Windows Analysis Report PO_101&102.exe

Overview

General Information

Sample Name: PO_101&102.exe
Analysis ID: 510600
MD5: c8a5346cb632c91e0006252fd2c47bec
SHA1: a671570c31428ebc9bee30c9a2b9963bf629560a
SHA256: 46a0a8595dccf134213c2e9ae10dd6fdd8e3ff5f0cb1b01014a6b67e31927eec
Tags: exeformbook
Infos:

Most interesting Screenshot:

Detection

FormBook
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Sigma detected: Suspect Svchost Activity
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Initial sample is a PE file and has a suspicious name
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Modifies the prolog of user mode functions (user mode inline hooks)
Self deletion via cmd delete
Injects a PE file into a foreign processes
Sigma detected: Suspicious Svchost Process
Queues an APC in another process (thread injection)
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
HTTP GET or POST without a user agent
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Contains functionality to read the PEB
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to detect virtual machines (SGDT)

Classification

AV Detection:

barindex
Found malware configuration
Source: 00000001.00000002.312254656.0000000004500000.00000004.00000001.sdmp Malware Configuration Extractor: FormBook {"C2 list": ["www.reynbetgirisi.com/snr6/"], "decoy": ["jjglassmi1.com", "vpsseattle.com", "drfllc.top", "staycoolonline.com", "eptlove.com", "solusimatasehat.site", "ionrarecharlestonproperties.com", "b3eflucg.xyz", "tvchosun-usa.com", "mmahzxwzsadqlshop.life", "gospelimport.com", "demoapps.website", "jackburst54.com", "99rocket.education", "ccbwithbri.com", "trapperairsoft.com", "useroadly.com", "ralphlaurenonline-nl.com", "loanmaster4u.com", "champ-beauty-tomigaoka-nail.com", "theripemillennial.com", "123intan.net", "typopendant.com", "coruscant.holdings", "bio-intelligenz-therapie.com", "reprv.com", "directreport.net", "phinespe.xyz", "xuvedae.site", "idilikproperties.info", "wakigaggenin.com", "mal2tech.com", "nftwhaler.xyz", "gxhnjssx.com", "ozba.xyz", "lecupcake.net", "lucid.quest", "kaleoslawncare.com", "tiew.store", "texcommercialpainting.com", "2152351.com", "likewize-xl.com", "dacooligans.com", "manuelmartinezs.com", "beancusp.com", "barbershopvalleyvillage.com", "southwickfunerals.com", "briellebaeslay.info", "rebeccarye.com", "unitedstateswelders.com", "saudiarabiavegan.com", "testcarona.com", "serverapsd.com", "crickx.email", "hdszbj.com", "bennettmountainoutfitter.com", "leileilei1999.xyz", "baroquefolke.com", "francinegeorges.com", "horpces.online", "resolutionfix.com", "mike-schultz.xyz", "sohutobankueahomupezinkv.xyz", "flowerseedqueen.com"]}
Multi AV Scanner detection for submitted file
Source: PO_101&102.exe ReversingLabs: Detection: 35%
Yara detected FormBook
Source: Yara match File source: 10.2.PO_101&102.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.0.PO_101&102.exe.400000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.0.PO_101&102.exe.400000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.0.PO_101&102.exe.400000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.0.PO_101&102.exe.400000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.PO_101&102.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.PO_101&102.exe.45ada08.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.0.PO_101&102.exe.400000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000A.00000000.307243585.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.371409464.0000000001530000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.558614233.0000000002E40000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.312254656.0000000004500000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.555083742.00000000001A0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.559409706.0000000002F40000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000000.352889129.0000000007949000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.370759398.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000000.335987438.0000000007949000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.371246188.0000000001500000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000000.308236166.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Antivirus detection for URL or domain
Source: https://www.reynbetgirisi.com/snr6/?jDH8=E19JCPWLLAvTbcnEEa/roDJkoR1wzkcHqaxLe1hmnUekSrF Avira URL Cloud: Label: malware
Source: http://www.reynbetgirisi.com/snr6/?jDH8=E19JCPWLLAvTbcnEEa/roDJkoR1wzkcHqaxLe1hmnUekSrF+l+57NdrJs1Xds1ailiks&l0D0=fJBTE Avira URL Cloud: Label: malware
Source: www.reynbetgirisi.com/snr6/ Avira URL Cloud: Label: malware
Machine Learning detection for sample
Source: PO_101&102.exe Joe Sandbox ML: detected
Antivirus or Machine Learning detection for unpacked file
Source: 10.0.PO_101&102.exe.400000.4.unpack Avira: Label: TR/Crypt.ZPACK.Gen
Source: 10.0.PO_101&102.exe.400000.6.unpack Avira: Label: TR/Crypt.ZPACK.Gen
Source: 10.2.PO_101&102.exe.400000.0.unpack Avira: Label: TR/Crypt.ZPACK.Gen
Source: 10.0.PO_101&102.exe.400000.8.unpack Avira: Label: TR/Crypt.ZPACK.Gen

Compliance:

barindex
Uses 32bit PE files
Source: PO_101&102.exe Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: PO_101&102.exe Static PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: wntdll.pdbUGP source: PO_101&102.exe, 0000000A.00000002.371692405.0000000001600000.00000040.00000001.sdmp, svchost.exe, 0000000F.00000002.559918506.0000000003700000.00000040.00000001.sdmp
Source: Binary string: wntdll.pdb source: PO_101&102.exe, svchost.exe
Source: Binary string: svchost.pdb source: PO_101&102.exe, 0000000A.00000002.371642195.00000000015B0000.00000040.00020000.sdmp
Source: Binary string: svchost.pdbUGP source: PO_101&102.exe, 0000000A.00000002.371642195.00000000015B0000.00000040.00020000.sdmp

Software Vulnerabilities:

barindex
Found inlined nop instructions (likely shell or obfuscated code)
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 4x nop then mov dword ptr [ebp-18h], 00000000h 1_2_07DF7710
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 4x nop then mov dword ptr [ebp-18h], 00000000h 1_2_07DF7700
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 4x nop then pop ebx 10_2_00407B2D
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 4x nop then pop esi 10_2_0041732F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 4x nop then pop ebx 15_2_02F47B2D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 4x nop then pop esi 15_2_02F5732F

Networking:

barindex
System process connects to network (likely due to code injection or exploit)
Source: C:\Windows\explorer.exe Network Connect: 185.178.208.163 80 Jump to behavior
Source: C:\Windows\explorer.exe Domain query: www.reynbetgirisi.com
C2 URLs / IPs found in malware configuration
Source: Malware configuration extractor URLs: www.reynbetgirisi.com/snr6/
Internet Provider seen in connection with other malware
Source: Joe Sandbox View ASN Name: DDOS-GUARDRU DDOS-GUARDRU
HTTP GET or POST without a user agent
Source: global traffic HTTP traffic detected: GET /snr6/?jDH8=E19JCPWLLAvTbcnEEa/roDJkoR1wzkcHqaxLe1hmnUekSrF+l+57NdrJs1Xds1ailiks&l0D0=fJBTE HTTP/1.1Host: www.reynbetgirisi.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmp String found in binary or memory: http://fontfabrik.com
Source: PO_101&102.exe, 00000001.00000002.311135246.00000000033C1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameP
Source: PO_101&102.exe String found in binary or memory: http://tempuri.org/DatabaseDataSet.xsd
Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmp String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmp String found in binary or memory: http://www.carterandcone.coml
Source: PO_101&102.exe, 00000001.00000003.309471550.0000000006450000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.com
Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers
Source: PO_101&102.exe, 00000001.00000003.290680081.0000000006459000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers&
Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers/?
Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers8
Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers?
Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designersG
Source: PO_101&102.exe, 00000001.00000003.309471550.0000000006450000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.com5
Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmp String found in binary or memory: http://www.fonts.com
Source: PO_101&102.exe, 00000001.00000003.285166630.000000000646B000.00000004.00000001.sdmp String found in binary or memory: http://www.fonts.com-u
Source: PO_101&102.exe, 00000001.00000003.285166630.000000000646B000.00000004.00000001.sdmp String found in binary or memory: http://www.fonts.com-uI
Source: PO_101&102.exe, 00000001.00000003.285275223.000000000646B000.00000004.00000001.sdmp String found in binary or memory: http://www.fonts.comn
Source: PO_101&102.exe, 00000001.00000003.287344198.0000000006454000.00000004.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cn
Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cn/bThe
Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cn/cThe
Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmp String found in binary or memory: http://www.galapagosdesign.com/DPlease
Source: PO_101&102.exe, 00000001.00000003.309471550.0000000006450000.00000004.00000001.sdmp, PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmp String found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmp String found in binary or memory: http://www.goodfont.co.kr
Source: PO_101&102.exe, 00000001.00000003.288893237.0000000006454000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/
Source: PO_101&102.exe, 00000001.00000003.288893237.0000000006454000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/0
Source: PO_101&102.exe, 00000001.00000003.288893237.0000000006454000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/9
Source: PO_101&102.exe, 00000001.00000003.288893237.0000000006454000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/H
Source: PO_101&102.exe, 00000001.00000003.288893237.0000000006454000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/c
Source: PO_101&102.exe, 00000001.00000003.288893237.0000000006454000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
Source: PO_101&102.exe, 00000001.00000003.288893237.0000000006454000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/jp/_
Source: PO_101&102.exe, 00000001.00000003.285223985.0000000006474000.00000004.00000001.sdmp, PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmp String found in binary or memory: http://www.sajatypeworks.com
Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmp String found in binary or memory: http://www.sakkal.com
Source: PO_101&102.exe, 00000001.00000003.286605823.0000000006456000.00000004.00000001.sdmp String found in binary or memory: http://www.sandoll.co.kr
Source: PO_101&102.exe, 00000001.00000003.286605823.0000000006456000.00000004.00000001.sdmp String found in binary or memory: http://www.sandoll.co.krE
Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmp String found in binary or memory: http://www.tiro.com
Source: PO_101&102.exe, 00000001.00000003.285531786.000000000646B000.00000004.00000001.sdmp String found in binary or memory: http://www.tiro.comF
Source: PO_101&102.exe, 00000001.00000003.285505347.000000000646B000.00000004.00000001.sdmp String found in binary or memory: http://www.tiro.comn
Source: PO_101&102.exe, 00000001.00000003.286197487.000000000646B000.00000004.00000001.sdmp String found in binary or memory: http://www.tiro.comy
Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmp String found in binary or memory: http://www.typography.netD
Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmp String found in binary or memory: http://www.urwpp.deDPlease
Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmp String found in binary or memory: http://www.zhongyicts.com.cn
Source: svchost.exe, 0000000F.00000002.561711505.000000000411F000.00000004.00020000.sdmp String found in binary or memory: https://www.reynbetgirisi.com/snr6/?jDH8=E19JCPWLLAvTbcnEEa/roDJkoR1wzkcHqaxLe1hmnUekSrF
Source: unknown DNS traffic detected: queries for: www.reynbetgirisi.com
Source: global traffic HTTP traffic detected: GET /snr6/?jDH8=E19JCPWLLAvTbcnEEa/roDJkoR1wzkcHqaxLe1hmnUekSrF+l+57NdrJs1Xds1ailiks&l0D0=fJBTE HTTP/1.1Host: www.reynbetgirisi.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Creates a DirectInput object (often for capturing keystrokes)
Source: PO_101&102.exe, 00000001.00000002.310356859.000000000175A000.00000004.00000020.sdmp Binary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

E-Banking Fraud:

barindex
Yara detected FormBook
Source: Yara match File source: 10.2.PO_101&102.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.0.PO_101&102.exe.400000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.0.PO_101&102.exe.400000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.0.PO_101&102.exe.400000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.0.PO_101&102.exe.400000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.PO_101&102.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.PO_101&102.exe.45ada08.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.0.PO_101&102.exe.400000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000A.00000000.307243585.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.371409464.0000000001530000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.558614233.0000000002E40000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.312254656.0000000004500000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.555083742.00000000001A0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.559409706.0000000002F40000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000000.352889129.0000000007949000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.370759398.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000000.335987438.0000000007949000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.371246188.0000000001500000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000000.308236166.0000000000400000.00000040.00000001.sdmp, type: MEMORY

System Summary:

barindex
Malicious sample detected (through community Yara rule)
Source: 10.2.PO_101&102.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 10.2.PO_101&102.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 10.0.PO_101&102.exe.400000.8.raw.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 10.0.PO_101&102.exe.400000.8.raw.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 10.0.PO_101&102.exe.400000.4.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 10.0.PO_101&102.exe.400000.4.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 10.0.PO_101&102.exe.400000.6.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 10.0.PO_101&102.exe.400000.6.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 10.0.PO_101&102.exe.400000.6.raw.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 10.0.PO_101&102.exe.400000.6.raw.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 10.2.PO_101&102.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 10.2.PO_101&102.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 1.2.PO_101&102.exe.45ada08.2.raw.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 1.2.PO_101&102.exe.45ada08.2.raw.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 10.0.PO_101&102.exe.400000.8.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 10.0.PO_101&102.exe.400000.8.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 0000000A.00000000.307243585.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 0000000A.00000000.307243585.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 0000000A.00000002.371409464.0000000001530000.00000040.00020000.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 0000000A.00000002.371409464.0000000001530000.00000040.00020000.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 0000000F.00000002.558614233.0000000002E40000.00000040.00020000.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 0000000F.00000002.558614233.0000000002E40000.00000040.00020000.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000001.00000002.312254656.0000000004500000.00000004.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000001.00000002.312254656.0000000004500000.00000004.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 0000000F.00000002.555083742.00000000001A0000.00000004.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 0000000F.00000002.555083742.00000000001A0000.00000004.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 0000000F.00000002.559409706.0000000002F40000.00000040.00020000.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 0000000F.00000002.559409706.0000000002F40000.00000040.00020000.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 0000000B.00000000.352889129.0000000007949000.00000040.00020000.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 0000000B.00000000.352889129.0000000007949000.00000040.00020000.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 0000000A.00000002.370759398.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 0000000A.00000002.370759398.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 0000000B.00000000.335987438.0000000007949000.00000040.00020000.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 0000000B.00000000.335987438.0000000007949000.00000040.00020000.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 0000000A.00000002.371246188.0000000001500000.00000040.00020000.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 0000000A.00000002.371246188.0000000001500000.00000040.00020000.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 0000000A.00000000.308236166.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 0000000A.00000000.308236166.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Initial sample is a PE file and has a suspicious name
Source: initial sample Static PE information: Filename: PO_101&102.exe
Uses 32bit PE files
Source: PO_101&102.exe Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Yara signature match
Source: 10.2.PO_101&102.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 10.2.PO_101&102.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 10.0.PO_101&102.exe.400000.8.raw.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 10.0.PO_101&102.exe.400000.8.raw.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 10.0.PO_101&102.exe.400000.4.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 10.0.PO_101&102.exe.400000.4.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 10.0.PO_101&102.exe.400000.6.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 10.0.PO_101&102.exe.400000.6.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 10.0.PO_101&102.exe.400000.6.raw.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 10.0.PO_101&102.exe.400000.6.raw.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 10.2.PO_101&102.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 10.2.PO_101&102.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 1.2.PO_101&102.exe.45ada08.2.raw.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 1.2.PO_101&102.exe.45ada08.2.raw.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 10.0.PO_101&102.exe.400000.8.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 10.0.PO_101&102.exe.400000.8.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 0000000A.00000000.307243585.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 0000000A.00000000.307243585.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 0000000A.00000002.371409464.0000000001530000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 0000000A.00000002.371409464.0000000001530000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 0000000F.00000002.558614233.0000000002E40000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 0000000F.00000002.558614233.0000000002E40000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000001.00000002.312254656.0000000004500000.00000004.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000001.00000002.312254656.0000000004500000.00000004.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 0000000F.00000002.555083742.00000000001A0000.00000004.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 0000000F.00000002.555083742.00000000001A0000.00000004.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 0000000F.00000002.559409706.0000000002F40000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 0000000F.00000002.559409706.0000000002F40000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 0000000B.00000000.352889129.0000000007949000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 0000000B.00000000.352889129.0000000007949000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 0000000A.00000002.370759398.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 0000000A.00000002.370759398.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 0000000B.00000000.335987438.0000000007949000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 0000000B.00000000.335987438.0000000007949000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 0000000A.00000002.371246188.0000000001500000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 0000000A.00000002.371246188.0000000001500000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 0000000A.00000000.308236166.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 0000000A.00000000.308236166.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Detected potential crypto function
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_00FA0E25 1_2_00FA0E25
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_0199D4E1 1_2_0199D4E1
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_0199C2B0 1_2_0199C2B0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_01999968 1_2_01999968
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_05A2D4E8 1_2_05A2D4E8
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07BD27B0 1_2_07BD27B0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07BD73F8 1_2_07BD73F8
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07BD8AB0 1_2_07BD8AB0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07BD1990 1_2_07BD1990
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07BD8080 1_2_07BD8080
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07BDC0E8 1_2_07BDC0E8
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07BD6818 1_2_07BD6818
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07BDCBA8 1_2_07BDCBA8
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07BD73CA 1_2_07BD73CA
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07BDBF08 1_2_07BDBF08
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07BD8AA0 1_2_07BD8AA0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07BDBA88 1_2_07BDBA88
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07BD1982 1_2_07BD1982
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07BDF8A0 1_2_07BDF8A0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07BDA890 1_2_07BDA890
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07BDBCE0 1_2_07BDBCE0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07BD680A 1_2_07BD680A
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07BD8070 1_2_07BD8070
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07DF0948 1_2_07DF0948
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07DF1030 1_2_07DF1030
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07DF3619 1_2_07DF3619
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07DF0E10 1_2_07DF0E10
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07DF3628 1_2_07DF3628
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07DF1319 1_2_07DF1319
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07DF3B11 1_2_07DF3B11
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07DF1328 1_2_07DF1328
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07DF3B20 1_2_07DF3B20
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07DF1950 1_2_07DF1950
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07DF0938 1_2_07DF0938
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07DF1925 1_2_07DF1925
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07DF0040 1_2_07DF0040
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07DF0025 1_2_07DF0025
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 9_2_00190E25 9_2_00190E25
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_00401030 10_2_00401030
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0041E83A 10_2_0041E83A
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0041DD3A 10_2_0041DD3A
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0041EDC6 10_2_0041EDC6
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0041E5DB 10_2_0041E5DB
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_00402D87 10_2_00402D87
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_00402D90 10_2_00402D90
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0041D5A6 10_2_0041D5A6
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_00409E60 10_2_00409E60
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_00402FB0 10_2_00402FB0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_00B00E25 10_2_00B00E25
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01644120 10_2_01644120
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0162F900 10_2_0162F900
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016499BF 10_2_016499BF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016FE824 10_2_016FE824
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A830 10_2_0164A830
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E1002 10_2_016E1002
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016F28EC 10_2_016F28EC
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016520A0 10_2_016520A0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016F20A8 10_2_016F20A8
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0163B090 10_2_0163B090
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016CCB4F 10_2_016CCB4F
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164AB40 10_2_0164AB40
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016F2B28 10_2_016F2B28
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A309 10_2_0164A309
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016D23E3 10_2_016D23E3
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E03DA 10_2_016E03DA
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016EDBD2 10_2_016EDBD2
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165ABD8 10_2_0165ABD8
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165EBB0 10_2_0165EBB0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165138B 10_2_0165138B
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164EB9A 10_2_0164EB9A
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016DFA2B 10_2_016DFA2B
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164B236 10_2_0164B236
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E4AEF 10_2_016E4AEF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016F22AE 10_2_016F22AE
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016F1D55 10_2_016F1D55
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01620D20 10_2_01620D20
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016F2D07 10_2_016F2D07
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0163D5E0 10_2_0163D5E0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016F25DD 10_2_016F25DD
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01652581 10_2_01652581
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E2D82 10_2_016E2D82
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016ED466 10_2_016ED466
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164B477 10_2_0164B477
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0163841F 10_2_0163841F
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E4496 10_2_016E4496
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016F1FF1 10_2_016F1FF1
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016FDFCE 10_2_016FDFCE
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01646E30 10_2_01646E30
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016ED616 10_2_016ED616
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016F2EF7 10_2_016F2EF7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374AB40 15_2_0374AB40
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037F2B28 15_2_037F2B28
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A309 15_2_0374A309
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037D23E3 15_2_037D23E3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037E03DA 15_2_037E03DA
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037EDBD2 15_2_037EDBD2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0375ABD8 15_2_0375ABD8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0375EBB0 15_2_0375EBB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037DFA2B 15_2_037DFA2B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037E4AEF 15_2_037E4AEF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037F22AE 15_2_037F22AE
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03744120 15_2_03744120
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0372F900 15_2_0372F900
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037499BF 15_2_037499BF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A830 15_2_0374A830
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037FE824 15_2_037FE824
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037E1002 15_2_037E1002
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037F28EC 15_2_037F28EC
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037520A0 15_2_037520A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037F20A8 15_2_037F20A8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0373B090 15_2_0373B090
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037F1FF1 15_2_037F1FF1
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037FDFCE 15_2_037FDFCE
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03746E30 15_2_03746E30
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037ED616 15_2_037ED616
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037F2EF7 15_2_037F2EF7
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037F1D55 15_2_037F1D55
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03720D20 15_2_03720D20
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037F2D07 15_2_037F2D07
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0373D5E0 15_2_0373D5E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037F25DD 15_2_037F25DD
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03752581 15_2_03752581
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037E2D82 15_2_037E2D82
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037ED466 15_2_037ED466
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0373841F 15_2_0373841F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037E4496 15_2_037E4496
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_02F5E83A 15_2_02F5E83A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_02F49E60 15_2_02F49E60
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_02F42FB0 15_2_02F42FB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_02F5E5DB 15_2_02F5E5DB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_02F5D5A6 15_2_02F5D5A6
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_02F42D90 15_2_02F42D90
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_02F42D87 15_2_02F42D87
Found potential string decryption / allocating functions
Source: C:\Windows\SysWOW64\svchost.exe Code function: String function: 0372B150 appears 133 times
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: String function: 0162B150 appears 139 times
Contains functionality to call native functions
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0041A360 NtCreateFile, 10_2_0041A360
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0041A410 NtReadFile, 10_2_0041A410
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0041A490 NtClose, 10_2_0041A490
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0041A540 NtAllocateVirtualMemory, 10_2_0041A540
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0041A40D NtReadFile, 10_2_0041A40D
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0041A48B NtClose, 10_2_0041A48B
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0041A53C NtAllocateVirtualMemory, 10_2_0041A53C
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01669910 NtAdjustPrivilegesToken,LdrInitializeThunk, 10_2_01669910
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016699A0 NtCreateSection,LdrInitializeThunk, 10_2_016699A0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01669860 NtQuerySystemInformation,LdrInitializeThunk, 10_2_01669860
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01669840 NtDelayExecution,LdrInitializeThunk, 10_2_01669840
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016698F0 NtReadVirtualMemory,LdrInitializeThunk, 10_2_016698F0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01669A50 NtCreateFile,LdrInitializeThunk, 10_2_01669A50
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01669A20 NtResumeThread,LdrInitializeThunk, 10_2_01669A20
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01669A00 NtProtectVirtualMemory,LdrInitializeThunk, 10_2_01669A00
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01669540 NtReadFile,LdrInitializeThunk, 10_2_01669540
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016695D0 NtClose,LdrInitializeThunk, 10_2_016695D0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01669710 NtQueryInformationToken,LdrInitializeThunk, 10_2_01669710
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016697A0 NtUnmapViewOfSection,LdrInitializeThunk, 10_2_016697A0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01669780 NtMapViewOfSection,LdrInitializeThunk, 10_2_01669780
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01669660 NtAllocateVirtualMemory,LdrInitializeThunk, 10_2_01669660
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016696E0 NtFreeVirtualMemory,LdrInitializeThunk, 10_2_016696E0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01669950 NtQueueApcThread, 10_2_01669950
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016699D0 NtCreateProcessEx, 10_2_016699D0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0166B040 NtSuspendThread, 10_2_0166B040
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01669820 NtEnumerateKey, 10_2_01669820
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016698A0 NtWriteVirtualMemory, 10_2_016698A0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01669B00 NtSetValueKey, 10_2_01669B00
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0166A3B0 NtGetContextThread, 10_2_0166A3B0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01669A10 NtQuerySection, 10_2_01669A10
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01669A80 NtOpenDirectoryObject, 10_2_01669A80
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01669560 NtWriteFile, 10_2_01669560
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01669520 NtWaitForSingleObject, 10_2_01669520
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0166AD30 NtSetContextThread, 10_2_0166AD30
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016695F0 NtQueryInformationFile, 10_2_016695F0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01669760 NtOpenProcess, 10_2_01669760
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0166A770 NtOpenThread, 10_2_0166A770
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01669770 NtSetInformationFile, 10_2_01669770
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01669730 NtQueryVirtualMemory, 10_2_01669730
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0166A710 NtOpenProcessToken, 10_2_0166A710
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01669FE0 NtCreateMutant, 10_2_01669FE0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01669670 NtQueryInformationProcess, 10_2_01669670
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01669650 NtQueryValueKey, 10_2_01669650
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01669610 NtEnumerateValueKey, 10_2_01669610
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016696D0 NtCreateKey, 10_2_016696D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03769A50 NtCreateFile,LdrInitializeThunk, 15_2_03769A50
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03769910 NtAdjustPrivilegesToken,LdrInitializeThunk, 15_2_03769910
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037699A0 NtCreateSection,LdrInitializeThunk, 15_2_037699A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03769860 NtQuerySystemInformation,LdrInitializeThunk, 15_2_03769860
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03769840 NtDelayExecution,LdrInitializeThunk, 15_2_03769840
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03769710 NtQueryInformationToken,LdrInitializeThunk, 15_2_03769710
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03769FE0 NtCreateMutant,LdrInitializeThunk, 15_2_03769FE0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03769780 NtMapViewOfSection,LdrInitializeThunk, 15_2_03769780
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03769660 NtAllocateVirtualMemory,LdrInitializeThunk, 15_2_03769660
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03769650 NtQueryValueKey,LdrInitializeThunk, 15_2_03769650
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037696E0 NtFreeVirtualMemory,LdrInitializeThunk, 15_2_037696E0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037696D0 NtCreateKey,LdrInitializeThunk, 15_2_037696D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03769540 NtReadFile,LdrInitializeThunk, 15_2_03769540
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037695D0 NtClose,LdrInitializeThunk, 15_2_037695D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03769B00 NtSetValueKey, 15_2_03769B00
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0376A3B0 NtGetContextThread, 15_2_0376A3B0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03769A20 NtResumeThread, 15_2_03769A20
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03769A10 NtQuerySection, 15_2_03769A10
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03769A00 NtProtectVirtualMemory, 15_2_03769A00
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03769A80 NtOpenDirectoryObject, 15_2_03769A80
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03769950 NtQueueApcThread, 15_2_03769950
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037699D0 NtCreateProcessEx, 15_2_037699D0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0376B040 NtSuspendThread, 15_2_0376B040
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03769820 NtEnumerateKey, 15_2_03769820
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037698F0 NtReadVirtualMemory, 15_2_037698F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037698A0 NtWriteVirtualMemory, 15_2_037698A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0376A770 NtOpenThread, 15_2_0376A770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03769770 NtSetInformationFile, 15_2_03769770
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03769760 NtOpenProcess, 15_2_03769760
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03769730 NtQueryVirtualMemory, 15_2_03769730
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0376A710 NtOpenProcessToken, 15_2_0376A710
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037697A0 NtUnmapViewOfSection, 15_2_037697A0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03769670 NtQueryInformationProcess, 15_2_03769670
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03769610 NtEnumerateValueKey, 15_2_03769610
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03769560 NtWriteFile, 15_2_03769560
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0376AD30 NtSetContextThread, 15_2_0376AD30
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03769520 NtWaitForSingleObject, 15_2_03769520
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037695F0 NtQueryInformationFile, 15_2_037695F0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_02F5A360 NtCreateFile, 15_2_02F5A360
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_02F5A490 NtClose, 15_2_02F5A490
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_02F5A410 NtReadFile, 15_2_02F5A410
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_02F5A540 NtAllocateVirtualMemory, 15_2_02F5A540
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_02F5A48B NtClose, 15_2_02F5A48B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_02F5A40D NtReadFile, 15_2_02F5A40D
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_02F5A53C NtAllocateVirtualMemory, 15_2_02F5A53C
Sample file is different than original file name gathered from version info
Source: PO_101&102.exe, 00000001.00000002.312254656.0000000004500000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameMajorRevision.exe< vs PO_101&102.exe
Source: PO_101&102.exe, 00000001.00000002.311135246.00000000033C1000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameBunifu.UI.dll4 vs PO_101&102.exe
Source: PO_101&102.exe, 00000001.00000000.282576255.000000000103A000.00000002.00020000.sdmp Binary or memory string: OriginalFilenameenNNpuJ.exe4 vs PO_101&102.exe
Source: PO_101&102.exe, 00000001.00000002.310356859.000000000175A000.00000004.00000020.sdmp Binary or memory string: OriginalFilenameclr.dllT vs PO_101&102.exe
Source: PO_101&102.exe, 00000009.00000000.303163894.000000000022A000.00000002.00020000.sdmp Binary or memory string: OriginalFilenameenNNpuJ.exe4 vs PO_101&102.exe
Source: PO_101&102.exe, 0000000A.00000002.371671376.00000000015BB000.00000040.00020000.sdmp Binary or memory string: OriginalFilenamesvchost.exej% vs PO_101&102.exe
Source: PO_101&102.exe, 0000000A.00000002.372084013.00000000018AF000.00000040.00000001.sdmp Binary or memory string: OriginalFilenamentdll.dllj% vs PO_101&102.exe
Source: PO_101&102.exe, 0000000A.00000000.306435842.0000000000B9A000.00000002.00020000.sdmp Binary or memory string: OriginalFilenameenNNpuJ.exe4 vs PO_101&102.exe
Source: PO_101&102.exe Binary or memory string: OriginalFilenameenNNpuJ.exe4 vs PO_101&102.exe
Source: PO_101&102.exe ReversingLabs: Detection: 35%
Source: PO_101&102.exe Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\PO_101&102.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\PO_101&102.exe 'C:\Users\user\Desktop\PO_101&102.exe'
Source: C:\Users\user\Desktop\PO_101&102.exe Process created: C:\Users\user\Desktop\PO_101&102.exe {path}
Source: C:\Users\user\Desktop\PO_101&102.exe Process created: C:\Users\user\Desktop\PO_101&102.exe {path}
Source: C:\Windows\explorer.exe Process created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe
Source: C:\Windows\SysWOW64\svchost.exe Process created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\PO_101&102.exe'
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\PO_101&102.exe Process created: C:\Users\user\Desktop\PO_101&102.exe {path} Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process created: C:\Users\user\Desktop\PO_101&102.exe {path} Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Process created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\PO_101&102.exe' Jump to behavior
Source: C:\Windows\explorer.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6C3EE638-B588-4D7D-B30A-E7E36759305D}\InprocServer32 Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe File created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO_101&102.exe.log Jump to behavior
Source: classification engine Classification label: mal100.troj.evad.winEXE@9/1@2/1
Source: C:\Users\user\Desktop\PO_101&102.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll Jump to behavior
Source: PO_101&102.exe Joe Sandbox Cloud Basic: Detection: clean Score: 0 Perma Link
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6076:120:WilError_01
Source: C:\Windows\explorer.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\explorer.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe File opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll Jump to behavior
Source: PO_101&102.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: PO_101&102.exe Static PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: wntdll.pdbUGP source: PO_101&102.exe, 0000000A.00000002.371692405.0000000001600000.00000040.00000001.sdmp, svchost.exe, 0000000F.00000002.559918506.0000000003700000.00000040.00000001.sdmp
Source: Binary string: wntdll.pdb source: PO_101&102.exe, svchost.exe
Source: Binary string: svchost.pdb source: PO_101&102.exe, 0000000A.00000002.371642195.00000000015B0000.00000040.00020000.sdmp
Source: Binary string: svchost.pdbUGP source: PO_101&102.exe, 0000000A.00000002.371642195.00000000015B0000.00000040.00020000.sdmp

Data Obfuscation:

barindex
Uses code obfuscation techniques (call, push, ret)
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_00F94FA2 push 00000000h; iretd 1_2_00F94FEC
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_05A29112 push C800055Eh; ret 1_2_05A29121
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_05A290E0 push 5C00005Eh; ret 1_2_05A29101
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_05A22E61 push ecx; ret 1_2_05A22E75
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07BD9ADE push esi; iretd 1_2_07BD9AE5
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07DF2E23 push esi; retf 1_2_07DF2E24
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_07DF850C push FFFFFF8Bh; iretd 1_2_07DF8517
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 9_2_00184FA2 push 00000000h; iretd 9_2_00184FEC
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0041EA41 push eax; ret 10_2_0041EB9B
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_00407B2B pushfd ; iretd 10_2_00407B2C
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0041ABC6 push edx; ret 10_2_0041ABC8
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_00417C75 push eax; ret 10_2_00417C8B
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_004164E9 push ebx; iretd 10_2_004164F2
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0041D4B5 push eax; ret 10_2_0041D508
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0041656B push esp; iretd 10_2_0041656C
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0041D56C push eax; ret 10_2_0041D572
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0041D502 push eax; ret 10_2_0041D508
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0041D50B push eax; ret 10_2_0041D572
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0041DD3A push eax; ret 10_2_0041DB23
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0041D5A6 push eax; ret 10_2_0041DB23
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_00403633 push eax; iretd 10_2_0040363E
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_00AF4FA2 push 00000000h; iretd 10_2_00AF4FEC
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0167D0D1 push ecx; ret 10_2_0167D0E4
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0377D0D1 push ecx; ret 15_2_0377D0E4
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_02F5EA41 push eax; ret 15_2_02F5EB9B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_02F5ABC6 push edx; ret 15_2_02F5ABC8
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_02F47B2B pushfd ; iretd 15_2_02F47B2C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_02F43633 push eax; iretd 15_2_02F4363E
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_02F564E9 push ebx; iretd 15_2_02F564F2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_02F5D4B5 push eax; ret 15_2_02F5D508
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_02F57C75 push eax; ret 15_2_02F57C8B
Source: initial sample Static PE information: section name: .text entropy: 7.43588694795

Hooking and other Techniques for Hiding and Protection:

barindex
Modifies the prolog of user mode functions (user mode inline hooks)
Source: explorer.exe User mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x81 0x1E 0xE3
Self deletion via cmd delete
Source: C:\Windows\SysWOW64\svchost.exe Process created: /c del 'C:\Users\user\Desktop\PO_101&102.exe'
Source: C:\Windows\SysWOW64\svchost.exe Process created: /c del 'C:\Users\user\Desktop\PO_101&102.exe' Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion:

barindex
Yara detected AntiVM3
Source: Yara match File source: Process Memory Space: PO_101&102.exe PID: 7016, type: MEMORYSTR
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Source: PO_101&102.exe, 00000001.00000002.311209437.0000000003420000.00000004.00000001.sdmp Binary or memory string: WINE_GET_UNIX_FILE_NAME
Source: PO_101&102.exe, 00000001.00000002.311209437.0000000003420000.00000004.00000001.sdmp Binary or memory string: SBIEDLL.DLL
Tries to detect virtualization through RDTSC time measurements
Source: C:\Users\user\Desktop\PO_101&102.exe RDTSC instruction interceptor: First address: 0000000000409904 second address: 000000000040990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\PO_101&102.exe RDTSC instruction interceptor: First address: 0000000000409B7E second address: 0000000000409B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
Source: C:\Windows\SysWOW64\svchost.exe RDTSC instruction interceptor: First address: 0000000002F49904 second address: 0000000002F4990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
Source: C:\Windows\SysWOW64\svchost.exe RDTSC instruction interceptor: First address: 0000000002F49B7E second address: 0000000002F49B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
May sleep (evasive loops) to hinder dynamic analysis
Source: C:\Users\user\Desktop\PO_101&102.exe TID: 7076 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Windows\explorer.exe TID: 4292 Thread sleep time: -36000s >= -30000s Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe TID: 4908 Thread sleep time: -34000s >= -30000s Jump to behavior
Sample execution stops while process was sleeping (likely an evasion)
Source: C:\Windows\explorer.exe Last function: Thread delayed
Source: C:\Windows\SysWOW64\svchost.exe Last function: Thread delayed
Contains functionality for execution timing, often used to detect debuggers
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_00409AB0 rdtsc 10_2_00409AB0
Contains long sleeps (>= 3 min)
Source: C:\Users\user\Desktop\PO_101&102.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Contains functionality to detect virtual machines (SGDT)
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 1_2_00F9A8FF sgdt fword ptr [eax] 1_2_00F9A8FF
Source: C:\Users\user\Desktop\PO_101&102.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: PO_101&102.exe, 00000001.00000002.311209437.0000000003420000.00000004.00000001.sdmp Binary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
Source: explorer.exe, 0000000B.00000000.321646424.00000000086C9000.00000004.00000001.sdmp Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
Source: PO_101&102.exe, 00000001.00000002.311209437.0000000003420000.00000004.00000001.sdmp Binary or memory string: vmware
Source: explorer.exe, 0000000B.00000000.353798297.0000000008778000.00000004.00000001.sdmp Binary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000}
Source: PO_101&102.exe, 00000001.00000002.311209437.0000000003420000.00000004.00000001.sdmp Binary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: PO_101&102.exe, 00000001.00000002.311209437.0000000003420000.00000004.00000001.sdmp Binary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
Source: explorer.exe, 0000000B.00000000.319717839.00000000067C2000.00000004.00000001.sdmp Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: explorer.exe, 0000000B.00000000.321646424.00000000086C9000.00000004.00000001.sdmp Binary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}&
Source: explorer.exe, 0000000B.00000000.319717839.00000000067C2000.00000004.00000001.sdmp Binary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000m32)
Source: PO_101&102.exe, 00000001.00000002.311209437.0000000003420000.00000004.00000001.sdmp Binary or memory string: VMWARE
Source: PO_101&102.exe, 00000001.00000002.311209437.0000000003420000.00000004.00000001.sdmp Binary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: PO_101&102.exe, 00000001.00000002.311209437.0000000003420000.00000004.00000001.sdmp Binary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
Source: PO_101&102.exe, 00000001.00000002.311209437.0000000003420000.00000004.00000001.sdmp Binary or memory string: VMware SVGA II
Source: PO_101&102.exe, 00000001.00000002.311209437.0000000003420000.00000004.00000001.sdmp Binary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
Source: explorer.exe, 0000000B.00000000.321646424.00000000086C9000.00000004.00000001.sdmp Binary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000

Anti Debugging:

barindex
Contains functionality for execution timing, often used to detect debuggers
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_00409AB0 rdtsc 10_2_00409AB0
Enables debug privileges
Source: C:\Users\user\Desktop\PO_101&102.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process token adjusted: Debug Jump to behavior
Contains functionality to read the PEB
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0162C962 mov eax, dword ptr fs:[00000030h] 10_2_0162C962
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0162B171 mov eax, dword ptr fs:[00000030h] 10_2_0162B171
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0162B171 mov eax, dword ptr fs:[00000030h] 10_2_0162B171
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164B944 mov eax, dword ptr fs:[00000030h] 10_2_0164B944
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164B944 mov eax, dword ptr fs:[00000030h] 10_2_0164B944
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01644120 mov eax, dword ptr fs:[00000030h] 10_2_01644120
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01644120 mov eax, dword ptr fs:[00000030h] 10_2_01644120
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01644120 mov eax, dword ptr fs:[00000030h] 10_2_01644120
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01644120 mov eax, dword ptr fs:[00000030h] 10_2_01644120
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01644120 mov ecx, dword ptr fs:[00000030h] 10_2_01644120
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165513A mov eax, dword ptr fs:[00000030h] 10_2_0165513A
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165513A mov eax, dword ptr fs:[00000030h] 10_2_0165513A
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01629100 mov eax, dword ptr fs:[00000030h] 10_2_01629100
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01629100 mov eax, dword ptr fs:[00000030h] 10_2_01629100
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01629100 mov eax, dword ptr fs:[00000030h] 10_2_01629100
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016B41E8 mov eax, dword ptr fs:[00000030h] 10_2_016B41E8
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0162B1E1 mov eax, dword ptr fs:[00000030h] 10_2_0162B1E1
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0162B1E1 mov eax, dword ptr fs:[00000030h] 10_2_0162B1E1
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0162B1E1 mov eax, dword ptr fs:[00000030h] 10_2_0162B1E1
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016561A0 mov eax, dword ptr fs:[00000030h] 10_2_016561A0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016561A0 mov eax, dword ptr fs:[00000030h] 10_2_016561A0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E49A4 mov eax, dword ptr fs:[00000030h] 10_2_016E49A4
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E49A4 mov eax, dword ptr fs:[00000030h] 10_2_016E49A4
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E49A4 mov eax, dword ptr fs:[00000030h] 10_2_016E49A4
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E49A4 mov eax, dword ptr fs:[00000030h] 10_2_016E49A4
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016A69A6 mov eax, dword ptr fs:[00000030h] 10_2_016A69A6
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016A51BE mov eax, dword ptr fs:[00000030h] 10_2_016A51BE
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016A51BE mov eax, dword ptr fs:[00000030h] 10_2_016A51BE
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016A51BE mov eax, dword ptr fs:[00000030h] 10_2_016A51BE
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016A51BE mov eax, dword ptr fs:[00000030h] 10_2_016A51BE
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016499BF mov ecx, dword ptr fs:[00000030h] 10_2_016499BF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016499BF mov ecx, dword ptr fs:[00000030h] 10_2_016499BF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016499BF mov eax, dword ptr fs:[00000030h] 10_2_016499BF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016499BF mov ecx, dword ptr fs:[00000030h] 10_2_016499BF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016499BF mov ecx, dword ptr fs:[00000030h] 10_2_016499BF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016499BF mov eax, dword ptr fs:[00000030h] 10_2_016499BF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016499BF mov ecx, dword ptr fs:[00000030h] 10_2_016499BF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016499BF mov ecx, dword ptr fs:[00000030h] 10_2_016499BF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016499BF mov eax, dword ptr fs:[00000030h] 10_2_016499BF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016499BF mov ecx, dword ptr fs:[00000030h] 10_2_016499BF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016499BF mov ecx, dword ptr fs:[00000030h] 10_2_016499BF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016499BF mov eax, dword ptr fs:[00000030h] 10_2_016499BF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165A185 mov eax, dword ptr fs:[00000030h] 10_2_0165A185
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164C182 mov eax, dword ptr fs:[00000030h] 10_2_0164C182
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01652990 mov eax, dword ptr fs:[00000030h] 10_2_01652990
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016F1074 mov eax, dword ptr fs:[00000030h] 10_2_016F1074
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E2073 mov eax, dword ptr fs:[00000030h] 10_2_016E2073
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01640050 mov eax, dword ptr fs:[00000030h] 10_2_01640050
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01640050 mov eax, dword ptr fs:[00000030h] 10_2_01640050
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165002D mov eax, dword ptr fs:[00000030h] 10_2_0165002D
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165002D mov eax, dword ptr fs:[00000030h] 10_2_0165002D
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165002D mov eax, dword ptr fs:[00000030h] 10_2_0165002D
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165002D mov eax, dword ptr fs:[00000030h] 10_2_0165002D
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165002D mov eax, dword ptr fs:[00000030h] 10_2_0165002D
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0163B02A mov eax, dword ptr fs:[00000030h] 10_2_0163B02A
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0163B02A mov eax, dword ptr fs:[00000030h] 10_2_0163B02A
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0163B02A mov eax, dword ptr fs:[00000030h] 10_2_0163B02A
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0163B02A mov eax, dword ptr fs:[00000030h] 10_2_0163B02A
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A830 mov eax, dword ptr fs:[00000030h] 10_2_0164A830
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A830 mov eax, dword ptr fs:[00000030h] 10_2_0164A830
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A830 mov eax, dword ptr fs:[00000030h] 10_2_0164A830
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A830 mov eax, dword ptr fs:[00000030h] 10_2_0164A830
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016F4015 mov eax, dword ptr fs:[00000030h] 10_2_016F4015
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016F4015 mov eax, dword ptr fs:[00000030h] 10_2_016F4015
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016A7016 mov eax, dword ptr fs:[00000030h] 10_2_016A7016
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016A7016 mov eax, dword ptr fs:[00000030h] 10_2_016A7016
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016A7016 mov eax, dword ptr fs:[00000030h] 10_2_016A7016
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164B8E4 mov eax, dword ptr fs:[00000030h] 10_2_0164B8E4
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164B8E4 mov eax, dword ptr fs:[00000030h] 10_2_0164B8E4
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016240E1 mov eax, dword ptr fs:[00000030h] 10_2_016240E1
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016240E1 mov eax, dword ptr fs:[00000030h] 10_2_016240E1
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016240E1 mov eax, dword ptr fs:[00000030h] 10_2_016240E1
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016258EC mov eax, dword ptr fs:[00000030h] 10_2_016258EC
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016BB8D0 mov eax, dword ptr fs:[00000030h] 10_2_016BB8D0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016BB8D0 mov ecx, dword ptr fs:[00000030h] 10_2_016BB8D0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016BB8D0 mov eax, dword ptr fs:[00000030h] 10_2_016BB8D0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016BB8D0 mov eax, dword ptr fs:[00000030h] 10_2_016BB8D0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016BB8D0 mov eax, dword ptr fs:[00000030h] 10_2_016BB8D0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016BB8D0 mov eax, dword ptr fs:[00000030h] 10_2_016BB8D0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016520A0 mov eax, dword ptr fs:[00000030h] 10_2_016520A0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016520A0 mov eax, dword ptr fs:[00000030h] 10_2_016520A0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016520A0 mov eax, dword ptr fs:[00000030h] 10_2_016520A0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016520A0 mov eax, dword ptr fs:[00000030h] 10_2_016520A0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016520A0 mov eax, dword ptr fs:[00000030h] 10_2_016520A0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016520A0 mov eax, dword ptr fs:[00000030h] 10_2_016520A0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016690AF mov eax, dword ptr fs:[00000030h] 10_2_016690AF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165F0BF mov ecx, dword ptr fs:[00000030h] 10_2_0165F0BF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165F0BF mov eax, dword ptr fs:[00000030h] 10_2_0165F0BF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165F0BF mov eax, dword ptr fs:[00000030h] 10_2_0165F0BF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01629080 mov eax, dword ptr fs:[00000030h] 10_2_01629080
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016A3884 mov eax, dword ptr fs:[00000030h] 10_2_016A3884
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016A3884 mov eax, dword ptr fs:[00000030h] 10_2_016A3884
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0162DB60 mov ecx, dword ptr fs:[00000030h] 10_2_0162DB60
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01653B7A mov eax, dword ptr fs:[00000030h] 10_2_01653B7A
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01653B7A mov eax, dword ptr fs:[00000030h] 10_2_01653B7A
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0162DB40 mov eax, dword ptr fs:[00000030h] 10_2_0162DB40
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016F8B58 mov eax, dword ptr fs:[00000030h] 10_2_016F8B58
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0162F358 mov eax, dword ptr fs:[00000030h] 10_2_0162F358
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h] 10_2_0164A309
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h] 10_2_0164A309
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h] 10_2_0164A309
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h] 10_2_0164A309
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h] 10_2_0164A309
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h] 10_2_0164A309
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h] 10_2_0164A309
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h] 10_2_0164A309
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h] 10_2_0164A309
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h] 10_2_0164A309
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h] 10_2_0164A309
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h] 10_2_0164A309
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h] 10_2_0164A309
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h] 10_2_0164A309
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h] 10_2_0164A309
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h] 10_2_0164A309
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h] 10_2_0164A309
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h] 10_2_0164A309
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h] 10_2_0164A309
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h] 10_2_0164A309
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h] 10_2_0164A309
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E131B mov eax, dword ptr fs:[00000030h] 10_2_016E131B
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016503E2 mov eax, dword ptr fs:[00000030h] 10_2_016503E2
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016503E2 mov eax, dword ptr fs:[00000030h] 10_2_016503E2
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016503E2 mov eax, dword ptr fs:[00000030h] 10_2_016503E2
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016503E2 mov eax, dword ptr fs:[00000030h] 10_2_016503E2
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016503E2 mov eax, dword ptr fs:[00000030h] 10_2_016503E2
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016503E2 mov eax, dword ptr fs:[00000030h] 10_2_016503E2
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164DBE9 mov eax, dword ptr fs:[00000030h] 10_2_0164DBE9
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016D23E3 mov ecx, dword ptr fs:[00000030h] 10_2_016D23E3
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016D23E3 mov ecx, dword ptr fs:[00000030h] 10_2_016D23E3
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016D23E3 mov eax, dword ptr fs:[00000030h] 10_2_016D23E3
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016A53CA mov eax, dword ptr fs:[00000030h] 10_2_016A53CA
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016A53CA mov eax, dword ptr fs:[00000030h] 10_2_016A53CA
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01654BAD mov eax, dword ptr fs:[00000030h] 10_2_01654BAD
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01654BAD mov eax, dword ptr fs:[00000030h] 10_2_01654BAD
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01654BAD mov eax, dword ptr fs:[00000030h] 10_2_01654BAD
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016F5BA5 mov eax, dword ptr fs:[00000030h] 10_2_016F5BA5
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E138A mov eax, dword ptr fs:[00000030h] 10_2_016E138A
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01631B8F mov eax, dword ptr fs:[00000030h] 10_2_01631B8F
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01631B8F mov eax, dword ptr fs:[00000030h] 10_2_01631B8F
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016DD380 mov ecx, dword ptr fs:[00000030h] 10_2_016DD380
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165138B mov eax, dword ptr fs:[00000030h] 10_2_0165138B
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165138B mov eax, dword ptr fs:[00000030h] 10_2_0165138B
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165138B mov eax, dword ptr fs:[00000030h] 10_2_0165138B
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01652397 mov eax, dword ptr fs:[00000030h] 10_2_01652397
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165B390 mov eax, dword ptr fs:[00000030h] 10_2_0165B390
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164EB9A mov eax, dword ptr fs:[00000030h] 10_2_0164EB9A
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164EB9A mov eax, dword ptr fs:[00000030h] 10_2_0164EB9A
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016DB260 mov eax, dword ptr fs:[00000030h] 10_2_016DB260
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016DB260 mov eax, dword ptr fs:[00000030h] 10_2_016DB260
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016F8A62 mov eax, dword ptr fs:[00000030h] 10_2_016F8A62
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0166927A mov eax, dword ptr fs:[00000030h] 10_2_0166927A
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01629240 mov eax, dword ptr fs:[00000030h] 10_2_01629240
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01629240 mov eax, dword ptr fs:[00000030h] 10_2_01629240
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01629240 mov eax, dword ptr fs:[00000030h] 10_2_01629240
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01629240 mov eax, dword ptr fs:[00000030h] 10_2_01629240
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016EEA55 mov eax, dword ptr fs:[00000030h] 10_2_016EEA55
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016B4257 mov eax, dword ptr fs:[00000030h] 10_2_016B4257
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01664A2C mov eax, dword ptr fs:[00000030h] 10_2_01664A2C
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01664A2C mov eax, dword ptr fs:[00000030h] 10_2_01664A2C
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A229 mov eax, dword ptr fs:[00000030h] 10_2_0164A229
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A229 mov eax, dword ptr fs:[00000030h] 10_2_0164A229
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A229 mov eax, dword ptr fs:[00000030h] 10_2_0164A229
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A229 mov eax, dword ptr fs:[00000030h] 10_2_0164A229
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A229 mov eax, dword ptr fs:[00000030h] 10_2_0164A229
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A229 mov eax, dword ptr fs:[00000030h] 10_2_0164A229
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A229 mov eax, dword ptr fs:[00000030h] 10_2_0164A229
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A229 mov eax, dword ptr fs:[00000030h] 10_2_0164A229
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164A229 mov eax, dword ptr fs:[00000030h] 10_2_0164A229
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164B236 mov eax, dword ptr fs:[00000030h] 10_2_0164B236
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164B236 mov eax, dword ptr fs:[00000030h] 10_2_0164B236
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164B236 mov eax, dword ptr fs:[00000030h] 10_2_0164B236
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164B236 mov eax, dword ptr fs:[00000030h] 10_2_0164B236
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164B236 mov eax, dword ptr fs:[00000030h] 10_2_0164B236
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164B236 mov eax, dword ptr fs:[00000030h] 10_2_0164B236
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01638A0A mov eax, dword ptr fs:[00000030h] 10_2_01638A0A
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01625210 mov eax, dword ptr fs:[00000030h] 10_2_01625210
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01625210 mov ecx, dword ptr fs:[00000030h] 10_2_01625210
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01625210 mov eax, dword ptr fs:[00000030h] 10_2_01625210
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01625210 mov eax, dword ptr fs:[00000030h] 10_2_01625210
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0162AA16 mov eax, dword ptr fs:[00000030h] 10_2_0162AA16
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0162AA16 mov eax, dword ptr fs:[00000030h] 10_2_0162AA16
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01643A1C mov eax, dword ptr fs:[00000030h] 10_2_01643A1C
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016EAA16 mov eax, dword ptr fs:[00000030h] 10_2_016EAA16
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016EAA16 mov eax, dword ptr fs:[00000030h] 10_2_016EAA16
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01652AE4 mov eax, dword ptr fs:[00000030h] 10_2_01652AE4
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E4AEF mov eax, dword ptr fs:[00000030h] 10_2_016E4AEF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E4AEF mov eax, dword ptr fs:[00000030h] 10_2_016E4AEF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E4AEF mov eax, dword ptr fs:[00000030h] 10_2_016E4AEF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E4AEF mov eax, dword ptr fs:[00000030h] 10_2_016E4AEF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E4AEF mov eax, dword ptr fs:[00000030h] 10_2_016E4AEF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E4AEF mov eax, dword ptr fs:[00000030h] 10_2_016E4AEF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E4AEF mov eax, dword ptr fs:[00000030h] 10_2_016E4AEF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E4AEF mov eax, dword ptr fs:[00000030h] 10_2_016E4AEF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E4AEF mov eax, dword ptr fs:[00000030h] 10_2_016E4AEF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E4AEF mov eax, dword ptr fs:[00000030h] 10_2_016E4AEF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E4AEF mov eax, dword ptr fs:[00000030h] 10_2_016E4AEF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E4AEF mov eax, dword ptr fs:[00000030h] 10_2_016E4AEF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E4AEF mov eax, dword ptr fs:[00000030h] 10_2_016E4AEF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E4AEF mov eax, dword ptr fs:[00000030h] 10_2_016E4AEF
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01652ACB mov eax, dword ptr fs:[00000030h] 10_2_01652ACB
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016252A5 mov eax, dword ptr fs:[00000030h] 10_2_016252A5
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016252A5 mov eax, dword ptr fs:[00000030h] 10_2_016252A5
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016252A5 mov eax, dword ptr fs:[00000030h] 10_2_016252A5
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016252A5 mov eax, dword ptr fs:[00000030h] 10_2_016252A5
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016252A5 mov eax, dword ptr fs:[00000030h] 10_2_016252A5
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0163AAB0 mov eax, dword ptr fs:[00000030h] 10_2_0163AAB0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0163AAB0 mov eax, dword ptr fs:[00000030h] 10_2_0163AAB0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165FAB0 mov eax, dword ptr fs:[00000030h] 10_2_0165FAB0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165D294 mov eax, dword ptr fs:[00000030h] 10_2_0165D294
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165D294 mov eax, dword ptr fs:[00000030h] 10_2_0165D294
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164C577 mov eax, dword ptr fs:[00000030h] 10_2_0164C577
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164C577 mov eax, dword ptr fs:[00000030h] 10_2_0164C577
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01663D43 mov eax, dword ptr fs:[00000030h] 10_2_01663D43
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016A3540 mov eax, dword ptr fs:[00000030h] 10_2_016A3540
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016D3D40 mov eax, dword ptr fs:[00000030h] 10_2_016D3D40
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01647D50 mov eax, dword ptr fs:[00000030h] 10_2_01647D50
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165F527 mov eax, dword ptr fs:[00000030h] 10_2_0165F527
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165F527 mov eax, dword ptr fs:[00000030h] 10_2_0165F527
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165F527 mov eax, dword ptr fs:[00000030h] 10_2_0165F527
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0162AD30 mov eax, dword ptr fs:[00000030h] 10_2_0162AD30
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01633D34 mov eax, dword ptr fs:[00000030h] 10_2_01633D34
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01633D34 mov eax, dword ptr fs:[00000030h] 10_2_01633D34
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01633D34 mov eax, dword ptr fs:[00000030h] 10_2_01633D34
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01633D34 mov eax, dword ptr fs:[00000030h] 10_2_01633D34
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01633D34 mov eax, dword ptr fs:[00000030h] 10_2_01633D34
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01633D34 mov eax, dword ptr fs:[00000030h] 10_2_01633D34
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01633D34 mov eax, dword ptr fs:[00000030h] 10_2_01633D34
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01633D34 mov eax, dword ptr fs:[00000030h] 10_2_01633D34
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01633D34 mov eax, dword ptr fs:[00000030h] 10_2_01633D34
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01633D34 mov eax, dword ptr fs:[00000030h] 10_2_01633D34
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01633D34 mov eax, dword ptr fs:[00000030h] 10_2_01633D34
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01633D34 mov eax, dword ptr fs:[00000030h] 10_2_01633D34
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01633D34 mov eax, dword ptr fs:[00000030h] 10_2_01633D34
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016EE539 mov eax, dword ptr fs:[00000030h] 10_2_016EE539
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016F8D34 mov eax, dword ptr fs:[00000030h] 10_2_016F8D34
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016AA537 mov eax, dword ptr fs:[00000030h] 10_2_016AA537
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01654D3B mov eax, dword ptr fs:[00000030h] 10_2_01654D3B
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01654D3B mov eax, dword ptr fs:[00000030h] 10_2_01654D3B
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01654D3B mov eax, dword ptr fs:[00000030h] 10_2_01654D3B
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0163D5E0 mov eax, dword ptr fs:[00000030h] 10_2_0163D5E0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0163D5E0 mov eax, dword ptr fs:[00000030h] 10_2_0163D5E0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016EFDE2 mov eax, dword ptr fs:[00000030h] 10_2_016EFDE2
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016EFDE2 mov eax, dword ptr fs:[00000030h] 10_2_016EFDE2
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016EFDE2 mov eax, dword ptr fs:[00000030h] 10_2_016EFDE2
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016EFDE2 mov eax, dword ptr fs:[00000030h] 10_2_016EFDE2
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016D8DF1 mov eax, dword ptr fs:[00000030h] 10_2_016D8DF1
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016A6DC9 mov eax, dword ptr fs:[00000030h] 10_2_016A6DC9
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016A6DC9 mov eax, dword ptr fs:[00000030h] 10_2_016A6DC9
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016A6DC9 mov eax, dword ptr fs:[00000030h] 10_2_016A6DC9
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016A6DC9 mov ecx, dword ptr fs:[00000030h] 10_2_016A6DC9
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016A6DC9 mov eax, dword ptr fs:[00000030h] 10_2_016A6DC9
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016A6DC9 mov eax, dword ptr fs:[00000030h] 10_2_016A6DC9
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016F05AC mov eax, dword ptr fs:[00000030h] 10_2_016F05AC
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016F05AC mov eax, dword ptr fs:[00000030h] 10_2_016F05AC
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016535A1 mov eax, dword ptr fs:[00000030h] 10_2_016535A1
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01651DB5 mov eax, dword ptr fs:[00000030h] 10_2_01651DB5
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01651DB5 mov eax, dword ptr fs:[00000030h] 10_2_01651DB5
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01651DB5 mov eax, dword ptr fs:[00000030h] 10_2_01651DB5
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01652581 mov eax, dword ptr fs:[00000030h] 10_2_01652581
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01652581 mov eax, dword ptr fs:[00000030h] 10_2_01652581
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01652581 mov eax, dword ptr fs:[00000030h] 10_2_01652581
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01652581 mov eax, dword ptr fs:[00000030h] 10_2_01652581
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01622D8A mov eax, dword ptr fs:[00000030h] 10_2_01622D8A
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01622D8A mov eax, dword ptr fs:[00000030h] 10_2_01622D8A
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01622D8A mov eax, dword ptr fs:[00000030h] 10_2_01622D8A
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01622D8A mov eax, dword ptr fs:[00000030h] 10_2_01622D8A
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01622D8A mov eax, dword ptr fs:[00000030h] 10_2_01622D8A
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E2D82 mov eax, dword ptr fs:[00000030h] 10_2_016E2D82
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E2D82 mov eax, dword ptr fs:[00000030h] 10_2_016E2D82
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E2D82 mov eax, dword ptr fs:[00000030h] 10_2_016E2D82
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E2D82 mov eax, dword ptr fs:[00000030h] 10_2_016E2D82
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E2D82 mov eax, dword ptr fs:[00000030h] 10_2_016E2D82
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E2D82 mov eax, dword ptr fs:[00000030h] 10_2_016E2D82
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E2D82 mov eax, dword ptr fs:[00000030h] 10_2_016E2D82
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165FD9B mov eax, dword ptr fs:[00000030h] 10_2_0165FD9B
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165FD9B mov eax, dword ptr fs:[00000030h] 10_2_0165FD9B
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164746D mov eax, dword ptr fs:[00000030h] 10_2_0164746D
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164B477 mov eax, dword ptr fs:[00000030h] 10_2_0164B477
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164B477 mov eax, dword ptr fs:[00000030h] 10_2_0164B477
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164B477 mov eax, dword ptr fs:[00000030h] 10_2_0164B477
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164B477 mov eax, dword ptr fs:[00000030h] 10_2_0164B477
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164B477 mov eax, dword ptr fs:[00000030h] 10_2_0164B477
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164B477 mov eax, dword ptr fs:[00000030h] 10_2_0164B477
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164B477 mov eax, dword ptr fs:[00000030h] 10_2_0164B477
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164B477 mov eax, dword ptr fs:[00000030h] 10_2_0164B477
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164B477 mov eax, dword ptr fs:[00000030h] 10_2_0164B477
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164B477 mov eax, dword ptr fs:[00000030h] 10_2_0164B477
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164B477 mov eax, dword ptr fs:[00000030h] 10_2_0164B477
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164B477 mov eax, dword ptr fs:[00000030h] 10_2_0164B477
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165AC7B mov eax, dword ptr fs:[00000030h] 10_2_0165AC7B
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165AC7B mov eax, dword ptr fs:[00000030h] 10_2_0165AC7B
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165AC7B mov eax, dword ptr fs:[00000030h] 10_2_0165AC7B
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165AC7B mov eax, dword ptr fs:[00000030h] 10_2_0165AC7B
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165AC7B mov eax, dword ptr fs:[00000030h] 10_2_0165AC7B
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165AC7B mov eax, dword ptr fs:[00000030h] 10_2_0165AC7B
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165AC7B mov eax, dword ptr fs:[00000030h] 10_2_0165AC7B
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165AC7B mov eax, dword ptr fs:[00000030h] 10_2_0165AC7B
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165AC7B mov eax, dword ptr fs:[00000030h] 10_2_0165AC7B
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165AC7B mov eax, dword ptr fs:[00000030h] 10_2_0165AC7B
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165AC7B mov eax, dword ptr fs:[00000030h] 10_2_0165AC7B
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165A44B mov eax, dword ptr fs:[00000030h] 10_2_0165A44B
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016BC450 mov eax, dword ptr fs:[00000030h] 10_2_016BC450
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016BC450 mov eax, dword ptr fs:[00000030h] 10_2_016BC450
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165BC2C mov eax, dword ptr fs:[00000030h] 10_2_0165BC2C
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016A6C0A mov eax, dword ptr fs:[00000030h] 10_2_016A6C0A
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016A6C0A mov eax, dword ptr fs:[00000030h] 10_2_016A6C0A
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016A6C0A mov eax, dword ptr fs:[00000030h] 10_2_016A6C0A
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016A6C0A mov eax, dword ptr fs:[00000030h] 10_2_016A6C0A
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016F740D mov eax, dword ptr fs:[00000030h] 10_2_016F740D
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016F740D mov eax, dword ptr fs:[00000030h] 10_2_016F740D
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016F740D mov eax, dword ptr fs:[00000030h] 10_2_016F740D
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E1C06 mov eax, dword ptr fs:[00000030h] 10_2_016E1C06
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E1C06 mov eax, dword ptr fs:[00000030h] 10_2_016E1C06
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E1C06 mov eax, dword ptr fs:[00000030h] 10_2_016E1C06
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E1C06 mov eax, dword ptr fs:[00000030h] 10_2_016E1C06
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E1C06 mov eax, dword ptr fs:[00000030h] 10_2_016E1C06
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E1C06 mov eax, dword ptr fs:[00000030h] 10_2_016E1C06
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E1C06 mov eax, dword ptr fs:[00000030h] 10_2_016E1C06
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E1C06 mov eax, dword ptr fs:[00000030h] 10_2_016E1C06
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E1C06 mov eax, dword ptr fs:[00000030h] 10_2_016E1C06
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E1C06 mov eax, dword ptr fs:[00000030h] 10_2_016E1C06
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E1C06 mov eax, dword ptr fs:[00000030h] 10_2_016E1C06
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E1C06 mov eax, dword ptr fs:[00000030h] 10_2_016E1C06
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E1C06 mov eax, dword ptr fs:[00000030h] 10_2_016E1C06
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E1C06 mov eax, dword ptr fs:[00000030h] 10_2_016E1C06
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E14FB mov eax, dword ptr fs:[00000030h] 10_2_016E14FB
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016A6CF0 mov eax, dword ptr fs:[00000030h] 10_2_016A6CF0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016A6CF0 mov eax, dword ptr fs:[00000030h] 10_2_016A6CF0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016A6CF0 mov eax, dword ptr fs:[00000030h] 10_2_016A6CF0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016F8CD6 mov eax, dword ptr fs:[00000030h] 10_2_016F8CD6
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0163849B mov eax, dword ptr fs:[00000030h] 10_2_0163849B
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E4496 mov eax, dword ptr fs:[00000030h] 10_2_016E4496
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E4496 mov eax, dword ptr fs:[00000030h] 10_2_016E4496
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E4496 mov eax, dword ptr fs:[00000030h] 10_2_016E4496
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E4496 mov eax, dword ptr fs:[00000030h] 10_2_016E4496
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E4496 mov eax, dword ptr fs:[00000030h] 10_2_016E4496
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E4496 mov eax, dword ptr fs:[00000030h] 10_2_016E4496
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E4496 mov eax, dword ptr fs:[00000030h] 10_2_016E4496
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E4496 mov eax, dword ptr fs:[00000030h] 10_2_016E4496
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E4496 mov eax, dword ptr fs:[00000030h] 10_2_016E4496
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E4496 mov eax, dword ptr fs:[00000030h] 10_2_016E4496
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E4496 mov eax, dword ptr fs:[00000030h] 10_2_016E4496
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E4496 mov eax, dword ptr fs:[00000030h] 10_2_016E4496
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E4496 mov eax, dword ptr fs:[00000030h] 10_2_016E4496
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0163FF60 mov eax, dword ptr fs:[00000030h] 10_2_0163FF60
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016F8F6A mov eax, dword ptr fs:[00000030h] 10_2_016F8F6A
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0163EF40 mov eax, dword ptr fs:[00000030h] 10_2_0163EF40
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01624F2E mov eax, dword ptr fs:[00000030h] 10_2_01624F2E
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01624F2E mov eax, dword ptr fs:[00000030h] 10_2_01624F2E
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165E730 mov eax, dword ptr fs:[00000030h] 10_2_0165E730
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164B73D mov eax, dword ptr fs:[00000030h] 10_2_0164B73D
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164B73D mov eax, dword ptr fs:[00000030h] 10_2_0164B73D
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016F070D mov eax, dword ptr fs:[00000030h] 10_2_016F070D
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016F070D mov eax, dword ptr fs:[00000030h] 10_2_016F070D
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165A70E mov eax, dword ptr fs:[00000030h] 10_2_0165A70E
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165A70E mov eax, dword ptr fs:[00000030h] 10_2_0165A70E
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164F716 mov eax, dword ptr fs:[00000030h] 10_2_0164F716
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016BFF10 mov eax, dword ptr fs:[00000030h] 10_2_016BFF10
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016BFF10 mov eax, dword ptr fs:[00000030h] 10_2_016BFF10
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016637F5 mov eax, dword ptr fs:[00000030h] 10_2_016637F5
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01638794 mov eax, dword ptr fs:[00000030h] 10_2_01638794
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016A7794 mov eax, dword ptr fs:[00000030h] 10_2_016A7794
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016A7794 mov eax, dword ptr fs:[00000030h] 10_2_016A7794
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016A7794 mov eax, dword ptr fs:[00000030h] 10_2_016A7794
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0163766D mov eax, dword ptr fs:[00000030h] 10_2_0163766D
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164AE73 mov eax, dword ptr fs:[00000030h] 10_2_0164AE73
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164AE73 mov eax, dword ptr fs:[00000030h] 10_2_0164AE73
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164AE73 mov eax, dword ptr fs:[00000030h] 10_2_0164AE73
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164AE73 mov eax, dword ptr fs:[00000030h] 10_2_0164AE73
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0164AE73 mov eax, dword ptr fs:[00000030h] 10_2_0164AE73
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01637E41 mov eax, dword ptr fs:[00000030h] 10_2_01637E41
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01637E41 mov eax, dword ptr fs:[00000030h] 10_2_01637E41
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01637E41 mov eax, dword ptr fs:[00000030h] 10_2_01637E41
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01637E41 mov eax, dword ptr fs:[00000030h] 10_2_01637E41
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01637E41 mov eax, dword ptr fs:[00000030h] 10_2_01637E41
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01637E41 mov eax, dword ptr fs:[00000030h] 10_2_01637E41
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016EAE44 mov eax, dword ptr fs:[00000030h] 10_2_016EAE44
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016EAE44 mov eax, dword ptr fs:[00000030h] 10_2_016EAE44
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0162E620 mov eax, dword ptr fs:[00000030h] 10_2_0162E620
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016DFE3F mov eax, dword ptr fs:[00000030h] 10_2_016DFE3F
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0162C600 mov eax, dword ptr fs:[00000030h] 10_2_0162C600
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0162C600 mov eax, dword ptr fs:[00000030h] 10_2_0162C600
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0162C600 mov eax, dword ptr fs:[00000030h] 10_2_0162C600
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01658E00 mov eax, dword ptr fs:[00000030h] 10_2_01658E00
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016E1608 mov eax, dword ptr fs:[00000030h] 10_2_016E1608
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165A61C mov eax, dword ptr fs:[00000030h] 10_2_0165A61C
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0165A61C mov eax, dword ptr fs:[00000030h] 10_2_0165A61C
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016376E2 mov eax, dword ptr fs:[00000030h] 10_2_016376E2
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016516E0 mov ecx, dword ptr fs:[00000030h] 10_2_016516E0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_01668EC7 mov eax, dword ptr fs:[00000030h] 10_2_01668EC7
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016536CC mov eax, dword ptr fs:[00000030h] 10_2_016536CC
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016DFEC0 mov eax, dword ptr fs:[00000030h] 10_2_016DFEC0
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016F8ED6 mov eax, dword ptr fs:[00000030h] 10_2_016F8ED6
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016F0EA5 mov eax, dword ptr fs:[00000030h] 10_2_016F0EA5
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016F0EA5 mov eax, dword ptr fs:[00000030h] 10_2_016F0EA5
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016F0EA5 mov eax, dword ptr fs:[00000030h] 10_2_016F0EA5
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016A46A7 mov eax, dword ptr fs:[00000030h] 10_2_016A46A7
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_016BFE87 mov eax, dword ptr fs:[00000030h] 10_2_016BFE87
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03753B7A mov eax, dword ptr fs:[00000030h] 15_2_03753B7A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03753B7A mov eax, dword ptr fs:[00000030h] 15_2_03753B7A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0372DB60 mov ecx, dword ptr fs:[00000030h] 15_2_0372DB60
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037F8B58 mov eax, dword ptr fs:[00000030h] 15_2_037F8B58
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0372F358 mov eax, dword ptr fs:[00000030h] 15_2_0372F358
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0372DB40 mov eax, dword ptr fs:[00000030h] 15_2_0372DB40
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037E131B mov eax, dword ptr fs:[00000030h] 15_2_037E131B
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h] 15_2_0374A309
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h] 15_2_0374A309
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h] 15_2_0374A309
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h] 15_2_0374A309
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h] 15_2_0374A309
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h] 15_2_0374A309
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h] 15_2_0374A309
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h] 15_2_0374A309
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h] 15_2_0374A309
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h] 15_2_0374A309
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h] 15_2_0374A309
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h] 15_2_0374A309
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h] 15_2_0374A309
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h] 15_2_0374A309
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h] 15_2_0374A309
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h] 15_2_0374A309
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h] 15_2_0374A309
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h] 15_2_0374A309
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h] 15_2_0374A309
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h] 15_2_0374A309
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h] 15_2_0374A309
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037503E2 mov eax, dword ptr fs:[00000030h] 15_2_037503E2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037503E2 mov eax, dword ptr fs:[00000030h] 15_2_037503E2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037503E2 mov eax, dword ptr fs:[00000030h] 15_2_037503E2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037503E2 mov eax, dword ptr fs:[00000030h] 15_2_037503E2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037503E2 mov eax, dword ptr fs:[00000030h] 15_2_037503E2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037503E2 mov eax, dword ptr fs:[00000030h] 15_2_037503E2
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374DBE9 mov eax, dword ptr fs:[00000030h] 15_2_0374DBE9
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037D23E3 mov ecx, dword ptr fs:[00000030h] 15_2_037D23E3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037D23E3 mov ecx, dword ptr fs:[00000030h] 15_2_037D23E3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037D23E3 mov eax, dword ptr fs:[00000030h] 15_2_037D23E3
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037A53CA mov eax, dword ptr fs:[00000030h] 15_2_037A53CA
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037A53CA mov eax, dword ptr fs:[00000030h] 15_2_037A53CA
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03754BAD mov eax, dword ptr fs:[00000030h] 15_2_03754BAD
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03754BAD mov eax, dword ptr fs:[00000030h] 15_2_03754BAD
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03754BAD mov eax, dword ptr fs:[00000030h] 15_2_03754BAD
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037F5BA5 mov eax, dword ptr fs:[00000030h] 15_2_037F5BA5
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03752397 mov eax, dword ptr fs:[00000030h] 15_2_03752397
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0375B390 mov eax, dword ptr fs:[00000030h] 15_2_0375B390
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037E138A mov eax, dword ptr fs:[00000030h] 15_2_037E138A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03731B8F mov eax, dword ptr fs:[00000030h] 15_2_03731B8F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03731B8F mov eax, dword ptr fs:[00000030h] 15_2_03731B8F
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037DD380 mov ecx, dword ptr fs:[00000030h] 15_2_037DD380
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0376927A mov eax, dword ptr fs:[00000030h] 15_2_0376927A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037DB260 mov eax, dword ptr fs:[00000030h] 15_2_037DB260
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037DB260 mov eax, dword ptr fs:[00000030h] 15_2_037DB260
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037F8A62 mov eax, dword ptr fs:[00000030h] 15_2_037F8A62
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037EEA55 mov eax, dword ptr fs:[00000030h] 15_2_037EEA55
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037B4257 mov eax, dword ptr fs:[00000030h] 15_2_037B4257
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03729240 mov eax, dword ptr fs:[00000030h] 15_2_03729240
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03729240 mov eax, dword ptr fs:[00000030h] 15_2_03729240
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03729240 mov eax, dword ptr fs:[00000030h] 15_2_03729240
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03729240 mov eax, dword ptr fs:[00000030h] 15_2_03729240
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03764A2C mov eax, dword ptr fs:[00000030h] 15_2_03764A2C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03764A2C mov eax, dword ptr fs:[00000030h] 15_2_03764A2C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A229 mov eax, dword ptr fs:[00000030h] 15_2_0374A229
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A229 mov eax, dword ptr fs:[00000030h] 15_2_0374A229
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A229 mov eax, dword ptr fs:[00000030h] 15_2_0374A229
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A229 mov eax, dword ptr fs:[00000030h] 15_2_0374A229
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A229 mov eax, dword ptr fs:[00000030h] 15_2_0374A229
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A229 mov eax, dword ptr fs:[00000030h] 15_2_0374A229
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A229 mov eax, dword ptr fs:[00000030h] 15_2_0374A229
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A229 mov eax, dword ptr fs:[00000030h] 15_2_0374A229
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0374A229 mov eax, dword ptr fs:[00000030h] 15_2_0374A229
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03725210 mov eax, dword ptr fs:[00000030h] 15_2_03725210
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03725210 mov ecx, dword ptr fs:[00000030h] 15_2_03725210
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03725210 mov eax, dword ptr fs:[00000030h] 15_2_03725210
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03725210 mov eax, dword ptr fs:[00000030h] 15_2_03725210
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0372AA16 mov eax, dword ptr fs:[00000030h] 15_2_0372AA16
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0372AA16 mov eax, dword ptr fs:[00000030h] 15_2_0372AA16
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03743A1C mov eax, dword ptr fs:[00000030h] 15_2_03743A1C
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037EAA16 mov eax, dword ptr fs:[00000030h] 15_2_037EAA16
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037EAA16 mov eax, dword ptr fs:[00000030h] 15_2_037EAA16
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03738A0A mov eax, dword ptr fs:[00000030h] 15_2_03738A0A
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03752AE4 mov eax, dword ptr fs:[00000030h] 15_2_03752AE4
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037E4AEF mov eax, dword ptr fs:[00000030h] 15_2_037E4AEF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037E4AEF mov eax, dword ptr fs:[00000030h] 15_2_037E4AEF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037E4AEF mov eax, dword ptr fs:[00000030h] 15_2_037E4AEF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037E4AEF mov eax, dword ptr fs:[00000030h] 15_2_037E4AEF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037E4AEF mov eax, dword ptr fs:[00000030h] 15_2_037E4AEF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037E4AEF mov eax, dword ptr fs:[00000030h] 15_2_037E4AEF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037E4AEF mov eax, dword ptr fs:[00000030h] 15_2_037E4AEF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037E4AEF mov eax, dword ptr fs:[00000030h] 15_2_037E4AEF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037E4AEF mov eax, dword ptr fs:[00000030h] 15_2_037E4AEF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037E4AEF mov eax, dword ptr fs:[00000030h] 15_2_037E4AEF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037E4AEF mov eax, dword ptr fs:[00000030h] 15_2_037E4AEF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037E4AEF mov eax, dword ptr fs:[00000030h] 15_2_037E4AEF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037E4AEF mov eax, dword ptr fs:[00000030h] 15_2_037E4AEF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037E4AEF mov eax, dword ptr fs:[00000030h] 15_2_037E4AEF
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_03752ACB mov eax, dword ptr fs:[00000030h] 15_2_03752ACB
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0373AAB0 mov eax, dword ptr fs:[00000030h] 15_2_0373AAB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0373AAB0 mov eax, dword ptr fs:[00000030h] 15_2_0373AAB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_0375FAB0 mov eax, dword ptr fs:[00000030h] 15_2_0375FAB0
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037252A5 mov eax, dword ptr fs:[00000030h] 15_2_037252A5
Source: C:\Windows\SysWOW64\svchost.exe Code function: 15_2_037252A5 mov eax, dword ptr fs:[00000030h] 15_2_037252A5
Checks if the current process is being debugged
Source: C:\Users\user\Desktop\PO_101&102.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Process queried: DebugPort Jump to behavior
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Source: C:\Users\user\Desktop\PO_101&102.exe Code function: 10_2_0040ACF0 LdrLoadDll, 10_2_0040ACF0
Source: C:\Users\user\Desktop\PO_101&102.exe Memory allocated: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion:

barindex
System process connects to network (likely due to code injection or exploit)
Source: C:\Windows\explorer.exe Network Connect: 185.178.208.163 80 Jump to behavior
Source: C:\Windows\explorer.exe Domain query: www.reynbetgirisi.com
Sample uses process hollowing technique
Source: C:\Users\user\Desktop\PO_101&102.exe Section unmapped: C:\Windows\SysWOW64\svchost.exe base address: 100000 Jump to behavior
Maps a DLL or memory area into another process
Source: C:\Users\user\Desktop\PO_101&102.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Section loaded: unknown target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and write Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Section loaded: unknown target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: read write Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write Jump to behavior
Injects a PE file into a foreign processes
Source: C:\Users\user\Desktop\PO_101&102.exe Memory written: C:\Users\user\Desktop\PO_101&102.exe base: 400000 value starts with: 4D5A Jump to behavior
Queues an APC in another process (thread injection)
Source: C:\Users\user\Desktop\PO_101&102.exe Thread APC queued: target process: C:\Windows\explorer.exe Jump to behavior
Modifies the context of a thread in another process (thread injection)
Source: C:\Users\user\Desktop\PO_101&102.exe Thread register set: target process: 3352 Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Thread register set: target process: 3352 Jump to behavior
Creates a process in suspended mode (likely to inject code)
Source: C:\Users\user\Desktop\PO_101&102.exe Process created: C:\Users\user\Desktop\PO_101&102.exe {path} Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Process created: C:\Users\user\Desktop\PO_101&102.exe {path} Jump to behavior
Source: C:\Windows\SysWOW64\svchost.exe Process created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\PO_101&102.exe' Jump to behavior
Source: explorer.exe, 0000000B.00000000.329498700.00000000011E0000.00000002.00020000.sdmp, svchost.exe, 0000000F.00000002.561850229.0000000004590000.00000002.00020000.sdmp Binary or memory string: Program Manager
Source: explorer.exe, 0000000B.00000000.329180655.0000000000B68000.00000004.00000020.sdmp Binary or memory string: Progman\Pr
Source: explorer.exe, 0000000B.00000000.349357050.0000000005E10000.00000004.00000001.sdmp, svchost.exe, 0000000F.00000002.561850229.0000000004590000.00000002.00020000.sdmp Binary or memory string: Shell_TrayWnd
Source: explorer.exe, 0000000B.00000000.329498700.00000000011E0000.00000002.00020000.sdmp, svchost.exe, 0000000F.00000002.561850229.0000000004590000.00000002.00020000.sdmp Binary or memory string: Progman
Source: explorer.exe, 0000000B.00000000.329498700.00000000011E0000.00000002.00020000.sdmp, svchost.exe, 0000000F.00000002.561850229.0000000004590000.00000002.00020000.sdmp Binary or memory string: Progmanlock
Source: explorer.exe, 0000000B.00000000.353798297.0000000008778000.00000004.00000001.sdmp Binary or memory string: Shell_TrayWndh

Language, Device and Operating System Detection:

barindex
Queries the volume information (name, serial number etc) of a device
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Users\user\Desktop\PO_101&102.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Queries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\PO_101&102.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Stealing of Sensitive Information:

barindex
Yara detected FormBook
Source: Yara match File source: 10.2.PO_101&102.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.0.PO_101&102.exe.400000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.0.PO_101&102.exe.400000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.0.PO_101&102.exe.400000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.0.PO_101&102.exe.400000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.PO_101&102.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.PO_101&102.exe.45ada08.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.0.PO_101&102.exe.400000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000A.00000000.307243585.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.371409464.0000000001530000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.558614233.0000000002E40000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.312254656.0000000004500000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.555083742.00000000001A0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.559409706.0000000002F40000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000000.352889129.0000000007949000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.370759398.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000000.335987438.0000000007949000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.371246188.0000000001500000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000000.308236166.0000000000400000.00000040.00000001.sdmp, type: MEMORY

Remote Access Functionality:

barindex
Yara detected FormBook
Source: Yara match File source: 10.2.PO_101&102.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.0.PO_101&102.exe.400000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.0.PO_101&102.exe.400000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.0.PO_101&102.exe.400000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.0.PO_101&102.exe.400000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.PO_101&102.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.PO_101&102.exe.45ada08.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.0.PO_101&102.exe.400000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000A.00000000.307243585.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.371409464.0000000001530000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.558614233.0000000002E40000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.312254656.0000000004500000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.555083742.00000000001A0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.559409706.0000000002F40000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000000.352889129.0000000007949000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.370759398.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000000.335987438.0000000007949000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.371246188.0000000001500000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000000.308236166.0000000000400000.00000040.00000001.sdmp, type: MEMORY
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs