Public\Xzqvptso.bat' '
Source: unknown Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknown Process created: C:\Users\user\AppData\Local\Microsoft\Windows\Evvudrv.exe 'C:\Users\user\AppData\Local\Microsoft\Windows\Evvudrv.exe'
Source: unknown Process created: C:\Users\user\AppData\Local\Microsoft\Windows\Evvudrv.exe 'C:\Users\user\AppData\Local\Microsoft\Windows\Evvudrv.exe'
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process created: C:\Windows\SysWOW64\svchost.exe C:\Windows\System32\svchost.exe Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process created: C:\Users\user\Desktop\New Order PO20011046.exe C:\Users\user\Desktop\New Order PO20011046.exe Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ''C:\Users\Public\Xzqvptso.bat' ' Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ''C:\Users\Public\Xzqvptso.bat' ' Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe File written: C:\Windows\assembly\Desktop.ini Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: New Order PO20011046.exe Static file information: File size 1311424 > 1048576
Source: C:\Users\user\Desktop\New Order PO20011046.exe File opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll Jump to behavior
Source: Binary string: _.pdb source: New Order PO20011046.exe, 0000000B.00000002.920852349.00000000038E1000.00000004.00000001.sdmp

Data Obfuscation:

barindex
Detected unpacking (changes PE section rights)
Source: C:\Users\user\Desktop\New Order PO20011046.exe Unpacked PE file: 11.2.New Order PO20011046.exe.400000.0.unpack CODE:ER;DATA:W;BSS:W;.idata:W;.tls:W;.rdata:R;.reloc:R;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
Detected unpacking (overwrites its own PE header)
Source: C:\Users\user\Desktop\New Order PO20011046.exe Unpacked PE file: 11.2.New Order PO20011046.exe.400000.0.unpack
Contains functionality to dynamically determine API calls
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_00401980 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,CorBindToRuntimeEx,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,InterlockedDecrement,InterlockedDecrement,SysFreeString,VariantClear,InterlockedDecrement,SysFreeString, 11_2_00401980
Uses code obfuscation techniques (call, push, ret)
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_0237C137 push esi; retf 0_3_0237C146
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_0237D536 push esi; retf 0_3_0237D537
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_0237943F push edi; ret 0_3_0237944C
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_0237B338 push esi; retf 0_3_0237B33C
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_0237C724 push esi; retf 0_3_0237C819
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_02379C23 push ebx; ret 0_3_02379C39
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_02379E14 push ebx; ret 0_3_02379E16
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_0237C81F push esi; retf 0_3_0237C822
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_0237D61B push esi; retf 0_3_0237D621
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_0237D207 push esi; retf 0_3_0237D211
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_0237D607 push esi; retf 0_3_0237D615
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_0237997C push ebx; ret 0_3_02379987
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_0237B178 push esi; retf 0_3_0237B1A8
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_0237926C push esi; retf 0_3_02379272
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_02379A6C push esi; retf 0_3_02379A70
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_0237D153 push esi; retf 0_3_0237D201
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_0237D24E push esi; retf 0_3_0237D24F
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_0237B0B3 push esi; retf 0_3_0237B16C
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_0237A7B0 push esi; retf 0_3_0237A7D8
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_0237C1A9 push esi; retf 0_3_0237C1EB
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_0237A392 push edi; iretd 0_3_0237A393
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_0237949D push ebx; ret 0_3_0237949F
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_0237C49C push esi; retf 0_3_0237C4BC
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_0237B287 push esi; retf 0_3_0237B288
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_0237C2FC push esi; retf 0_3_0237C393
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_0237B5E4 push esi; retf 0_3_0237B5E5
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_0237C4EF push esi; retf 0_3_0237C4F1
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_02379EE9 push ebx; ret 0_3_02379EEB
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_0237C5D6 push esi; retf 0_3_0237C5FE
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_0237C3C2 push esi; retf 0_3_0237C3CF
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 0_3_02BD1AA4 push 00440316h; ret 0_3_02BD1B02

Persistence and Installation Behavior:

barindex
Drops PE files
Source: C:\Users\user\Desktop\New Order PO20011046.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\Evvudrv.exe Jump to dropped file
Source: C:\Users\user\Desktop\New Order PO20011046.exe Registry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run Evvu Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Registry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run Evvu Jump to behavior

Hooking and other Techniques for Hiding and Protection:

barindex
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Source: C:\Users\user\Desktop\New Order PO20011046.exe Registry key monitored for changes: HKEY_CURRENT_USER_Classes Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion:

barindex
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Source: C:\Users\user\Desktop\New Order PO20011046.exe Function Chain: systemQueried,systemQueried,threadDelayed,threadCreated,threadResumed,threadDelayed,threadDelayed,threadDelayed,threadDelayed,systemQueried,threadDelayed,threadDelayed,threadDelayed,systemQueried,threadDelayed,systemQueried,threadDelayed,threadDelayed,threadDelayed,threadDelayed,threadDelayed,threadDelayed,threadDelayed,threadDelayed,threadDelayed
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Source: C:\Users\user\Desktop\New Order PO20011046.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Source: C:\Users\user\Desktop\New Order PO20011046.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
Contains capabilities to detect virtual machines
Source: C:\Windows\SysWOW64\svchost.exe File opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b} Jump to behavior
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_00401980 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,CorBindToRuntimeEx,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,InterlockedDecrement,InterlockedDecrement,SysFreeString,VariantClear,InterlockedDecrement,SysFreeString, 11_2_00401980
Contains long sleeps (>= 3 min)
Source: C:\Windows\SysWOW64\svchost.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread delayed: delay time: 922337203685477 Jump to behavior
May sleep (evasive loops) to hinder dynamic analysis
Source: C:\Windows\SysWOW64\svchost.exe TID: 6660 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe TID: 5992 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe TID: 6916 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe TID: 6332 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe TID: 6332 Thread sleep count: 138 > 30 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe TID: 6332 Thread sleep time: -4140000s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe TID: 6332 Thread sleep time: -507620s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe TID: 6332 Thread sleep time: -776334s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe TID: 6332 Thread sleep time: -388583s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe TID: 6332 Thread sleep time: -388778s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe TID: 6332 Thread sleep time: -209349s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe TID: 6332 Thread sleep time: -89670s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe TID: 6332 Thread sleep time: -59688s >= -30000s Jump to behavior
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Source: C:\Users\user\Desktop\New Order PO20011046.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Sample execution stops while process was sleeping (likely an evasion)
Source: C:\Users\user\Desktop\New Order PO20011046.exe Last function: Thread delayed
Source: C:\Users\user\Desktop\New Order PO20011046.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\SysWOW64\svchost.exe Code function: 5_2_504851E0 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn, 5_2_504851E0
Source: New Order PO20011046.exe, 0000000B.00000002.922266457.0000000005310000.00000002.00000001.sdmp Binary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
Source: New Order PO20011046.exe, 0000000B.00000002.922266457.0000000005310000.00000002.00000001.sdmp Binary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
Source: New Order PO20011046.exe, 0000000B.00000002.922266457.0000000005310000.00000002.00000001.sdmp Binary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
Source: New Order PO20011046.exe, 0000000B.00000002.922266457.0000000005310000.00000002.00000001.sdmp Binary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process information queried: ProcessInformation Jump to behavior

Anti Debugging:

barindex
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_0040CDC9 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 11_2_0040CDC9
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_00401980 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,CorBindToRuntimeEx,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,InterlockedDecrement,InterlockedDecrement,SysFreeString,VariantClear,InterlockedDecrement,SysFreeString, 11_2_00401980
Contains functionality to dynamically determine API calls
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_00401980 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,CorBindToRuntimeEx,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,InterlockedDecrement,InterlockedDecrement,SysFreeString,VariantClear,InterlockedDecrement,SysFreeString, 11_2_00401980
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_0040AD70 GetProcessHeap,HeapFree, 11_2_0040AD70
Enables debug privileges
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_0040CDC9 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 11_2_0040CDC9
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_0040E5DC _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 11_2_0040E5DC
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_00416F2A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 11_2_00416F2A
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_004123B1 SetUnhandledExceptionFilter, 11_2_004123B1
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion:

barindex
Allocates memory in foreign processes
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 50480000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 180000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 190000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1A0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1F0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 440000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 450000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 460000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 470000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 480000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 490000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 4A0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 4B0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 4C0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 4D0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 4E0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: B10000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: B20000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: B30000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: B40000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: B50000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: B60000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: B70000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: B80000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: B90000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: BA0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: BB0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: BC0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: BD0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: BE0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: BF0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: C00000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: C10000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: C20000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: C30000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: C40000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: C50000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: C60000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: C70000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: C80000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: C90000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: CA0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: CB0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: CC0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: CD0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: CE0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: CF0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: D00000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: D10000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: D20000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: D30000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: D40000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: D50000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: D60000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: D70000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: D80000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: D90000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: DA0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: DB0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: DC0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: DD0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: DE0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: DF0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: E00000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: E10000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: E20000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: E30000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: E40000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: E50000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: E60000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: E70000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: E80000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: E90000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: EA0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: EB0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: EC0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: ED0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: EE0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: EF0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: F00000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: F10000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: F20000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: F30000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: F40000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: F50000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: F60000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: F70000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: F80000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: F90000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: FA0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: FB0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: FC0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: FD0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: FE0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: FF0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1000000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1010000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1020000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1030000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1040000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1050000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1060000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1070000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1080000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1090000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 10A0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 10B0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 10C0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 10D0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 10E0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 10F0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1100000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1110000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1120000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1130000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1140000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1150000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1160000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1170000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1180000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1190000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 11A0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 11B0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 11C0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 11D0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 11E0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 11F0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1200000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1210000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1220000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1230000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1240000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1250000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1260000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1270000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1280000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 1290000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 12A0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 12B0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 12C0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 12D0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 12E0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 12F0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 3310000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 3320000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 3330000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 3340000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 3350000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 3360000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 3370000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 3380000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 3390000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 33A0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 33B0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 33C0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 33D0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 33E0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 33F0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 3400000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 3410000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 3420000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 3430000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 3440000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 3450000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 3460000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 3470000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 3480000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 3490000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 34A0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 34B0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 34C0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 34D0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 34E0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 34F0000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 3500000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 3510000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 3520000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 3530000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 3540000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 3550000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 3560000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory allocated: C:\Windows\SysWOW64\svchost.exe base: 3570000 protect: page execute and read and write Jump to behavior
Creates a thread in another existing process (thread injection)
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 1A0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 460000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 4A0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 4E0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: B40000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: B80000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: BC0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: C00000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: C40000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: C80000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: CC0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: D00000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: D40000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: D80000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: DC0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: E00000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: E40000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: E80000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: EC0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: F00000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: F40000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: F80000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: FC0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 1000000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 1040000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 1080000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 10C0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 1100000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 1140000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 1180000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 11C0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 1200000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 1240000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 1280000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 12C0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 3310000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 3350000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 3390000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 33D0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 3410000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 3450000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 3490000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 34D0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 3510000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 3550000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 3580000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 3700000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 3740000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 3780000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 37C0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 37F0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5130000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5170000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 51B0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 51E0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5260000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 53B0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 53F0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5420000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 55A0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 55E0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5620000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5660000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 56A0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 56E0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5710000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5890000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 58D0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5910000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5950000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5990000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 59D0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5A10000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5A50000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5A90000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5AD0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5B10000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5B50000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5B90000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5BD0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5C10000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5C50000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5C90000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5CD0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5D10000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5D50000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5D90000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5DD0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5E10000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5E50000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5E90000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5ED0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5F10000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5F50000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5F90000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 5FD0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 6010000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 6050000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 6090000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 60D0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 6110000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 6150000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 6190000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 61D0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 6200000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 6380000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 63C0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 6400000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 6440000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 6480000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 64B0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 6630000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 6660000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 67E0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 6820000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 6860000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 68A0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 68E0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 6920000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 6960000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 69A0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 69D0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 6B50000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Thread created: C:\Windows\SysWOW64\svchost.exe EIP: 6B70000 Jump to behavior
Injects a PE file into a foreign processes
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 50480000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Users\user\Desktop\New Order PO20011046.exe base: 400000 value starts with: 4D5A Jump to behavior
Writes to foreign memory regions
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 180000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 190000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1A0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1F0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 440000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 450000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 460000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 470000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 480000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 490000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 4A0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 4B0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 4C0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 4D0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 4E0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: B10000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: B20000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: B30000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: B40000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: B50000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: B60000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: B70000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: B80000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: B90000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: BA0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: BB0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: BC0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: BD0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: BE0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: BF0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: C00000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: C10000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: C20000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: C30000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: C40000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: C50000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: C60000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: C70000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: C80000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: C90000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: CA0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: CB0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: CC0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: CD0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: CE0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: CF0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: D00000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: D10000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: D20000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: D30000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: D40000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: D50000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: D60000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: D70000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: D80000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: D90000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: DA0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: DB0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: DC0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: DD0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: DE0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: DF0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: E00000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: E10000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: E20000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: E30000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: E40000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: E50000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: E60000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: E70000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: E80000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: E90000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: EA0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: EB0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: EC0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: ED0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: EE0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: EF0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: F00000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: F10000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: F20000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: F30000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: F40000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: F50000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: F60000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: F70000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: F80000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: F90000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: FA0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: FB0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: FC0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: FD0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: FE0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: FF0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1000000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1010000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1020000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1030000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1040000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1050000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1060000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1070000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1080000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1090000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 10A0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 10B0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 10C0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 10D0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 10E0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 10F0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1100000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1110000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1120000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1130000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1140000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1150000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1160000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1170000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1180000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1190000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 11A0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 11B0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 11C0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 11D0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 11E0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 11F0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1200000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1210000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1220000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1230000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1240000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1250000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1260000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1270000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1280000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 1290000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 12A0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 12B0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 12C0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 12D0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 12E0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 12F0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3310000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3320000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3330000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3340000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3350000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3360000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3370000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3380000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3390000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 33A0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 33B0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 33C0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 33D0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 33E0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 33F0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3400000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3410000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3420000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3430000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3440000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3450000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3460000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3470000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3480000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3490000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 34A0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 34B0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 34C0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 34D0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 34E0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 34F0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3500000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3510000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3520000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3530000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3540000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3550000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3560000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3570000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3580000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 36D0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 36E0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 36F0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3700000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3710000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3720000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3730000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3740000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3750000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3760000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3770000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3780000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3790000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 37A0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 37B0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 37C0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 37D0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 37E0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 37F0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 3840000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5110000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5120000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5130000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5140000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5150000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5160000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5170000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5180000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5190000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 51A0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 51B0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 51C0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 51D0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 51E0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5230000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5240000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5250000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5260000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5270000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5390000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 53A0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 53B0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 53C0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 53D0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 53E0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 53F0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5400000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5410000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5420000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5570000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5580000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5590000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 55A0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 55B0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 55C0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 55D0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 55E0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 55F0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5600000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5610000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5620000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5630000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5640000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5650000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5660000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5670000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5680000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5690000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 56A0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 56B0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 56C0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 56D0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 56E0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 56F0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5700000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5710000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5860000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5870000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5880000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5890000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 58A0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 58B0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 58C0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 58D0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 58E0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 58F0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5900000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5910000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5920000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5930000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5940000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5950000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5960000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5970000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5980000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5990000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 59A0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 59B0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 59C0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 59D0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 59E0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 59F0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5A00000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5A10000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5A20000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5A30000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5A40000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5A50000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5A60000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5A70000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5A80000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5A90000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5AA0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5AB0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5AC0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5AD0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5AE0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5AF0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5B00000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5B10000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5B20000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5B30000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5B40000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5B50000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5B60000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5B70000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5B80000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5B90000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5BA0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5BB0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5BC0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5BD0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5BE0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5BF0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5C00000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5C10000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5C20000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5C30000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5C40000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5C50000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5C60000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5C70000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5C80000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5C90000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5CA0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5CB0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5CC0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5CD0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5CE0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5CF0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5D00000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5D10000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5D20000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5D30000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5D40000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5D50000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5D60000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5D70000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5D80000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5D90000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5DA0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5DB0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5DC0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5DD0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5DE0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5DF0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5E00000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5E10000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5E20000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5E30000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5E40000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5E50000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5E60000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5E70000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5E80000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5E90000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5EA0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5EB0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5EC0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5ED0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5EE0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5EF0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5F00000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5F10000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5F20000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5F30000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5F40000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5F50000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5F60000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5F70000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5F80000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5F90000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5FA0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5FB0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5FC0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5FD0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5FE0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 5FF0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6000000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6010000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6020000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6030000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6040000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6050000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6060000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6070000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6080000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6090000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 60A0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 60B0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 60C0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 60D0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 60E0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 60F0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6100000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6110000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6120000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6130000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6140000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6150000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6160000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6170000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6180000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6190000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 61A0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 61B0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 61C0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 61D0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 61E0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 61F0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6200000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6350000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6360000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6370000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6380000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6390000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 63A0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 63B0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 63C0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 63D0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 63E0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 63F0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6400000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6410000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6420000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6430000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6440000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6450000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6460000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6470000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6480000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6490000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 64A0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 64B0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6600000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6610000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6620000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6630000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6640000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6650000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6660000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 67B0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 67C0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 67D0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 67E0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 67F0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6800000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6810000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6820000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6830000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6840000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6850000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6860000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6870000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6880000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6890000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 68A0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 68B0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 68C0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 68D0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 68E0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 68F0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6900000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6910000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6920000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6930000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6940000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6950000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6960000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6970000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6980000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6990000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 69A0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 69B0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 69C0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 69D0000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6B20000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6B30000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6B40000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6B50000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 50480000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6B60000 Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Memory written: C:\Windows\SysWOW64\svchost.exe base: 6B70000 Jump to behavior
Creates a process in suspended mode (likely to inject code)
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process created: C:\Windows\SysWOW64\svchost.exe C:\Windows\System32\svchost.exe Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Process created: C:\Users\user\Desktop\New Order PO20011046.exe C:\Users\user\Desktop\New Order PO20011046.exe Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ''C:\Users\Public\Xzqvptso.bat' ' Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ''C:\Users\Public\Xzqvptso.bat' ' Jump to behavior
Source: New Order PO20011046.exe, 0000000B.00000002.918866865.0000000000CA0000.00000002.00000001.sdmp Binary or memory string: Program Manager
Source: New Order PO20011046.exe, 0000000B.00000002.918866865.0000000000CA0000.00000002.00000001.sdmp Binary or memory string: Shell_TrayWnd
Source: New Order PO20011046.exe, 0000000B.00000002.918866865.0000000000CA0000.00000002.00000001.sdmp Binary or memory string: Progman
Source: New Order PO20011046.exe, 0000000B.00000002.918866865.0000000000CA0000.00000002.00000001.sdmp Binary or memory string: Progmanlock

Language, Device and Operating System Detection:

barindex
Contains functionality to query locales information (e.g. system language)
Source: C:\Windows\SysWOW64\svchost.exe Code function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA, 5_2_504853B8
Source: C:\Windows\SysWOW64\svchost.exe Code function: GetLocaleInfoA, 5_2_5048A014
Source: C:\Windows\SysWOW64\svchost.exe Code function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA, 5_2_504854C3
Source: C:\Windows\SysWOW64\svchost.exe Code function: GetLocaleInfoA, 5_2_50485CC4
Source: C:\Windows\SysWOW64\svchost.exe Code function: GetLocaleInfoA,GetACP, 5_2_5048B490
Source: C:\Windows\SysWOW64\svchost.exe Code function: GetLocaleInfoA, 5_2_50489FC8
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: GetLocaleInfoA, 11_2_004179E0
Queries the volume information (name, serial number etc) of a device
Source: C:\Users\user\Desktop\New Order PO20011046.exe Queries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\New Order PO20011046.exe Queries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Code function: 5_2_50488A9C GetLocalTime, 5_2_50488A9C
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_020DBD8A GetUserNameW, 11_2_020DBD8A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 5_2_50485D8D GetCommandLineA,GetVersion,GetVersion,GetThreadLocale,GetThreadLocale,GetCurrentThreadId, 5_2_50485D8D
Source: C:\Users\user\Desktop\New Order PO20011046.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Stealing of Sensitive Information:

barindex
Yara detected AgentTesla
Source: Yara match File source: 0000000B.00000003.759372640.0000000000574000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.921398684.0000000004B40000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.920852349.00000000038E1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.920637120.00000000028E1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.919758080.0000000002251000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.921099669.0000000004A80000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: New Order PO20011046.exe PID: 1256, type: MEMORY
Source: Yara match File source: 11.2.New Order PO20011046.exe.4a80000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.New Order PO20011046.exe.4b40000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.New Order PO20011046.exe.4b40000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.New Order PO20011046.exe.4a80000.1.unpack, type: UNPACKEDPE
Yara detected Credential Stealer
Source: Yara match File source: 0000000B.00000002.920637120.00000000028E1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: New Order PO20011046.exe PID: 1256, type: MEMORY

Remote Access Functionality:

barindex
Yara detected AgentTesla
Source: Yara match File source: 0000000B.00000003.759372640.0000000000574000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.921398684.0000000004B40000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.920852349.00000000038E1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.920637120.00000000028E1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.919758080.0000000002251000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.921099669.0000000004A80000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: New Order PO20011046.exe PID: 1256, type: MEMORY
Source: Yara match File source: 11.2.New Order PO20011046.exe.4a80000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.New Order PO20011046.exe.4b40000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.New Order PO20011046.exe.4b40000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.New Order PO20011046.exe.4a80000.1.unpack, type: UNPACKEDPE
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_00401980 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,CorBindToRuntimeEx,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,InterlockedDecrement,InterlockedDecrement,SysFreeString,VariantClear,InterlockedDecrement,SysFreeString, 11_2_00401980
Source: C:\Users\user\Desktop\New Order PO20011046.exe Code function: 11_2_00401EB6 _memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,CorBindToRuntimeEx,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,InterlockedDecrement,InterlockedDecrement,SysFreeString,VariantClear,InterlockedDecrement,SysFreeString, 11_2_00401EB6
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 324078 Sample: New Order PO20011046.exe Startdate: 28/11/2020 Architecture: WINDOWS Score: 100 39 Multi AV Scanner detection for submitted file 2->39 41 Detected unpacking (changes PE section rights) 2->41 43 Detected unpacking (overwrites its own PE header) 2->43 45 7 other signatures 2->45 8 New Order PO20011046.exe 1 2 2->8         started        13 Evvudrv.exe 2->13         started        15 Evvudrv.exe 2->15         started        process3 dnsIp4 31 discord.com 162.159.128.233, 443, 49731, 49761 CLOUDFLARENETUS United States 8->31 33 cdn.discordapp.com 162.159.135.233, 443, 49732 CLOUDFLARENETUS United States 8->33 29 C:\Users\user\AppData\Local\...vvudrv.exe, PE32 8->29 dropped 47 Writes to foreign memory regions 8->47 49 Allocates memory in foreign processes 8->49 51 Creates a thread in another existing process (thread injection) 8->51 53 Injects a PE file into a foreign processes 8->53 17 svchost.exe 5 8->17         started        19 New Order PO20011046.exe 6 8->19         started        35 162.159.130.233, 443, 49755, 49762 CLOUDFLARENETUS United States 13->35 37 162.159.136.232, 443, 49754 CLOUDFLARENETUS United States 13->37 55 Multi AV Scanner detection for dropped file 13->55 57 Machine Learning detection for dropped file 13->57 file5 signatures6 process7 process8 21 cmd.exe 1 17->21         started        23 cmd.exe 1 17->23         started        process9 25 conhost.exe 21->25         started        27 conhost.exe 23->27         started       
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
162.159.136.232
unknown United States
13335 CLOUDFLARENETUS false
162.159.130.233
unknown United States
13335 CLOUDFLARENETUS false
162.159.128.233
unknown United States
13335 CLOUDFLARENETUS false
162.159.135.233
unknown United States
13335 CLOUDFLARENETUS false

Contacted Domains

Name IP Active
discord.com 162.159.128.233 true
cdn.discordapp.com 162.159.135.233 true