Loading ...

Play interactive tourEdit tour

Windows Analysis Report Purchase Order.exe

Overview

General Information

Sample Name:Purchase Order.exe
Analysis ID:452476
MD5:c13f1850e9d955f826620bd1ae322368
SHA1:1329de0499fabc6fcffd4fa02864968acaac253e
SHA256:419d8b92dc042882bb3261de70dfe4a158bc9ca436c71f9bf330bb8a6917d04c
Tags:exe
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Yara detected AntiVM3
Yara detected FormBook
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w10x64
  • Purchase Order.exe (PID: 1376 cmdline: 'C:\Users\user\Desktop\Purchase Order.exe' MD5: C13F1850E9D955F826620BD1AE322368)
    • Purchase Order.exe (PID: 1784 cmdline: {path} MD5: C13F1850E9D955F826620BD1AE322368)
      • explorer.exe (PID: 3388 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • cscript.exe (PID: 5288 cmdline: C:\Windows\SysWOW64\cscript.exe MD5: 00D3041E47F99E48DD5FFFEDF60F6304)
          • cmd.exe (PID: 244 cmdline: /c del 'C:\Users\user\Desktop\Purchase Order.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 3596 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.valiantfinancial.net/hth0/"], "decoy": ["grahamandjana.com", "surfpodcastnetwork.com", "valkyrie20.com", "hire4looks.com", "wewalkfastasone.com", "saveourschoolyear.com", "5g23e.com", "abusinesssystems.com", "telefonepantalla.com", "tailorscafe.com", "schwarzer-markt.net", "stopwatch247.com", "458grandbetting.com", "xpovision.com", "kutkingbarbering.life", "kppp-guxxz.xyz", "chuckwagon-chow.com", "la-casa-delle-vita.com", "creativesocials.com", "negociacoeshojebr.com", "conservativestyle.life", "825tache.com", "birthmothersmaine.com", "jwrl.net", "gardiantparts.com", "contodosyparaelbiendetodos.com", "actymall.com", "oxyde.net", "adagiomusicacademy.com", "newjerseyscubadiving.net", "87oaks.com", "overt.website", "home-made-gifts.com", "viralgoats.com", "camediahub.com", "bankruptcyprobabilities.com", "yourlifematterswellness.email", "earnestjourneycourses.com", "landonpaints.com", "aesegroup.com", "omegle99.com", "sparklinmomma.com", "cofcwzrf.com", "jam-nins.com", "mazacz.com", "copdrule.info", "cahayaqq.life", "helps-paxful.com", "gerado.online", "patanamedia.com", "fromfeartotrust.com", "deux-studios.com", "wallinders.com", "nilton-g.com", "yijiamobile.com", "ocheap3dbuy.com", "flima2020a.site", "battlefieldtitle.site", "ferrebaviera.com", "plushmint.com", "achievementfound.com", "dontbringcovidhome.com", "cultigique.com", "waveplumb.com"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000010.00000002.362458702.0000000000400000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000010.00000002.362458702.0000000000400000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b4f7:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1c4fa:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000010.00000002.362458702.0000000000400000.00000040.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18419:$sqlite3step: 68 34 1C 7B E1
    • 0x1852c:$sqlite3step: 68 34 1C 7B E1
    • 0x18448:$sqlite3text: 68 38 2A 90 C5
    • 0x1856d:$sqlite3text: 68 38 2A 90 C5
    • 0x1845b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x18583:$sqlite3blob: 68 53 D8 7F 8C
    00000013.00000002.480809359.0000000001140000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000013.00000002.480809359.0000000001140000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b4f7:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c4fa:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 18 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      16.2.Purchase Order.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        16.2.Purchase Order.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1b4f7:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1c4fa:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        16.2.Purchase Order.exe.400000.0.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x18419:$sqlite3step: 68 34 1C 7B E1
        • 0x1852c:$sqlite3step: 68 34 1C 7B E1
        • 0x18448:$sqlite3text: 68 38 2A 90 C5
        • 0x1856d:$sqlite3text: 68 38 2A 90 C5
        • 0x1845b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x18583:$sqlite3blob: 68 53 D8 7F 8C
        16.2.Purchase Order.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          16.2.Purchase Order.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x8ae8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x8d62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x14885:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x14371:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x14987:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x14aff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x977a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x135ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xa473:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1a6f7:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1b6fa:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 1 entries

          Sigma Overview

          No Sigma rule has matched

          Jbx Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 00000010.00000002.362458702.0000000000400000.00000040.00000001.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.valiantfinancial.net/hth0/"], "decoy": ["grahamandjana.com", "surfpodcastnetwork.com", "valkyrie20.com", "hire4looks.com", "wewalkfastasone.com", "saveourschoolyear.com", "5g23e.com", "abusinesssystems.com", "telefonepantalla.com", "tailorscafe.com", "schwarzer-markt.net", "stopwatch247.com", "458grandbetting.com", "xpovision.com", "kutkingbarbering.life", "kppp-guxxz.xyz", "chuckwagon-chow.com", "la-casa-delle-vita.com", "creativesocials.com", "negociacoeshojebr.com", "conservativestyle.life", "825tache.com", "birthmothersmaine.com", "jwrl.net", "gardiantparts.com", "contodosyparaelbiendetodos.com", "actymall.com", "oxyde.net", "adagiomusicacademy.com", "newjerseyscubadiving.net", "87oaks.com", "overt.website", "home-made-gifts.com", "viralgoats.com", "camediahub.com", "bankruptcyprobabilities.com", "yourlifematterswellness.email", "earnestjourneycourses.com", "landonpaints.com", "aesegroup.com", "omegle99.com", "sparklinmomma.com", "cofcwzrf.com", "jam-nins.com", "mazacz.com", "copdrule.info", "cahayaqq.life", "helps-paxful.com", "gerado.online", "patanamedia.com", "fromfeartotrust.com", "deux-studios.com", "wallinders.com", "nilton-g.com", "yijiamobile.com", "ocheap3dbuy.com", "flima2020a.site", "battlefieldtitle.site", "ferrebaviera.com", "plushmint.com", "achievementfound.com", "dontbringcovidhome.com", "cultigique.com", "waveplumb.com"]}
          Multi AV Scanner detection for submitted fileShow sources
          Source: Purchase Order.exeReversingLabs: Detection: 13%
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 16.2.Purchase Order.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 16.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000010.00000002.362458702.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.480809359.0000000001140000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000010.00000002.363133642.0000000001720000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000010.00000002.363097654.00000000016F0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.479738533.0000000000D50000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.480997579.0000000001170000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.308917029.0000000003C71000.00000004.00000001.sdmp, type: MEMORY
          Machine Learning detection for sampleShow sources
          Source: Purchase Order.exeJoe Sandbox ML: detected
          Source: 16.2.Purchase Order.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: Purchase Order.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: Purchase Order.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: cscript.pdbUGP source: Purchase Order.exe, 00000010.00000002.363242230.00000000017A0000.00000040.00000001.sdmp
          Source: Binary string: wscui.pdbUGP source: explorer.exe, 00000011.00000000.333473408.0000000009B40000.00000002.00000001.sdmp
          Source: Binary string: wntdll.pdbUGP source: Purchase Order.exe, 00000010.00000002.363433472.000000000194F000.00000040.00000001.sdmp, cscript.exe, 00000013.00000002.483133229.000000000500F000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: Purchase Order.exe, cscript.exe
          Source: Binary string: cscript.pdb source: Purchase Order.exe, 00000010.00000002.363242230.00000000017A0000.00000040.00000001.sdmp
          Source: Binary string: wscui.pdb source: explorer.exe, 00000011.00000000.333473408.0000000009B40000.00000002.00000001.sdmp
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4x nop then pop edi
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4x nop then pop edi
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 4x nop then pop edi
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 4x nop then pop edi

          Networking:

          barindex
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: www.valiantfinancial.net/hth0/
          Source: unknownDNS traffic detected: query: www.deux-studios.com replaycode: Name error (3)
          Source: unknownDNS traffic detected: query: www.abusinesssystems.com replaycode: Name error (3)
          Source: unknownDNS traffic detected: queries for: www.deux-studios.com
          Source: explorer.exe, 00000011.00000000.337336723.000000000F5C0000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
          Source: Purchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
          Source: Purchase Order.exe, 00000000.00000003.230153130.00000000056A8000.00000004.00000001.sdmp, Purchase Order.exe, 00000000.00000003.226282943.000000000569C000.00000004.00000001.sdmpString found in binary or memory: http://www.agfamonotype.
          Source: Purchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: Purchase Order.exe, 00000000.00000003.224058728.00000000056A5000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com
          Source: Purchase Order.exe, 00000000.00000003.224058728.00000000056A5000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comcr
          Source: Purchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: Purchase Order.exe, 00000000.00000003.224058728.00000000056A5000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.como.
          Source: Purchase Order.exe, 00000000.00000003.223685242.00000000056A5000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comof
          Source: Purchase Order.exe, 00000000.00000003.224058728.00000000056A5000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comtGi
          Source: Purchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: Purchase Order.exe, 00000000.00000003.226995164.00000000056A4000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com.TTF
          Source: Purchase Order.exe, 00000000.00000003.226282943.000000000569C000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com.TTFuo
          Source: explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: Purchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: Purchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: Purchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
          Source: Purchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: Purchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: Purchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: Purchase Order.exe, 00000000.00000002.314683016.0000000005690000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com=
          Source: Purchase Order.exe, 00000000.00000003.226995164.00000000056A4000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comF
          Source: Purchase Order.exe, 00000000.00000003.226995164.00000000056A4000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comd-o
          Source: Purchase Order.exe, 00000000.00000003.226995164.00000000056A4000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comdsed
          Source: Purchase Order.exe, 00000000.00000003.230396940.00000000056A2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.come.com
          Source: Purchase Order.exe, 00000000.00000002.314683016.0000000005690000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.como
          Source: Purchase Order.exe, 00000000.00000003.226995164.00000000056A4000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comsivao
          Source: Purchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
          Source: Purchase Order.exe, 00000000.00000003.222559347.00000000056A3000.00000004.00000001.sdmp, Purchase Order.exe, 00000000.00000003.222070975.00000000056A0000.00000004.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: Purchase Order.exe, 00000000.00000003.222559347.00000000056A3000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
          Source: Purchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: Purchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: Purchase Order.exe, 00000000.00000003.222070975.00000000056A0000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cngib
          Source: Purchase Order.exe, 00000000.00000003.222559347.00000000056A3000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnmpa-u
          Source: Purchase Order.exe, 00000000.00000003.222070975.00000000056A0000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnoup
          Source: Purchase Order.exe, 00000000.00000003.222559347.00000000056A3000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnoupyt
          Source: Purchase Order.exe, 00000000.00000003.222070975.00000000056A0000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnrosCu
          Source: Purchase Order.exe, 00000000.00000003.222070975.00000000056A0000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnt
          Source: Purchase Order.exe, 00000000.00000003.227884543.00000000056A0000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/
          Source: Purchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: Purchase Order.exe, 00000000.00000003.227809153.00000000056A0000.00000004.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: Purchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: Purchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: Purchase Order.exe, 00000000.00000003.224952116.00000000056A2000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp//2o
          Source: Purchase Order.exe, 00000000.00000003.224952116.00000000056A2000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/;o
          Source: Purchase Order.exe, 00000000.00000003.224952116.00000000056A2000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Co
          Source: Purchase Order.exe, 00000000.00000003.225352110.0000000005699000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Ko
          Source: Purchase Order.exe, 00000000.00000003.224952116.00000000056A2000.00000004.00000001.sdmp, Purchase Order.exe, 00000000.00000003.225352110.0000000005699000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0
          Source: Purchase Order.exe, 00000000.00000003.224952116.00000000056A2000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
          Source: Purchase Order.exe, 00000000.00000003.225076126.00000000056A3000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/uo
          Source: Purchase Order.exe, 00000000.00000003.224952116.00000000056A2000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/k
          Source: Purchase Order.exe, 00000000.00000003.224706549.0000000005693000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/l
          Source: Purchase Order.exe, 00000000.00000003.224849274.00000000056A2000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/lt
          Source: Purchase Order.exe, 00000000.00000003.225352110.0000000005699000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/o
          Source: Purchase Order.exe, 00000000.00000003.224706549.0000000005693000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/ue
          Source: Purchase Order.exe, 00000000.00000003.224706549.0000000005693000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/uo
          Source: Purchase Order.exe, 00000000.00000003.224706549.0000000005693000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/zo
          Source: Purchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: Purchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
          Source: Purchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
          Source: Purchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
          Source: Purchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: Purchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
          Source: Purchase Order.exe, 00000000.00000003.223470937.00000000056A5000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cno.

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 16.2.Purchase Order.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 16.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000010.00000002.362458702.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.480809359.0000000001140000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000010.00000002.363133642.0000000001720000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000010.00000002.363097654.00000000016F0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.479738533.0000000000D50000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.480997579.0000000001170000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.308917029.0000000003C71000.00000004.00000001.sdmp, type: MEMORY

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 16.2.Purchase Order.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 16.2.Purchase Order.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 16.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 16.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000010.00000002.362458702.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000010.00000002.362458702.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000013.00000002.480809359.0000000001140000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000013.00000002.480809359.0000000001140000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000010.00000002.363133642.0000000001720000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000010.00000002.363133642.0000000001720000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000010.00000002.363097654.00000000016F0000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000010.00000002.363097654.00000000016F0000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000013.00000002.479738533.0000000000D50000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000013.00000002.479738533.0000000000D50000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000013.00000002.480997579.0000000001170000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000013.00000002.480997579.0000000001170000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.308917029.0000000003C71000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.308917029.0000000003C71000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Initial sample is a PE file and has a suspicious nameShow sources
          Source: initial sampleStatic PE information: Filename: Purchase Order.exe
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0041A060 NtClose,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0041A110 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_00419F30 NtCreateFile,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_00419FE0 NtReadFile,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0041A05A NtClose,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0041A10C NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_00419FDA NtReadFile,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018999A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018995D0 NtClose,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01899910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01899540 NtReadFile,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018998F0 NtReadVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01899840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01899860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01899780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018997A0 NtUnmapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01899710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018996E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01899A00 NtProtectVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01899A20 NtResumeThread,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01899A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01899660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018999D0 NtCreateProcessEx,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018995F0 NtQueryInformationFile,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01899520 NtWaitForSingleObject,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0189AD30 NtSetContextThread,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01899950 NtQueueApcThread,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01899560 NtWriteFile,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018998A0 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01899820 NtEnumerateKey,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0189B040 NtSuspendThread,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0189A3B0 NtGetContextThread,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01899FE0 NtCreateMutant,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01899B00 NtSetValueKey,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0189A710 NtOpenProcessToken,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01899730 NtQueryVirtualMemory,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01899760 NtOpenProcess,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01899770 NtSetInformationFile,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0189A770 NtOpenThread,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01899A80 NtOpenDirectoryObject,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018996D0 NtCreateKey,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01899610 NtEnumerateValueKey,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01899A10 NtQuerySection,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01899650 NtQueryValueKey,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01899670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F59860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F59840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F595D0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F599A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F59540 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F59910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F596E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F596D0 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F59660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F59650 NtQueryValueKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F59A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F59FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F59780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F59710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F598F0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F598A0 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F5B040 NtSuspendThread,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F59820 NtEnumerateKey,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F595F0 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F599D0 NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F59560 NtWriteFile,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F59950 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F5AD30 NtSetContextThread,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F59520 NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F59A80 NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F59670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F59A20 NtResumeThread,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F59610 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F59A10 NtQuerySection,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F59A00 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F5A3B0 NtGetContextThread,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F597A0 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F59770 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F5A770 NtOpenThread,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F59760 NtOpenProcess,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F59730 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F5A710 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F59B00 NtSetValueKey,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_00D6A060 NtClose,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_00D6A110 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_00D69FE0 NtReadFile,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_00D69F30 NtCreateFile,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_00D6A05A NtClose,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_00D6A10C NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_00D69FDA NtReadFile,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_051A1EB4
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_051409D8
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_00401030
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0041E903
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0041E1D5
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0041D9E4
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0041D441
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0041D563
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_00402D87
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_00402D90
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_00409E40
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_00409E3B
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_00402FB0
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01882581
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_019225DD
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0186D5E0
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0185F900
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01922D07
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01850D20
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01874120
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01921D55
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0186B090
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018820A0
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_019220A8
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_019228EC
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01911002
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0186841F
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0191D466
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0188EBB0
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0191DBD2
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01921FF1
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01922B28
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_019222AE
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01922EF7
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01876E30
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FE28EC
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F420A0
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FE20A8
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F2B090
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FDD466
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F2841F
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FD1002
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F2D5E0
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FE25DD
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F42581
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FE1D55
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F10D20
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F34120
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F1F900
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FE2D07
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FE2EF7
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FE22AE
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F36E30
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FE1FF1
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FDDBD2
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F4EBB0
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FE2B28
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_00D6E1D5
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_00D6E903
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_00D6D441
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_00D52D90
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_00D52D87
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_00D6D563
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_00D59E40
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_00D59E3B
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_00D52FB0
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: String function: 0185B150 appears 35 times
          Source: C:\Windows\SysWOW64\cscript.exeCode function: String function: 04F1B150 appears 35 times
          Source: Purchase Order.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: Purchase Order.exe, 00000000.00000002.316200555.0000000006320000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameResource_Meter.dll> vs Purchase Order.exe
          Source: Purchase Order.exe, 00000000.00000002.315638714.0000000005EE0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs Purchase Order.exe
          Source: Purchase Order.exe, 00000000.00000002.313563096.0000000005240000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs Purchase Order.exe
          Source: Purchase Order.exe, 00000000.00000002.305496464.0000000000917000.00000002.00020000.sdmpBinary or memory string: OriginalFilenametV45e.exe2 vs Purchase Order.exe
          Source: Purchase Order.exe, 00000010.00000000.304813686.0000000000D77000.00000002.00020000.sdmpBinary or memory string: OriginalFilenametV45e.exe2 vs Purchase Order.exe
          Source: Purchase Order.exe, 00000010.00000002.363242230.00000000017A0000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamecscript.exe` vs Purchase Order.exe
          Source: Purchase Order.exe, 00000010.00000002.363433472.000000000194F000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Purchase Order.exe
          Source: Purchase Order.exeBinary or memory string: OriginalFilenametV45e.exe2 vs Purchase Order.exe
          Source: Purchase Order.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 16.2.Purchase Order.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 16.2.Purchase Order.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 16.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 16.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000010.00000002.362458702.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000010.00000002.362458702.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000013.00000002.480809359.0000000001140000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000013.00000002.480809359.0000000001140000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000010.00000002.363133642.0000000001720000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000010.00000002.363133642.0000000001720000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000010.00000002.363097654.00000000016F0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000010.00000002.363097654.00000000016F0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000013.00000002.479738533.0000000000D50000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000013.00000002.479738533.0000000000D50000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000013.00000002.480997579.0000000001170000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000013.00000002.480997579.0000000001170000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.308917029.0000000003C71000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.308917029.0000000003C71000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: Purchase Order.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: classification engineClassification label: mal100.troj.evad.winEXE@7/1@2/0
          Source: C:\Users\user\Desktop\Purchase Order.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Purchase Order.exe.logJump to behavior
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3596:120:WilError_01
          Source: Purchase Order.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\Purchase Order.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: Purchase Order.exeReversingLabs: Detection: 13%
          Source: Purchase Order.exeString found in binary or memory: es>false</DisallowStartIfOnBatteries> <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries> <AllowHardTerminate>false</AllowHardTerminate> <StartWhenAvailable>true</StartWhenAvailable> <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvail
          Source: Purchase Order.exeString found in binary or memory: es>false</DisallowStartIfOnBatteries> <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries> <AllowHardTerminate>false</AllowHardTerminate> <StartWhenAvailable>true</StartWhenAvailable> <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvail
          Source: Purchase Order.exeString found in binary or memory: ble> <IdleSettings> <StopOnIdleEnd>true</StopOnIdleEnd> <RestartOnIdle>false</RestartOnIdle> </IdleSettings> <AllowStartOnDemand>true</AllowStartOnDemand> <Enabled>true</Enabled> <Hidden>false</Hidden> <RunOnlyIfIdle
          Source: Purchase Order.exeString found in binary or memory: ble> <IdleSettings> <StopOnIdleEnd>true</StopOnIdleEnd> <RestartOnIdle>false</RestartOnIdle> </IdleSettings> <AllowStartOnDemand>true</AllowStartOnDemand> <Enabled>true</Enabled> <Hidden>false</Hidden> <RunOnlyIfIdle
          Source: unknownProcess created: C:\Users\user\Desktop\Purchase Order.exe 'C:\Users\user\Desktop\Purchase Order.exe'
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess created: C:\Users\user\Desktop\Purchase Order.exe {path}
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\cscript.exe C:\Windows\SysWOW64\cscript.exe
          Source: C:\Windows\SysWOW64\cscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\Purchase Order.exe'
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess created: C:\Users\user\Desktop\Purchase Order.exe {path}
          Source: C:\Windows\SysWOW64\cscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\Purchase Order.exe'
          Source: C:\Users\user\Desktop\Purchase Order.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: Purchase Order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: Purchase Order.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: cscript.pdbUGP source: Purchase Order.exe, 00000010.00000002.363242230.00000000017A0000.00000040.00000001.sdmp
          Source: Binary string: wscui.pdbUGP source: explorer.exe, 00000011.00000000.333473408.0000000009B40000.00000002.00000001.sdmp
          Source: Binary string: wntdll.pdbUGP source: Purchase Order.exe, 00000010.00000002.363433472.000000000194F000.00000040.00000001.sdmp, cscript.exe, 00000013.00000002.483133229.000000000500F000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: Purchase Order.exe, cscript.exe
          Source: Binary string: cscript.pdb source: Purchase Order.exe, 00000010.00000002.363242230.00000000017A0000.00000040.00000001.sdmp
          Source: Binary string: wscui.pdb source: explorer.exe, 00000011.00000000.333473408.0000000009B40000.00000002.00000001.sdmp

          Data Obfuscation:

          barindex
          .NET source code contains potential unpackerShow sources
          Source: Purchase Order.exe, uNotepad/Form1.cs.Net Code: TGBNJUYHFDERWS System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.2.Purchase Order.exe.830000.0.unpack, uNotepad/Form1.cs.Net Code: TGBNJUYHFDERWS System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.0.Purchase Order.exe.830000.0.unpack, uNotepad/Form1.cs.Net Code: TGBNJUYHFDERWS System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 16.2.Purchase Order.exe.c90000.1.unpack, uNotepad/Form1.cs.Net Code: TGBNJUYHFDERWS System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 16.0.Purchase Order.exe.c90000.0.unpack, uNotepad/Form1.cs.Net Code: TGBNJUYHFDERWS System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_0089566C push edi; retf
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_05143D50 push cs; ret
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_05142D96 push cs; ret
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_051425E7 push cs; ret
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_05143448 push cs; ret
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_05144C9C push cs; ret
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_05141CCD push cs; ret
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_051437A0 push cs; ret
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_05141FAE push cs; ret
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_051447D5 pushad ; retf
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_0514463C push cs; ret
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_0514297E push cs; ret
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_0514496C push cs; ret
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_0514407B push cs; ret
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_05145063 push cs; ret
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_051430EF push cs; ret
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_05144B05 pushad ; retf
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_05142B8A push cs; ret
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_051443A6 push cs; ret
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_05142250 push cs; ret
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_05143A78 push cs; ret
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0041D0D2 push eax; ret
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0041D0DB push eax; ret
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0041D085 push eax; ret
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0041D13C push eax; ret
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_00416A73 push eax; iretd
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_004176D4 push ss; ret
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_004077D3 push ecx; retf
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_004167ED push edi; ret
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_00CFA934 push edi; retf
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_00CF566C push edi; retf
          Source: initial sampleStatic PE information: section name: .text entropy: 7.75016432791

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Modifies the prolog of user mode functions (user mode inline hooks)Show sources
          Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x8E 0xEE 0xEB
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\cscript.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM3Show sources
          Source: Yara matchFile source: 00000000.00000002.308021841.0000000002CD8000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Purchase Order.exe PID: 1376, type: MEMORY
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: Purchase Order.exe, 00000000.00000002.308021841.0000000002CD8000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
          Source: Purchase Order.exe, 00000000.00000002.308021841.0000000002CD8000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\user\Desktop\Purchase Order.exeRDTSC instruction interceptor: First address: 00000000004098E4 second address: 00000000004098EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\Purchase Order.exeRDTSC instruction interceptor: First address: 0000000000409B5E second address: 0000000000409B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\cscript.exeRDTSC instruction interceptor: First address: 0000000000D598E4 second address: 0000000000D598EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\cscript.exeRDTSC instruction interceptor: First address: 0000000000D59B5E second address: 0000000000D59B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_00409A90 rdtsc
          Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\Purchase Order.exe TID: 4760Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\cscript.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 922337203685477
          Source: explorer.exe, 00000011.00000000.331902331.000000000871F000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
          Source: explorer.exe, 00000011.00000000.331902331.000000000871F000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000:
          Source: Purchase Order.exe, 00000000.00000002.308021841.0000000002CD8000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
          Source: explorer.exe, 00000011.00000000.331665021.0000000008640000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000011.00000000.331287030.0000000008220000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
          Source: Purchase Order.exe, 00000000.00000002.308021841.0000000002CD8000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: Purchase Order.exe, 00000000.00000002.308021841.0000000002CD8000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: Purchase Order.exe, 00000000.00000002.308021841.0000000002CD8000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
          Source: explorer.exe, 00000011.00000000.354060611.00000000055D0000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}V*(E
          Source: Purchase Order.exe, 00000000.00000002.308021841.0000000002CD8000.00000004.00000001.sdmpBinary or memory string: VMWARE
          Source: explorer.exe, 00000011.00000000.331902331.000000000871F000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}~
          Source: explorer.exe, 00000011.00000000.331902331.000000000871F000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
          Source: explorer.exe, 00000011.00000000.331997751.00000000087D1000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00ices
          Source: explorer.exe, 00000011.00000000.326143838.0000000005603000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b},
          Source: Purchase Order.exe, 00000000.00000002.308021841.0000000002CD8000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: explorer.exe, 00000011.00000000.331287030.0000000008220000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
          Source: explorer.exe, 00000011.00000000.331287030.0000000008220000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
          Source: Purchase Order.exe, 00000000.00000002.308021841.0000000002CD8000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
          Source: Purchase Order.exe, 00000000.00000002.308021841.0000000002CD8000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
          Source: Purchase Order.exe, 00000000.00000002.308021841.0000000002CD8000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
          Source: explorer.exe, 00000011.00000000.331287030.0000000008220000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\cscript.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_00409A90 rdtsc
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0040ACD0 LdrLoadDll,
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0187C182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01882581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01882581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01882581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01882581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0188A185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01852D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01852D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01852D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01852D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01852D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0188FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0188FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01882990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018861A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018861A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018835A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018D69A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018D51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018D51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018D51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018D51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01881DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01881DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01881DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_019205AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_019205AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018D6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018D6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018D6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018D6DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018D6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018D6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01908DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0185B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0185B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0185B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018E41E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0186D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0186D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0191FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0191FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0191FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0191FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01859100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01859100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01859100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01928D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01874120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01874120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01874120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01874120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01874120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0191E539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0188513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0188513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01863D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01863D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01863D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01863D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01863D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01863D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01863D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01863D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01863D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01863D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01863D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01863D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01863D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01884D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01884D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01884D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0185AD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018DA537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0187B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0187B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01893D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018D3540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01877D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0185C962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0187C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0187C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0185B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0185B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01859080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018D3884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018D3884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0186849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018990AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018820A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018820A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018820A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018820A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018820A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018820A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0188F0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0188F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0188F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01928CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018EB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018EB8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018EB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018EB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018EB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018EB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018558EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_019114FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018D6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018D6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018D6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01924015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01924015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018D6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018D6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018D6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018D6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01911C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01911C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01911C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01911C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01911C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01911C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01911C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01911C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01911C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01911C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01911C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01911C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01911C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01911C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018D7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018D7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018D7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0192740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0192740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0192740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0188BC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0188002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0188002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0188002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0188002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0188002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0186B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0186B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0186B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0186B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0188A44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01870050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01870050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018EC450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018EC450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01912073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01921074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0187746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01861B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01861B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0190D380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01868794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0188B390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018D7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018D7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018D7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0191138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01882397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01884BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01884BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01884BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01925BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018D53CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018D53CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018803E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018803E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018803E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018803E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018803E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018803E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0187DBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018937F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0188A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0188A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0191131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0187F716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018EFF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018EFF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0192070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0192070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01854F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01854F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0188E730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0185DB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0186EF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01928B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0185F358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0185DB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0186FF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01883B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01883B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01928F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018EFE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0188D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0188D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018552A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018552A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018552A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018552A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018552A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018D46A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0186AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0186AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01920EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01920EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01920EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0188FAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01882ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01928ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018836CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01898EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0190FEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018676E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018816E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01882AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0185C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0185C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0185C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01888E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01868A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0185AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0185AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0188A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0188A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01855210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01855210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01855210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01855210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01911608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01873A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0185E620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01894A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01894A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0190FE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0191EA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01859240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01859240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01859240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01859240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01867E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01867E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01867E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01867E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01867E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01867E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0191AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0191AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_018E4257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0186766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0190B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0190B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_01928A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0189927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0187AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0187AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0187AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0187AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 16_2_0187AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FD14FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F96CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F96CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F96CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F158EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FE8CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FAB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FAB8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FAB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FAB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FAB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FAB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F4F0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F4F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F4F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F420A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F420A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F420A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F420A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F420A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F420A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F590AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F2849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F19080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F93884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F93884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FE1074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FD2073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F3746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F30050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F30050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FAC450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FAC450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F4A44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F2B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F2B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F2B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F2B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F4BC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F4002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F4002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F4002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F4002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F4002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FE4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FE4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F97016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F97016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F97016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FE740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FE740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FE740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F96C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F96C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F96C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F96C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FD1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FD1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FD1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FD1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FD1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FD1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FD1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FD1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FD1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FD1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FD1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FD1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FD1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FD1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FC8DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F1B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F1B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F1B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FA41E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F2D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F2D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FDFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FDFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FDFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FDFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F96DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F96DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F96DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F96DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F96DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F96DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F41DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F41DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F41DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F951BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F951BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F951BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F951BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FE05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FE05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F461A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F461A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F435A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F969A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F42990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F4FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F4FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F4A185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F3C182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F42581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F42581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F42581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F42581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F12D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F12D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F12D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F12D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F12D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F1B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F1B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F3C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F3C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F1C962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F37D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F53D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F3B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F3B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F93540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F1AD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FDE539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F23D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F23D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F23D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F23D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F23D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F23D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F23D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F23D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F23D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F23D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F23D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F23D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F23D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FE8D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F4513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F4513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F9A537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F44D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F44D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F44D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F34120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F34120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F34120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F34120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F34120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F19100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F19100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F19100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F276E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F42AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F416E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FE8ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F58EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F436CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FCFEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F42ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F2AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F2AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F4FAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F152A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F152A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F152A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F152A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F152A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FE0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FE0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FE0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F946A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F4D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F4D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FAFE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F3AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F3AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F3AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F3AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F3AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F5927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FCB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FCB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FE8A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F2766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FDEA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FA4257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F19240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F19240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F19240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F19240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F27E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F27E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F27E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F27E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F27E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F27E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FDAE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FDAE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FCFE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F1E620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F54A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F54A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F15210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F15210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F15210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F15210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F1AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F1AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F4A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F4A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F33A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F1C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F1C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F1C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F48E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FD1608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F28A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F537F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F403E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F403E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F403E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F403E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F403E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F403E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F3DBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F953CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F953CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F44BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F44BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F44BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04FE5BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F42397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 19_2_04F4B390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\cscript.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\Purchase Order.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeDomain query: www.deux-studios.com
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\user\Desktop\Purchase Order.exeMemory written: C:\Users\user\Desktop\Purchase Order.exe base: 400000 value starts with: 4D5A
          Maps a DLL or memory area into another processShow sources
          Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: unknown target: C:\Windows\SysWOW64\cscript.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: unknown target: C:\Windows\SysWOW64\cscript.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Modifies the context of a thread in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\Purchase Order.exeThread register set: target process: 3388
          Source: C:\Windows\SysWOW64\cscript.exeThread register set: target process: 3388
          Queues an APC in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\Purchase Order.exeThread APC queued: target process: C:\Windows\explorer.exe
          Sample uses process hollowing techniqueShow sources
          Source: C:\Users\user\Desktop\Purchase Order.exeSection unmapped: C:\Windows\SysWOW64\cscript.exe base address: 11A0000
          Source: C:\Users\user\Desktop\Purchase Order.exeProcess created: C:\Users\user\Desktop\Purchase Order.exe {path}
          Source: C:\Windows\SysWOW64\cscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\Purchase Order.exe'
          Source: explorer.exe, 00000011.00000000.343545208.0000000001398000.00000004.00000020.sdmpBinary or memory string: ProgmanamF
          Source: explorer.exe, 00000011.00000000.343855560.0000000001980000.00000002.00000001.sdmp, cscript.exe, 00000013.00000002.481929641.00000000037A0000.00000002.00000001.sdmpBinary or memory string: Program Manager
          Source: explorer.exe, 00000011.00000000.343855560.0000000001980000.00000002.00000001.sdmp, cscript.exe, 00000013.00000002.481929641.00000000037A0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000011.00000000.343855560.0000000001980000.00000002.00000001.sdmp, cscript.exe, 00000013.00000002.481929641.00000000037A0000.00000002.00000001.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000011.00000000.343855560.0000000001980000.00000002.00000001.sdmp, cscript.exe, 00000013.00000002.481929641.00000000037A0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Users\user\Desktop\Purchase Order.exe VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\Purchase Order.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 16.2.Purchase Order.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 16.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000010.00000002.362458702.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.480809359.0000000001140000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000010.00000002.363133642.0000000001720000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000010.00000002.363097654.00000000016F0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.479738533.0000000000D50000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.480997579.0000000001170000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.308917029.0000000003C71000.00000004.00000001.sdmp, type: MEMORY

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 16.2.Purchase Order.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 16.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000010.00000002.362458702.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.480809359.0000000001140000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000010.00000002.363133642.0000000001720000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000010.00000002.363097654.00000000016F0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.479738533.0000000000D50000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.480997579.0000000001170000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.308917029.0000000003C71000.00000004.00000001.sdmp, type: MEMORY

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsCommand and Scripting Interpreter2Path InterceptionProcess Injection612Rootkit1Credential API Hooking1Security Software Discovery221Remote ServicesCredential API Hooking1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsShared Modules1Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsMasquerading1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol11Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Virtualization/Sandbox Evasion31NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection612LSA SecretsSystem Information Discovery112SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information4DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing13Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 452476 Sample: Purchase Order.exe Startdate: 22/07/2021 Architecture: WINDOWS Score: 100 31 www.abusinesssystems.com 2->31 35 Found malware configuration 2->35 37 Malicious sample detected (through community Yara rule) 2->37 39 Multi AV Scanner detection for submitted file 2->39 41 9 other signatures 2->41 11 Purchase Order.exe 3 2->11         started        signatures3 process4 file5 29 C:\Users\user\...\Purchase Order.exe.log, ASCII 11->29 dropped 51 Injects a PE file into a foreign processes 11->51 15 Purchase Order.exe 11->15         started        signatures6 process7 signatures8 53 Modifies the context of a thread in another process (thread injection) 15->53 55 Maps a DLL or memory area into another process 15->55 57 Sample uses process hollowing technique 15->57 59 Queues an APC in another process (thread injection) 15->59 18 explorer.exe 15->18 injected process9 dnsIp10 33 www.deux-studios.com 18->33 43 System process connects to network (likely due to code injection or exploit) 18->43 22 cscript.exe 18->22         started        signatures11 process12 signatures13 45 Modifies the context of a thread in another process (thread injection) 22->45 47 Maps a DLL or memory area into another process 22->47 49 Tries to detect virtualization through RDTSC time measurements 22->49 25 cmd.exe 1 22->25         started        process14 process15 27 conhost.exe 25->27         started       

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          Purchase Order.exe13%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
          Purchase Order.exe100%Joe Sandbox ML

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          16.2.Purchase Order.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          http://www.jiyu-kobo.co.jp/lt0%VirustotalBrowse
          http://www.jiyu-kobo.co.jp/lt0%Avira URL Cloudsafe
          http://www.fontbureau.comsivao0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp//2o0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/Co0%Avira URL Cloudsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/ue0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/ue0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/ue0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/;o0%Avira URL Cloudsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.fontbureau.comd-o0%Avira URL Cloudsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/uo0%Avira URL Cloudsafe
          http://www.carterandcone.com0%URL Reputationsafe
          http://www.carterandcone.com0%URL Reputationsafe
          http://www.carterandcone.com0%URL Reputationsafe
          http://www.founder.com.cn/cnoupyt0%Avira URL Cloudsafe
          http://www.fontbureau.com.TTFuo0%Avira URL Cloudsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.founder.com.cn/cngib0%Avira URL Cloudsafe
          http://www.founder.com.cn/cnt0%URL Reputationsafe
          http://www.founder.com.cn/cnt0%URL Reputationsafe
          http://www.founder.com.cn/cnt0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.carterandcone.como.0%URL Reputationsafe
          http://www.carterandcone.como.0%URL Reputationsafe
          http://www.carterandcone.como.0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.fontbureau.com.TTF0%URL Reputationsafe
          http://www.fontbureau.com.TTF0%URL Reputationsafe
          http://www.fontbureau.com.TTF0%URL Reputationsafe
          http://www.fontbureau.com=0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/Ko0%Avira URL Cloudsafe
          http://www.founder.com.cn/cnoup0%Avira URL Cloudsafe
          http://www.galapagosdesign.com/0%URL Reputationsafe
          http://www.galapagosdesign.com/0%URL Reputationsafe
          http://www.galapagosdesign.com/0%URL Reputationsafe
          http://www.fontbureau.comF0%URL Reputationsafe
          http://www.fontbureau.comF0%URL Reputationsafe
          http://www.fontbureau.comF0%URL Reputationsafe
          http://www.agfamonotype.0%URL Reputationsafe
          http://www.agfamonotype.0%URL Reputationsafe
          http://www.agfamonotype.0%URL Reputationsafe
          http://www.carterandcone.comcr0%Avira URL Cloudsafe
          www.valiantfinancial.net/hth0/0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
          http://www.fontbureau.come.com0%URL Reputationsafe
          http://www.fontbureau.come.com0%URL Reputationsafe
          http://www.fontbureau.come.com0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.founder.com.cn/cnmpa-u0%Avira URL Cloudsafe
          http://www.founder.com.cn/cn/0%URL Reputationsafe
          http://www.founder.com.cn/cn/0%URL Reputationsafe
          http://www.founder.com.cn/cn/0%URL Reputationsafe
          http://www.carterandcone.comof0%Avira URL Cloudsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.carterandcone.comtGi0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          www.deux-studios.com
          unknown
          unknowntrue
            unknown
            www.abusinesssystems.com
            unknown
            unknowntrue
              unknown

              Contacted URLs

              NameMaliciousAntivirus DetectionReputation
              www.valiantfinancial.net/hth0/true
              • Avira URL Cloud: safe
              low

              URLs from Memory and Binaries

              NameSourceMaliciousAntivirus DetectionReputation
              http://www.jiyu-kobo.co.jp/ltPurchase Order.exe, 00000000.00000003.224849274.00000000056A2000.00000004.00000001.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.com/designersGPurchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpfalse
                high
                http://www.fontbureau.comsivaoPurchase Order.exe, 00000000.00000003.226995164.00000000056A4000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.jiyu-kobo.co.jp//2oPurchase Order.exe, 00000000.00000003.224952116.00000000056A2000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.fontbureau.com/designers/?Purchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpfalse
                  high
                  http://www.jiyu-kobo.co.jp/CoPurchase Order.exe, 00000000.00000003.224952116.00000000056A2000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.founder.com.cn/cn/bThePurchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.jiyu-kobo.co.jp/uePurchase Order.exe, 00000000.00000003.224706549.0000000005693000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers?Purchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpfalse
                    high
                    http://www.jiyu-kobo.co.jp/;oPurchase Order.exe, 00000000.00000003.224952116.00000000056A2000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.tiro.comexplorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designersexplorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpfalse
                      high
                      http://www.fontbureau.comd-oPurchase Order.exe, 00000000.00000003.226995164.00000000056A4000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.goodfont.co.krPurchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/uoPurchase Order.exe, 00000000.00000003.224706549.0000000005693000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.carterandcone.comPurchase Order.exe, 00000000.00000003.224058728.00000000056A5000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cnoupytPurchase Order.exe, 00000000.00000003.222559347.00000000056A3000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.com.TTFuoPurchase Order.exe, 00000000.00000003.226282943.000000000569C000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.sajatypeworks.comPurchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.typography.netDPurchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cn/cThePurchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.galapagosdesign.com/staff/dennis.htmPurchase Order.exe, 00000000.00000003.227809153.00000000056A0000.00000004.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://fontfabrik.comPurchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cngibPurchase Order.exe, 00000000.00000003.222070975.00000000056A0000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.founder.com.cn/cntPurchase Order.exe, 00000000.00000003.222070975.00000000056A0000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.galapagosdesign.com/DPleasePurchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/Y0Purchase Order.exe, 00000000.00000003.224952116.00000000056A2000.00000004.00000001.sdmp, Purchase Order.exe, 00000000.00000003.225352110.0000000005699000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fonts.comPurchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpfalse
                        high
                        http://www.sandoll.co.krPurchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.urwpp.deDPleasePurchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.zhongyicts.com.cnPurchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.como.Purchase Order.exe, 00000000.00000003.224058728.00000000056A5000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.sakkal.comPurchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com.TTFPurchase Order.exe, 00000000.00000003.226995164.00000000056A4000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com=Purchase Order.exe, 00000000.00000002.314683016.0000000005690000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        http://www.jiyu-kobo.co.jp/KoPurchase Order.exe, 00000000.00000003.225352110.0000000005699000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.founder.com.cn/cnoupPurchase Order.exe, 00000000.00000003.222070975.00000000056A0000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.apache.org/licenses/LICENSE-2.0Purchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpfalse
                          high
                          http://www.fontbureau.comPurchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpfalse
                            high
                            http://www.galapagosdesign.com/Purchase Order.exe, 00000000.00000003.227884543.00000000056A0000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.comFPurchase Order.exe, 00000000.00000003.226995164.00000000056A4000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.agfamonotype.Purchase Order.exe, 00000000.00000003.230153130.00000000056A8000.00000004.00000001.sdmp, Purchase Order.exe, 00000000.00000003.226282943.000000000569C000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comcrPurchase Order.exe, 00000000.00000003.224058728.00000000056A5000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/jp/Purchase Order.exe, 00000000.00000003.224952116.00000000056A2000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.come.comPurchase Order.exe, 00000000.00000003.230396940.00000000056A2000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comlPurchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cnmpa-uPurchase Order.exe, 00000000.00000003.222559347.00000000056A3000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.founder.com.cn/cn/Purchase Order.exe, 00000000.00000003.222559347.00000000056A3000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comofPurchase Order.exe, 00000000.00000003.223685242.00000000056A5000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.com/designers/cabarga.htmlNPurchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpfalse
                              high
                              http://www.founder.com.cn/cnPurchase Order.exe, 00000000.00000003.222559347.00000000056A3000.00000004.00000001.sdmp, Purchase Order.exe, 00000000.00000003.222070975.00000000056A0000.00000004.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.carterandcone.comtGiPurchase Order.exe, 00000000.00000003.224058728.00000000056A5000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fontbureau.com/designers/frere-jones.htmlPurchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpfalse
                                high
                                http://www.jiyu-kobo.co.jp/oPurchase Order.exe, 00000000.00000003.225352110.0000000005699000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/Purchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/kPurchase Order.exe, 00000000.00000003.224952116.00000000056A2000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.comoPurchase Order.exe, 00000000.00000002.314683016.0000000005690000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/lPurchase Order.exe, 00000000.00000003.224706549.0000000005693000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.zhongyicts.com.cno.Purchase Order.exe, 00000000.00000003.223470937.00000000056A5000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers8Purchase Order.exe, 00000000.00000002.316230721.0000000006470000.00000002.00000001.sdmp, explorer.exe, 00000011.00000000.332748032.0000000008B40000.00000002.00000001.sdmpfalse
                                  high
                                  http://www.jiyu-kobo.co.jp/jp/uoPurchase Order.exe, 00000000.00000003.225076126.00000000056A3000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/zoPurchase Order.exe, 00000000.00000003.224706549.0000000005693000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.fontbureau.comdsedPurchase Order.exe, 00000000.00000003.226995164.00000000056A4000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.founder.com.cn/cnrosCuPurchase Order.exe, 00000000.00000003.222070975.00000000056A0000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown

                                  Contacted IPs

                                  No contacted IP infos

                                  General Information

                                  Joe Sandbox Version:33.0.0 White Diamond
                                  Analysis ID:452476
                                  Start date:22.07.2021
                                  Start time:13:17:13
                                  Joe Sandbox Product:CloudBasic
                                  Overall analysis duration:0h 10m 57s
                                  Hypervisor based Inspection enabled:false
                                  Report type:light
                                  Sample file name:Purchase Order.exe
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                  Number of analysed new started processes analysed:28
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • HDC enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Detection:MAL
                                  Classification:mal100.troj.evad.winEXE@7/1@2/0
                                  EGA Information:Failed
                                  HDC Information:
                                  • Successful, ratio: 12.6% (good quality ratio 10.3%)
                                  • Quality average: 64.4%
                                  • Quality standard deviation: 37%
                                  HCA Information:
                                  • Successful, ratio: 96%
                                  • Number of executed functions: 0
                                  • Number of non-executed functions: 0
                                  Cookbook Comments:
                                  • Adjust boot time
                                  • Enable AMSI
                                  • Found application associated with file extension: .exe
                                  Warnings:
                                  Show All
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                  • Excluded IPs from analysis (whitelisted): 23.211.6.115, 13.64.90.137, 104.42.151.234, 23.211.4.86, 20.82.209.183, 40.112.88.60, 205.185.216.42, 205.185.216.10, 80.67.82.211, 80.67.82.235, 20.82.210.154
                                  • Excluded domains from analysis (whitelisted): store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, e12564.dspb.akamaiedge.net, audownload.windowsupdate.nsatc.net, au.download.windowsupdate.com.hwcdn.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, skypedataprdcolwus17.cloudapp.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.

                                  Simulations

                                  Behavior and APIs

                                  No simulations

                                  Joe Sandbox View / Context

                                  IPs

                                  No context

                                  Domains

                                  No context

                                  ASN

                                  No context

                                  JA3 Fingerprints

                                  No context

                                  Dropped Files

                                  No context

                                  Created / dropped Files

                                  C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Purchase Order.exe.log
                                  Process:C:\Users\user\Desktop\Purchase Order.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1216
                                  Entropy (8bit):5.355304211458859
                                  Encrypted:false
                                  SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                  MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                  SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                  SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                  SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                  Malicious:true
                                  Reputation:high, very likely benign file
                                  Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21

                                  Static File Info

                                  General

                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):7.09707815679182
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  • DOS Executable Generic (2002/1) 0.01%
                                  File name:Purchase Order.exe
                                  File size:938496
                                  MD5:c13f1850e9d955f826620bd1ae322368
                                  SHA1:1329de0499fabc6fcffd4fa02864968acaac253e
                                  SHA256:419d8b92dc042882bb3261de70dfe4a158bc9ca436c71f9bf330bb8a6917d04c
                                  SHA512:8d11bbe6afadbd108f227bb3397334f27eb69859b19e82ae436ea91a9f9b6b786c83a55a2fe0f71b15875ec51df8b19f367941420e5972eb2a06e6163aed2657
                                  SSDEEP:12288:a+pvoEou45e3hi0CnMBUajS9VF/yEWmym5sD+cSMPQipP5q:a+pvZGe3encUNjFaEWmfipQ
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............0..j..........^.... ........@.. ....................................@................................

                                  File Icon

                                  Icon Hash:f0debeffdffeec70

                                  Static PE Info

                                  General

                                  Entrypoint:0x48885e
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                  DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                  Time Stamp:0x60F8B8F5 [Thu Jul 22 00:16:53 2021 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:v4.0.30319
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                  Entrypoint Preview

                                  Instruction
                                  jmp dword ptr [00402000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al

                                  Data Directories

                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x8880c0x4f.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x8a0000x5e320.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xea0000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                  Sections

                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000x868640x86a00False0.862472435005data7.75016432791IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                  .rsrc0x8a0000x5e3200x5e400False0.167326342838data5.6405677251IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0xea0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                  Resources

                                  NameRVASizeTypeLanguageCountry
                                  RT_ICON0x8a2200x468GLS_BINARY_LSB_FIRST
                                  RT_ICON0x8a6880x1128dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0
                                  RT_ICON0x8b7b00x2668dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
                                  RT_ICON0x8de180x4428dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0
                                  RT_ICON0x922400x11028dBase III DBT, version number 0, next free block index 40
                                  RT_ICON0xa32680x44028data
                                  RT_GROUP_ICON0xe72900x5adata
                                  RT_VERSION0xe72ec0x30cdata
                                  RT_MANIFEST0xe75f80xd25XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF, LF line terminators

                                  Imports

                                  DLLImport
                                  mscoree.dll_CorExeMain

                                  Version Infos

                                  DescriptionData
                                  Translation0x0000 0x04b0
                                  LegalCopyrightCopyright 2016
                                  Assembly Version1.0.0.0
                                  InternalNametV45e.exe
                                  FileVersion1.0.0.0
                                  CompanyName
                                  LegalTrademarks
                                  Comments
                                  ProductNameuNotepad
                                  ProductVersion1.0.0.0
                                  FileDescriptionuNotepad
                                  OriginalFilenametV45e.exe

                                  Network Behavior

                                  Network Port Distribution

                                  UDP Packets

                                  TimestampSource PortDest PortSource IPDest IP
                                  Jul 22, 2021 13:18:04.580295086 CEST4919953192.168.2.38.8.8.8
                                  Jul 22, 2021 13:18:04.641351938 CEST53491998.8.8.8192.168.2.3
                                  Jul 22, 2021 13:18:05.780913115 CEST5062053192.168.2.38.8.8.8
                                  Jul 22, 2021 13:18:05.838221073 CEST53506208.8.8.8192.168.2.3
                                  Jul 22, 2021 13:18:08.121515036 CEST6493853192.168.2.38.8.8.8
                                  Jul 22, 2021 13:18:08.174133062 CEST53649388.8.8.8192.168.2.3
                                  Jul 22, 2021 13:18:09.386004925 CEST6015253192.168.2.38.8.8.8
                                  Jul 22, 2021 13:18:09.439255953 CEST53601528.8.8.8192.168.2.3
                                  Jul 22, 2021 13:18:11.218653917 CEST5754453192.168.2.38.8.8.8
                                  Jul 22, 2021 13:18:11.268026114 CEST53575448.8.8.8192.168.2.3
                                  Jul 22, 2021 13:18:12.461256981 CEST5598453192.168.2.38.8.8.8
                                  Jul 22, 2021 13:18:12.513565063 CEST53559848.8.8.8192.168.2.3
                                  Jul 22, 2021 13:18:13.618632078 CEST6418553192.168.2.38.8.8.8
                                  Jul 22, 2021 13:18:13.678450108 CEST53641858.8.8.8192.168.2.3
                                  Jul 22, 2021 13:18:14.900017023 CEST6511053192.168.2.38.8.8.8
                                  Jul 22, 2021 13:18:14.959148884 CEST53651108.8.8.8192.168.2.3
                                  Jul 22, 2021 13:18:16.150531054 CEST5836153192.168.2.38.8.8.8
                                  Jul 22, 2021 13:18:16.215924025 CEST53583618.8.8.8192.168.2.3
                                  Jul 22, 2021 13:18:17.424123049 CEST6349253192.168.2.38.8.8.8
                                  Jul 22, 2021 13:18:17.553191900 CEST53634928.8.8.8192.168.2.3
                                  Jul 22, 2021 13:18:18.743213892 CEST6083153192.168.2.38.8.8.8
                                  Jul 22, 2021 13:18:18.792356014 CEST53608318.8.8.8192.168.2.3
                                  Jul 22, 2021 13:18:19.899352074 CEST6010053192.168.2.38.8.8.8
                                  Jul 22, 2021 13:18:19.951848984 CEST53601008.8.8.8192.168.2.3
                                  Jul 22, 2021 13:18:22.063747883 CEST5319553192.168.2.38.8.8.8
                                  Jul 22, 2021 13:18:22.116322041 CEST53531958.8.8.8192.168.2.3
                                  Jul 22, 2021 13:18:23.425777912 CEST5014153192.168.2.38.8.8.8
                                  Jul 22, 2021 13:18:23.475258112 CEST53501418.8.8.8192.168.2.3
                                  Jul 22, 2021 13:18:25.565068960 CEST5302353192.168.2.38.8.8.8
                                  Jul 22, 2021 13:18:25.617316961 CEST53530238.8.8.8192.168.2.3
                                  Jul 22, 2021 13:18:27.019148111 CEST4956353192.168.2.38.8.8.8
                                  Jul 22, 2021 13:18:27.072943926 CEST53495638.8.8.8192.168.2.3
                                  Jul 22, 2021 13:18:28.292045116 CEST5135253192.168.2.38.8.8.8
                                  Jul 22, 2021 13:18:28.343964100 CEST53513528.8.8.8192.168.2.3
                                  Jul 22, 2021 13:18:29.441327095 CEST5934953192.168.2.38.8.8.8
                                  Jul 22, 2021 13:18:29.493346930 CEST53593498.8.8.8192.168.2.3
                                  Jul 22, 2021 13:18:30.676944017 CEST5708453192.168.2.38.8.8.8
                                  Jul 22, 2021 13:18:30.728882074 CEST53570848.8.8.8192.168.2.3
                                  Jul 22, 2021 13:18:32.825310946 CEST5882353192.168.2.38.8.8.8
                                  Jul 22, 2021 13:18:32.907706976 CEST53588238.8.8.8192.168.2.3
                                  Jul 22, 2021 13:18:37.642015934 CEST5756853192.168.2.38.8.8.8
                                  Jul 22, 2021 13:18:37.715970039 CEST53575688.8.8.8192.168.2.3
                                  Jul 22, 2021 13:18:55.421674013 CEST5054053192.168.2.38.8.8.8
                                  Jul 22, 2021 13:18:55.491024017 CEST53505408.8.8.8192.168.2.3
                                  Jul 22, 2021 13:18:56.310287952 CEST5436653192.168.2.38.8.8.8
                                  Jul 22, 2021 13:18:56.368032932 CEST53543668.8.8.8192.168.2.3
                                  Jul 22, 2021 13:19:13.879085064 CEST5303453192.168.2.38.8.8.8
                                  Jul 22, 2021 13:19:13.946717978 CEST53530348.8.8.8192.168.2.3
                                  Jul 22, 2021 13:19:18.997966051 CEST5776253192.168.2.38.8.8.8
                                  Jul 22, 2021 13:19:19.058268070 CEST53577628.8.8.8192.168.2.3
                                  Jul 22, 2021 13:19:51.858135939 CEST5543553192.168.2.38.8.8.8
                                  Jul 22, 2021 13:19:51.919841051 CEST53554358.8.8.8192.168.2.3
                                  Jul 22, 2021 13:19:53.551717997 CEST5071353192.168.2.38.8.8.8
                                  Jul 22, 2021 13:19:53.618792057 CEST53507138.8.8.8192.168.2.3
                                  Jul 22, 2021 13:19:57.076951027 CEST5613253192.168.2.38.8.8.8
                                  Jul 22, 2021 13:19:57.153218985 CEST53561328.8.8.8192.168.2.3
                                  Jul 22, 2021 13:20:17.673424959 CEST5898753192.168.2.38.8.8.8
                                  Jul 22, 2021 13:20:17.736171007 CEST53589878.8.8.8192.168.2.3

                                  DNS Queries

                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                  Jul 22, 2021 13:19:57.076951027 CEST192.168.2.38.8.8.80xee55Standard query (0)www.deux-studios.comA (IP address)IN (0x0001)
                                  Jul 22, 2021 13:20:17.673424959 CEST192.168.2.38.8.8.80x7fccStandard query (0)www.abusinesssystems.comA (IP address)IN (0x0001)

                                  DNS Answers

                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                  Jul 22, 2021 13:19:57.153218985 CEST8.8.8.8192.168.2.30xee55Name error (3)www.deux-studios.comnonenoneA (IP address)IN (0x0001)
                                  Jul 22, 2021 13:20:17.736171007 CEST8.8.8.8192.168.2.30x7fccName error (3)www.abusinesssystems.comnonenoneA (IP address)IN (0x0001)

                                  Code Manipulations

                                  User Modules

                                  Hook Summary

                                  Function NameHook TypeActive in Processes
                                  PeekMessageAINLINEexplorer.exe
                                  PeekMessageWINLINEexplorer.exe
                                  GetMessageWINLINEexplorer.exe
                                  GetMessageAINLINEexplorer.exe

                                  Processes

                                  Process: explorer.exe, Module: user32.dll
                                  Function NameHook TypeNew Data
                                  PeekMessageAINLINE0x48 0x8B 0xB8 0x8E 0xEE 0xEB
                                  PeekMessageWINLINE0x48 0x8B 0xB8 0x86 0x6E 0xEB
                                  GetMessageWINLINE0x48 0x8B 0xB8 0x86 0x6E 0xEB
                                  GetMessageAINLINE0x48 0x8B 0xB8 0x8E 0xEE 0xEB

                                  Statistics

                                  Behavior

                                  Click to jump to process

                                  System Behavior

                                  General

                                  Start time:13:18:09
                                  Start date:22/07/2021
                                  Path:C:\Users\user\Desktop\Purchase Order.exe
                                  Wow64 process (32bit):true
                                  Commandline:'C:\Users\user\Desktop\Purchase Order.exe'
                                  Imagebase:0x830000
                                  File size:938496 bytes
                                  MD5 hash:C13F1850E9D955F826620BD1AE322368
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Yara matches:
                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.308021841.0000000002CD8000.00000004.00000001.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.308917029.0000000003C71000.00000004.00000001.sdmp, Author: Joe Security
                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.308917029.0000000003C71000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.308917029.0000000003C71000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                  Reputation:low

                                  General

                                  Start time:13:18:50
                                  Start date:22/07/2021
                                  Path:C:\Users\user\Desktop\Purchase Order.exe
                                  Wow64 process (32bit):true
                                  Commandline:{path}
                                  Imagebase:0xc90000
                                  File size:938496 bytes
                                  MD5 hash:C13F1850E9D955F826620BD1AE322368
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000010.00000002.362458702.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000010.00000002.362458702.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000010.00000002.362458702.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000010.00000002.363133642.0000000001720000.00000040.00000001.sdmp, Author: Joe Security
                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000010.00000002.363133642.0000000001720000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000010.00000002.363133642.0000000001720000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000010.00000002.363097654.00000000016F0000.00000040.00000001.sdmp, Author: Joe Security
                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000010.00000002.363097654.00000000016F0000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000010.00000002.363097654.00000000016F0000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                  Reputation:low

                                  General

                                  Start time:13:18:53
                                  Start date:22/07/2021
                                  Path:C:\Windows\explorer.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\Explorer.EXE
                                  Imagebase:0x7ff714890000
                                  File size:3933184 bytes
                                  MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  General

                                  Start time:13:19:16
                                  Start date:22/07/2021
                                  Path:C:\Windows\SysWOW64\cscript.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\SysWOW64\cscript.exe
                                  Imagebase:0x11a0000
                                  File size:143360 bytes
                                  MD5 hash:00D3041E47F99E48DD5FFFEDF60F6304
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000013.00000002.480809359.0000000001140000.00000040.00000001.sdmp, Author: Joe Security
                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000013.00000002.480809359.0000000001140000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000013.00000002.480809359.0000000001140000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000013.00000002.479738533.0000000000D50000.00000040.00000001.sdmp, Author: Joe Security
                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000013.00000002.479738533.0000000000D50000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000013.00000002.479738533.0000000000D50000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000013.00000002.480997579.0000000001170000.00000004.00000001.sdmp, Author: Joe Security
                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000013.00000002.480997579.0000000001170000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000013.00000002.480997579.0000000001170000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                  Reputation:moderate

                                  General

                                  Start time:13:19:19
                                  Start date:22/07/2021
                                  Path:C:\Windows\SysWOW64\cmd.exe
                                  Wow64 process (32bit):true
                                  Commandline:/c del 'C:\Users\user\Desktop\Purchase Order.exe'
                                  Imagebase:0xbd0000
                                  File size:232960 bytes
                                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  General

                                  Start time:13:19:19
                                  Start date:22/07/2021
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6b2800000
                                  File size:625664 bytes
                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  Disassembly

                                  Code Analysis

                                  Reset < >