Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PURCHASE ORDER # 12076038 & 12076022.exe

Overview

General Information

Sample Name:PURCHASE ORDER # 12076038 & 12076022.exe
Analysis ID:756258
MD5:152c62372d3ea07d023e1e187766fd4b
SHA1:32b630bc22b63d7eee42851175ebe43a13a92c15
SHA256:b3e12ecdee9eacc7354a7d43ccd3ebe7e6db207e93f73b7a847ff4bee9f27f86
Tags:agentteslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Sigma detected: Scheduled temp file as task from temp location
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
.NET source code references suspicious native API functions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
Machine Learning detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Uses schtasks.exe or at.exe to add and modify task schedules
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
Creates processes with suspicious names
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Dropped file seen in connection with other malware
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • PURCHASE ORDER # 12076038 & 12076022.exe (PID: 6092 cmdline: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe MD5: 152C62372D3EA07D023E1E187766FD4B)
    • schtasks.exe (PID: 1836 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WytzFSULZWRc" /XML "C:\Users\user\AppData\Local\Temp\tmp778D.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 2240 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RegSvcs.exe (PID: 4700 cmdline: {path} MD5: 2867A3817C9245F7CF518524DFD18F28)
  • WytzFSULZWRc.exe (PID: 2336 cmdline: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe MD5: 152C62372D3EA07D023E1E187766FD4B)
    • schtasks.exe (PID: 4512 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WytzFSULZWRc" /XML "C:\Users\user\AppData\Local\Temp\tmpF325.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5060 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RegSvcs.exe (PID: 2072 cmdline: {path} MD5: 2867A3817C9245F7CF518524DFD18F28)
    • RegSvcs.exe (PID: 2240 cmdline: {path} MD5: 2867A3817C9245F7CF518524DFD18F28)
  • zBwkauB.exe (PID: 5428 cmdline: "C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe" MD5: 2867A3817C9245F7CF518524DFD18F28)
    • conhost.exe (PID: 5416 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • zBwkauB.exe (PID: 4204 cmdline: "C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe" MD5: 2867A3817C9245F7CF518524DFD18F28)
    • conhost.exe (PID: 2888 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
{"Exfil Mode": "SMTP", "Host": "mail.dmstech.in", "Username": "sanjeev@dmstech.in", "Password": "0]6F9Az.pqfd"}
SourceRuleDescriptionAuthorStrings
00000003.00000000.277620591.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000003.00000000.277620591.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000003.00000000.277620591.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
      • 0x31d51:$a13: get_DnsResolver
      • 0x3043e:$a20: get_LastAccessed
      • 0x3278c:$a27: set_InternalServerPort
      • 0x32ac8:$a30: set_GuidMasterKey
      • 0x30550:$a33: get_Clipboard
      • 0x3055e:$a34: get_Keyboard
      • 0x3194b:$a35: get_ShiftKeyDown
      • 0x3195c:$a36: get_AltKeyDown
      • 0x3056b:$a37: get_Password
      • 0x31092:$a38: get_PasswordHash
      • 0x321b3:$a39: get_DefaultCredentials
      00000004.00000002.367091202.000000000452E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000004.00000002.367091202.000000000452E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          Click to see the 21 entries
          SourceRuleDescriptionAuthorStrings
          3.0.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            3.0.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              3.0.RegSvcs.exe.400000.0.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
              • 0x34aad:$s10: logins
              • 0x3451c:$s11: credential
              • 0x30750:$g1: get_Clipboard
              • 0x3075e:$g2: get_Keyboard
              • 0x3076b:$g3: get_Password
              • 0x31b3b:$g4: get_CtrlKeyDown
              • 0x31b4b:$g5: get_ShiftKeyDown
              • 0x31b5c:$g6: get_AltKeyDown
              3.0.RegSvcs.exe.400000.0.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
              • 0x31f51:$a13: get_DnsResolver
              • 0x3063e:$a20: get_LastAccessed
              • 0x3298c:$a27: set_InternalServerPort
              • 0x32cc8:$a30: set_GuidMasterKey
              • 0x30750:$a33: get_Clipboard
              • 0x3075e:$a34: get_Keyboard
              • 0x31b4b:$a35: get_ShiftKeyDown
              • 0x31b5c:$a36: get_AltKeyDown
              • 0x3076b:$a37: get_Password
              • 0x31292:$a38: get_PasswordHash
              • 0x323b3:$a39: get_DefaultCredentials
              0.2.PURCHASE ORDER # 12076038 & 12076022.exe.45619a0.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                Click to see the 15 entries

                Persistence and Installation Behavior

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WytzFSULZWRc" /XML "C:\Users\user\AppData\Local\Temp\tmp778D.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WytzFSULZWRc" /XML "C:\Users\user\AppData\Local\Temp\tmp778D.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe, ParentImage: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe, ParentProcessId: 6092, ParentProcessName: PURCHASE ORDER # 12076038 & 12076022.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WytzFSULZWRc" /XML "C:\Users\user\AppData\Local\Temp\tmp778D.tmp, ProcessId: 1836, ProcessName: schtasks.exe
                Timestamp:192.168.2.3208.91.199.89497065872030171 11/29/22-22:20:18.265371
                SID:2030171
                Source Port:49706
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.3208.91.199.89497065872851779 11/29/22-22:20:18.265452
                SID:2851779
                Source Port:49706
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.3208.91.199.89497055872840032 11/29/22-22:19:37.697367
                SID:2840032
                Source Port:49705
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.3208.91.199.89497055872839723 11/29/22-22:19:37.697241
                SID:2839723
                Source Port:49705
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.3208.91.199.89497065872840032 11/29/22-22:20:18.265452
                SID:2840032
                Source Port:49706
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.3208.91.199.89497055872851779 11/29/22-22:19:37.697367
                SID:2851779
                Source Port:49705
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.3208.91.199.89497055872030171 11/29/22-22:19:37.697241
                SID:2030171
                Source Port:49705
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.3208.91.199.89497065872839723 11/29/22-22:20:18.265371
                SID:2839723
                Source Port:49706
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: PURCHASE ORDER # 12076038 & 12076022.exeReversingLabs: Detection: 57%
                Source: PURCHASE ORDER # 12076038 & 12076022.exeVirustotal: Detection: 39%Perma Link
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeReversingLabs: Detection: 57%
                Source: PURCHASE ORDER # 12076038 & 12076022.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeJoe Sandbox ML: detected
                Source: 3.0.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.45619a0.1.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "mail.dmstech.in", "Username": "sanjeev@dmstech.in", "Password": "0]6F9Az.pqfd"}
                Source: PURCHASE ORDER # 12076038 & 12076022.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: PURCHASE ORDER # 12076038 & 12076022.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: upNPDPF.pdb source: PURCHASE ORDER # 12076038 & 12076022.exe, WytzFSULZWRc.exe.0.dr
                Source: Binary string: RegSvcs.pdb, source: zBwkauB.exe, 0000000E.00000000.311265436.00000000003B2000.00000002.00000001.01000000.0000000B.sdmp, zBwkauB.exe.3.dr
                Source: Binary string: RegSvcs.pdb source: zBwkauB.exe, 0000000E.00000000.311265436.00000000003B2000.00000002.00000001.01000000.0000000B.sdmp, zBwkauB.exe.3.dr

                Networking

                barindex
                Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.3:49705 -> 208.91.199.89:587
                Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.3:49705 -> 208.91.199.89:587
                Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.3:49705 -> 208.91.199.89:587
                Source: TrafficSnort IDS: 2839723 ETPRO TROJAN Win32/Agent Tesla SMTP Activity 192.168.2.3:49705 -> 208.91.199.89:587
                Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.3:49706 -> 208.91.199.89:587
                Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.3:49706 -> 208.91.199.89:587
                Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.3:49706 -> 208.91.199.89:587
                Source: TrafficSnort IDS: 2839723 ETPRO TROJAN Win32/Agent Tesla SMTP Activity 192.168.2.3:49706 -> 208.91.199.89:587
                Source: Joe Sandbox ViewASN Name: PUBLIC-DOMAIN-REGISTRYUS PUBLIC-DOMAIN-REGISTRYUS
                Source: Joe Sandbox ViewIP Address: 208.91.199.89 208.91.199.89
                Source: global trafficTCP traffic: 192.168.2.3:49705 -> 208.91.199.89:587
                Source: global trafficTCP traffic: 192.168.2.3:49705 -> 208.91.199.89:587
                Source: RegSvcs.exe, 00000003.00000002.361131528.0000000003051000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000015.00000002.514436513.000000000332C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: RegSvcs.exe, 00000015.00000002.514436513.000000000332C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                Source: RegSvcs.exe, 00000003.00000002.366864567.00000000033DB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000015.00000002.520096733.00000000036EF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://dmstech.in
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000003.241071729.0000000001B1D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://en.w
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                Source: RegSvcs.exe, 00000003.00000002.366864567.00000000033DB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000015.00000002.520096733.00000000036EF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.dmstech.in
                Source: RegSvcs.exe, 00000003.00000003.320266236.0000000006602000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://microsoft.coY
                Source: RegSvcs.exe, 00000015.00000002.514436513.000000000332C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sWLumX.com
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.279939033.0000000003491000.00000004.00000800.00020000.00000000.sdmp, WytzFSULZWRc.exe, 00000004.00000002.354685884.00000000031F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: RegSvcs.exe, 00000015.00000002.520096733.00000000036EF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000015.00000002.520049418.00000000036E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://3NOOLBR7kS.org
                Source: RegSvcs.exe, 00000003.00000002.361131528.0000000003051000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000015.00000002.514436513.000000000332C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                Source: unknownDNS traffic detected: queries for: mail.dmstech.in
                Source: WytzFSULZWRc.exe, 00000004.00000002.352489462.000000000150A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                System Summary

                barindex
                Source: 3.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 3.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.45619a0.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.45619a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.45619a0.1.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.45619a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 4.2.WytzFSULZWRc.exe.330ba34.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
                Source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.35aba94.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
                Source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.47ce798.3.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.47ce798.3.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.47ce798.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.47ce798.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000003.00000000.277620591.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000004.00000002.367091202.000000000452E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000000.00000002.283195697.0000000004499000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000000.00000002.285809118.0000000004780000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: PURCHASE ORDER # 12076038 & 12076022.exe PID: 6092, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: RegSvcs.exe PID: 4700, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: WytzFSULZWRc.exe PID: 2336, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: initial sampleStatic PE information: Filename: PURCHASE ORDER # 12076038 & 12076022.exe
                Source: 3.0.RegSvcs.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b504BEB59u002dACF3u002d46CAu002d9AC1u002dB8B3046B6B1Bu007d/u00367B27B58u002d50FFu002d4529u002dB63Bu002d7EF9B8C34D9D.csLarge array initialization: .cctor: array initializer size 10951
                Source: PURCHASE ORDER # 12076038 & 12076022.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: 3.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 3.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.45619a0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.45619a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.45619a0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.45619a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 4.2.WytzFSULZWRc.exe.330ba34.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
                Source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.35aba94.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
                Source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.47ce798.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.47ce798.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.47ce798.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.47ce798.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000003.00000000.277620591.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000004.00000002.367091202.000000000452E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000000.00000002.283195697.0000000004499000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000000.00000002.285809118.0000000004780000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: PURCHASE ORDER # 12076038 & 12076022.exe PID: 6092, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: RegSvcs.exe PID: 4700, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: WytzFSULZWRc.exe PID: 2336, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeCode function: 0_2_01B0C68C
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeCode function: 0_2_01B0E918
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeCode function: 0_2_01B0E908
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeCode function: 0_2_058DB721
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeCode function: 0_2_058DB730
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_02FCF760
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_02FCFAA8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_02FC6960
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05B9C530
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05B90548
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05B92638
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05B9A060
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05B9D290
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_061FB228
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_061F60D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_061FEE38
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_061F8EE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_061F7870
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_061FC478
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_061FB21A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_061F0040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_061FBEBF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_061F1F88
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_067A5858
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_067AA8B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_067A01D3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_067ABE48
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_067A6EBA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_067A5E80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_067A6F68
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 05B96F60 appears 52 times
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000000.237891678.0000000000F22000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameupNPDPF.exeH vs PURCHASE ORDER # 12076038 & 12076022.exe
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.283195697.0000000004499000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename07a44b5d-0712-4fdd-ae1b-2273e47c03d4.exe4 vs PURCHASE ORDER # 12076038 & 12076022.exe
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.293012061.0000000007CB0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs PURCHASE ORDER # 12076038 & 12076022.exe
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.285809118.0000000004780000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameupNPDPF.exeH vs PURCHASE ORDER # 12076038 & 12076022.exe
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.284178790.00000000045BC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs PURCHASE ORDER # 12076038 & 12076022.exe
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.279939033.0000000003491000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCassa.dll< vs PURCHASE ORDER # 12076038 & 12076022.exe
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.279939033.0000000003491000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename07a44b5d-0712-4fdd-ae1b-2273e47c03d4.exe4 vs PURCHASE ORDER # 12076038 & 12076022.exe
                Source: PURCHASE ORDER # 12076038 & 12076022.exeBinary or memory string: OriginalFilenameupNPDPF.exeH vs PURCHASE ORDER # 12076038 & 12076022.exe
                Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe 43026DCFF238F20CFF0419924486DEE45178119CFDD0D366B79D67D950A9BF50
                Source: PURCHASE ORDER # 12076038 & 12076022.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: WytzFSULZWRc.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: PURCHASE ORDER # 12076038 & 12076022.exeReversingLabs: Detection: 57%
                Source: PURCHASE ORDER # 12076038 & 12076022.exeVirustotal: Detection: 39%
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeFile read: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeJump to behavior
                Source: PURCHASE ORDER # 12076038 & 12076022.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WytzFSULZWRc" /XML "C:\Users\user\AppData\Local\Temp\tmp778D.tmp
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe "C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe"
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe "C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe"
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WytzFSULZWRc" /XML "C:\Users\user\AppData\Local\Temp\tmpF325.tmp
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WytzFSULZWRc" /XML "C:\Users\user\AppData\Local\Temp\tmp778D.tmp
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WytzFSULZWRc" /XML "C:\Users\user\AppData\Local\Temp\tmpF325.tmp
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
                Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeFile created: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeJump to behavior
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeFile created: C:\Users\user\AppData\Local\Temp\tmp778D.tmpJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@18/9@4/2
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: PURCHASE ORDER # 12076038 & 12076022.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5416:120:WilError_01
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5060:120:WilError_01
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2240:120:WilError_01
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeMutant created: \Sessions\1\BaseNamedObjects\NwyRyspTcDNYreUnejXNFB
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2888:120:WilError_01
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, jVvIi9fq9MfQaRHsIU/ayQGj2bHV7w9MNffvt.csCryptographic APIs: 'CreateDecryptor'
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, jVvIi9fq9MfQaRHsIU/ayQGj2bHV7w9MNffvt.csCryptographic APIs: 'CreateDecryptor'
                Source: WytzFSULZWRc.exe.0.dr, jVvIi9fq9MfQaRHsIU/ayQGj2bHV7w9MNffvt.csCryptographic APIs: 'CreateDecryptor'
                Source: WytzFSULZWRc.exe.0.dr, jVvIi9fq9MfQaRHsIU/ayQGj2bHV7w9MNffvt.csCryptographic APIs: 'CreateDecryptor'
                Source: 0.0.PURCHASE ORDER # 12076038 & 12076022.exe.f20000.0.unpack, jVvIi9fq9MfQaRHsIU/ayQGj2bHV7w9MNffvt.csCryptographic APIs: 'CreateDecryptor'
                Source: 0.0.PURCHASE ORDER # 12076038 & 12076022.exe.f20000.0.unpack, jVvIi9fq9MfQaRHsIU/ayQGj2bHV7w9MNffvt.csCryptographic APIs: 'CreateDecryptor'
                Source: 3.0.RegSvcs.exe.400000.0.unpack, A/f2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 3.0.RegSvcs.exe.400000.0.unpack, A/f2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: PURCHASE ORDER # 12076038 & 12076022.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: PURCHASE ORDER # 12076038 & 12076022.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: PURCHASE ORDER # 12076038 & 12076022.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: upNPDPF.pdb source: PURCHASE ORDER # 12076038 & 12076022.exe, WytzFSULZWRc.exe.0.dr
                Source: Binary string: RegSvcs.pdb, source: zBwkauB.exe, 0000000E.00000000.311265436.00000000003B2000.00000002.00000001.01000000.0000000B.sdmp, zBwkauB.exe.3.dr
                Source: Binary string: RegSvcs.pdb source: zBwkauB.exe, 0000000E.00000000.311265436.00000000003B2000.00000002.00000001.01000000.0000000B.sdmp, zBwkauB.exe.3.dr

                Data Obfuscation

                barindex
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, jVvIi9fq9MfQaRHsIU/ugy3qyJa0hsIhE8prU.cs.Net Code: dV592oReGS System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                Source: WytzFSULZWRc.exe.0.dr, jVvIi9fq9MfQaRHsIU/ugy3qyJa0hsIhE8prU.cs.Net Code: dV592oReGS System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                Source: 0.0.PURCHASE ORDER # 12076038 & 12076022.exe.f20000.0.unpack, jVvIi9fq9MfQaRHsIU/ugy3qyJa0hsIhE8prU.cs.Net Code: dV592oReGS System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, jVvIi9fq9MfQaRHsIU/ayQGj2bHV7w9MNffvt.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                Source: WytzFSULZWRc.exe.0.dr, jVvIi9fq9MfQaRHsIU/ayQGj2bHV7w9MNffvt.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                Source: 0.0.PURCHASE ORDER # 12076038 & 12076022.exe.f20000.0.unpack, jVvIi9fq9MfQaRHsIU/ayQGj2bHV7w9MNffvt.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_02FC67A0 push 08418B05h; ret
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05B9C472 push es; ret
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_061F44FD push es; retf
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_061F4549 push es; retf
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_061F3590 push es; retf
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_061F0040 push es; iretd
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_061F4141 push es; retf
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_061F6D88 push es; iretd
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_061F8BD0 push es; ret
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_067AF320 push 90061ECCh; retf
                Source: initial sampleStatic PE information: section name: .text entropy: 7.509653314187712
                Source: initial sampleStatic PE information: section name: .text entropy: 7.509653314187712
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, jVvIi9fq9MfQaRHsIU/ayQGj2bHV7w9MNffvt.csHigh entropy of concatenated method names: '.cctor', 'Hv7aJisxkSXT2', 'IbFKUwh7eQ', 'zmPKhgUsvr', 'vC6Kom7A2Z', 'WEsKAyJur1', 'mA2KOqXGJt', 'DxrK0lS3wu', 'MPtKEdqErM', 'R8hKx5Bqn0'
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, jVvIi9fq9MfQaRHsIU/Q6qGrMWpsJtFfdBU1i.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'LAHlNOK6u5', 'anboti67UZ', 'FwToUoAPC4', 'UHloebKQto', 'updoDiWdjM', 'VCgoCOHBw5', 'mUcoYnbQwI', 'FryojCwoRm'
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, jVvIi9fq9MfQaRHsIU/RnXpZdQtwQpMhw9iMl.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'Vtv9NMP3mZ', 'hUKo79qtHJ', 'xDpoasYMrD', 'FXEolApcGL', 'AVuoRBtOEK', 'iIboAaOaaU', 'RmsoK51O2J', 'AQEo8Dbbi3'
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, jVvIi9fq9MfQaRHsIU/CldwuoRdykqqYjFEFj.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'gC1ltSHwcn', 'UHloebKQto', 'updoDiWdjM', 'anboti67UZ', 'FwToUoAPC4', 'VCgoCOHBw5', 'mUcoYnbQwI', 'FryojCwoRm'
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, jVvIi9fq9MfQaRHsIU/X69VBSAYxwQs2Ac2mA.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'OdBQgpLHWt', 'hUKo79qtHJ', 'xDpoasYMrD', 'KI2geD0ZIv', 'XuDgDoYeAy', 'cjegjtCqe8', 'uJeg2v9tJP', 'hR5gBgqgGq'
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, jVvIi9fq9MfQaRHsIU/Q4EvWR9NJyhZOqWWHA.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'n4mFkxTwaj', 'UHloebKQto', 'updoDiWdjM', 'vHRbAnAgYX', 'eV7bKPA6ON', 'NFybbRclS9', 'ECsbZOfkho', 'GEtbokZEBh'
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, jVvIi9fq9MfQaRHsIU/fW6lUreU3immxdBQSS.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'iBRFEbGuV2', 'anboti67UZ', 'FwToUoAPC4', 'R8VgcEIxNI', 'bEbgpS0Dgj', 'DY0b1KMDbh', 'HaBbMKiuXZ', 'pN3gtXTTf4'
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, jVvIi9fq9MfQaRHsIU/yIRg8DskOKIX5TsYJa.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'iPpQEZFHyT', 'anboti67UZ', 'FwToUoAPC4', 'VCgoCOHBw5', 'mUcoYnbQwI', 'FryojCwoRm', 'gdpo2SBQmv', 'eIqokm3G5A'
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, jVvIi9fq9MfQaRHsIU/TKr659h2OpVFvWFlxm.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'e47B60WEc', 'mL46IQn8hb', 'eQx6OkW4Oe', 'l4m69XsGV2', 'gh76WpgUbW', 'Sxi6VW9XyJ', 'B1U6QCWTV2', 'Bcr60U3LED'
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, jVvIi9fq9MfQaRHsIU/ugy3qyJa0hsIhE8prU.csHigh entropy of concatenated method names: '.ctor', 'K6E99yODGT', 'llg9lUjqB9', 'Ka59QDxSQv', 'vn99Fch9rF', 'cpb9KvHt89', 'DfM9b3oVdb', 'T0A96PRGAr', 'Dispose', 'c0Q9Z9iGa5'
                Source: WytzFSULZWRc.exe.0.dr, jVvIi9fq9MfQaRHsIU/ayQGj2bHV7w9MNffvt.csHigh entropy of concatenated method names: '.cctor', 'Hv7aJisxkSXT2', 'IbFKUwh7eQ', 'zmPKhgUsvr', 'vC6Kom7A2Z', 'WEsKAyJur1', 'mA2KOqXGJt', 'DxrK0lS3wu', 'MPtKEdqErM', 'R8hKx5Bqn0'
                Source: WytzFSULZWRc.exe.0.dr, jVvIi9fq9MfQaRHsIU/RnXpZdQtwQpMhw9iMl.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'Vtv9NMP3mZ', 'hUKo79qtHJ', 'xDpoasYMrD', 'FXEolApcGL', 'AVuoRBtOEK', 'iIboAaOaaU', 'RmsoK51O2J', 'AQEo8Dbbi3'
                Source: WytzFSULZWRc.exe.0.dr, jVvIi9fq9MfQaRHsIU/Q6qGrMWpsJtFfdBU1i.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'LAHlNOK6u5', 'anboti67UZ', 'FwToUoAPC4', 'UHloebKQto', 'updoDiWdjM', 'VCgoCOHBw5', 'mUcoYnbQwI', 'FryojCwoRm'
                Source: WytzFSULZWRc.exe.0.dr, jVvIi9fq9MfQaRHsIU/CldwuoRdykqqYjFEFj.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'gC1ltSHwcn', 'UHloebKQto', 'updoDiWdjM', 'anboti67UZ', 'FwToUoAPC4', 'VCgoCOHBw5', 'mUcoYnbQwI', 'FryojCwoRm'
                Source: WytzFSULZWRc.exe.0.dr, jVvIi9fq9MfQaRHsIU/X69VBSAYxwQs2Ac2mA.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'OdBQgpLHWt', 'hUKo79qtHJ', 'xDpoasYMrD', 'KI2geD0ZIv', 'XuDgDoYeAy', 'cjegjtCqe8', 'uJeg2v9tJP', 'hR5gBgqgGq'
                Source: WytzFSULZWRc.exe.0.dr, jVvIi9fq9MfQaRHsIU/TKr659h2OpVFvWFlxm.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'e47B60WEc', 'mL46IQn8hb', 'eQx6OkW4Oe', 'l4m69XsGV2', 'gh76WpgUbW', 'Sxi6VW9XyJ', 'B1U6QCWTV2', 'Bcr60U3LED'
                Source: WytzFSULZWRc.exe.0.dr, jVvIi9fq9MfQaRHsIU/Q4EvWR9NJyhZOqWWHA.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'n4mFkxTwaj', 'UHloebKQto', 'updoDiWdjM', 'vHRbAnAgYX', 'eV7bKPA6ON', 'NFybbRclS9', 'ECsbZOfkho', 'GEtbokZEBh'
                Source: WytzFSULZWRc.exe.0.dr, jVvIi9fq9MfQaRHsIU/ugy3qyJa0hsIhE8prU.csHigh entropy of concatenated method names: '.ctor', 'K6E99yODGT', 'llg9lUjqB9', 'Ka59QDxSQv', 'vn99Fch9rF', 'cpb9KvHt89', 'DfM9b3oVdb', 'T0A96PRGAr', 'Dispose', 'c0Q9Z9iGa5'
                Source: WytzFSULZWRc.exe.0.dr, jVvIi9fq9MfQaRHsIU/fW6lUreU3immxdBQSS.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'iBRFEbGuV2', 'anboti67UZ', 'FwToUoAPC4', 'R8VgcEIxNI', 'bEbgpS0Dgj', 'DY0b1KMDbh', 'HaBbMKiuXZ', 'pN3gtXTTf4'
                Source: WytzFSULZWRc.exe.0.dr, jVvIi9fq9MfQaRHsIU/yIRg8DskOKIX5TsYJa.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'iPpQEZFHyT', 'anboti67UZ', 'FwToUoAPC4', 'VCgoCOHBw5', 'mUcoYnbQwI', 'FryojCwoRm', 'gdpo2SBQmv', 'eIqokm3G5A'
                Source: 0.0.PURCHASE ORDER # 12076038 & 12076022.exe.f20000.0.unpack, jVvIi9fq9MfQaRHsIU/ayQGj2bHV7w9MNffvt.csHigh entropy of concatenated method names: '.cctor', 'Hv7aJisxkSXT2', 'IbFKUwh7eQ', 'zmPKhgUsvr', 'vC6Kom7A2Z', 'WEsKAyJur1', 'mA2KOqXGJt', 'DxrK0lS3wu', 'MPtKEdqErM', 'R8hKx5Bqn0'
                Source: 0.0.PURCHASE ORDER # 12076038 & 12076022.exe.f20000.0.unpack, jVvIi9fq9MfQaRHsIU/RnXpZdQtwQpMhw9iMl.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'Vtv9NMP3mZ', 'hUKo79qtHJ', 'xDpoasYMrD', 'FXEolApcGL', 'AVuoRBtOEK', 'iIboAaOaaU', 'RmsoK51O2J', 'AQEo8Dbbi3'
                Source: 0.0.PURCHASE ORDER # 12076038 & 12076022.exe.f20000.0.unpack, jVvIi9fq9MfQaRHsIU/Q6qGrMWpsJtFfdBU1i.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'LAHlNOK6u5', 'anboti67UZ', 'FwToUoAPC4', 'UHloebKQto', 'updoDiWdjM', 'VCgoCOHBw5', 'mUcoYnbQwI', 'FryojCwoRm'
                Source: 0.0.PURCHASE ORDER # 12076038 & 12076022.exe.f20000.0.unpack, jVvIi9fq9MfQaRHsIU/CldwuoRdykqqYjFEFj.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'gC1ltSHwcn', 'UHloebKQto', 'updoDiWdjM', 'anboti67UZ', 'FwToUoAPC4', 'VCgoCOHBw5', 'mUcoYnbQwI', 'FryojCwoRm'
                Source: 0.0.PURCHASE ORDER # 12076038 & 12076022.exe.f20000.0.unpack, jVvIi9fq9MfQaRHsIU/X69VBSAYxwQs2Ac2mA.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'OdBQgpLHWt', 'hUKo79qtHJ', 'xDpoasYMrD', 'KI2geD0ZIv', 'XuDgDoYeAy', 'cjegjtCqe8', 'uJeg2v9tJP', 'hR5gBgqgGq'
                Source: 0.0.PURCHASE ORDER # 12076038 & 12076022.exe.f20000.0.unpack, jVvIi9fq9MfQaRHsIU/Q4EvWR9NJyhZOqWWHA.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'n4mFkxTwaj', 'UHloebKQto', 'updoDiWdjM', 'vHRbAnAgYX', 'eV7bKPA6ON', 'NFybbRclS9', 'ECsbZOfkho', 'GEtbokZEBh'
                Source: 0.0.PURCHASE ORDER # 12076038 & 12076022.exe.f20000.0.unpack, jVvIi9fq9MfQaRHsIU/TKr659h2OpVFvWFlxm.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'e47B60WEc', 'mL46IQn8hb', 'eQx6OkW4Oe', 'l4m69XsGV2', 'gh76WpgUbW', 'Sxi6VW9XyJ', 'B1U6QCWTV2', 'Bcr60U3LED'
                Source: 0.0.PURCHASE ORDER # 12076038 & 12076022.exe.f20000.0.unpack, jVvIi9fq9MfQaRHsIU/yIRg8DskOKIX5TsYJa.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'iPpQEZFHyT', 'anboti67UZ', 'FwToUoAPC4', 'VCgoCOHBw5', 'mUcoYnbQwI', 'FryojCwoRm', 'gdpo2SBQmv', 'eIqokm3G5A'
                Source: 0.0.PURCHASE ORDER # 12076038 & 12076022.exe.f20000.0.unpack, jVvIi9fq9MfQaRHsIU/ugy3qyJa0hsIhE8prU.csHigh entropy of concatenated method names: '.ctor', 'K6E99yODGT', 'llg9lUjqB9', 'Ka59QDxSQv', 'vn99Fch9rF', 'cpb9KvHt89', 'DfM9b3oVdb', 'T0A96PRGAr', 'Dispose', 'c0Q9Z9iGa5'
                Source: 0.0.PURCHASE ORDER # 12076038 & 12076022.exe.f20000.0.unpack, jVvIi9fq9MfQaRHsIU/fW6lUreU3immxdBQSS.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'iBRFEbGuV2', 'anboti67UZ', 'FwToUoAPC4', 'R8VgcEIxNI', 'bEbgpS0Dgj', 'DY0b1KMDbh', 'HaBbMKiuXZ', 'pN3gtXTTf4'
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeFile created: \purchase order # 12076038 & 12076022.exe
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeFile created: \purchase order # 12076038 & 12076022.exe
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeFile created: \purchase order # 12076038 & 12076022.exe
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeFile created: \purchase order # 12076038 & 12076022.exe
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeFile created: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeJump to dropped file
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WytzFSULZWRc" /XML "C:\Users\user\AppData\Local\Temp\tmp778D.tmp
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run zBwkauBJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run zBwkauBJump to behavior

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe:Zone.Identifier read attributes | delete
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe:Zone.Identifier read attributes | delete
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: PURCHASE ORDER # 12076038 & 12076022.exe PID: 6092, type: MEMORYSTR
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.279939033.0000000003491000.00000004.00000800.00020000.00000000.sdmp, WytzFSULZWRc.exe, 00000004.00000002.354685884.00000000031F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.279939033.0000000003491000.00000004.00000800.00020000.00000000.sdmp, WytzFSULZWRc.exe, 00000004.00000002.354685884.00000000031F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe TID: 6052Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe TID: 3516Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe TID: 3080Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe TID: 3796Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 9808
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 9713
                Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99875
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99765
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99655
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99546
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99437
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99327
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99216
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99106
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98997
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98888
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98780
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98672
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98559
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98453
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98341
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98234
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98125
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98015
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97905
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97796
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97687
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97577
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97468
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99843
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99734
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99624
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99512
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99390
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99280
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99172
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99062
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98953
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98841
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98695
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98578
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98452
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98344
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98212
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98109
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97993
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97890
                Source: WytzFSULZWRc.exe, 00000004.00000002.354685884.00000000031F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
                Source: WytzFSULZWRc.exe, 00000004.00000002.354685884.00000000031F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                Source: WytzFSULZWRc.exe, 00000004.00000002.354685884.00000000031F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: WytzFSULZWRc.exe, 00000004.00000002.354685884.00000000031F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                Source: WytzFSULZWRc.exe, 00000004.00000002.354685884.00000000031F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                Source: WytzFSULZWRc.exe, 00000004.00000002.354685884.00000000031F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: RegSvcs.exe, 00000003.00000002.358978578.0000000001278000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllData=C:\Windows\System32\Drivers\DriverDataHOMEDRIVE=C:HOMEPATH=\Users\userLOCALAPPDATA=C:\Users\user\AppData\LocalLOGONSERVER=\\computerNUMBER_OF_PROCESSORS=2OneDrive=C:\Users\user\OneDriveOS=Windows_NTPath=C:
                Source: WytzFSULZWRc.exe, 00000004.00000002.354685884.00000000031F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                Source: WytzFSULZWRc.exe, 00000004.00000002.354685884.00000000031F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                Source: WytzFSULZWRc.exe, 00000004.00000002.352688516.0000000001540000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: WytzFSULZWRc.exe, 00000004.00000002.354685884.00000000031F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                Source: RegSvcs.exe, 00000015.00000003.415359624.00000000067AD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess token adjusted: Debug
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_067A8D28 LdrInitializeThunk,
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeMemory allocated: page read and write | page guard

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 438000
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 43A000
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: F98008
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 438000
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 43A000
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 1030008
                Source: PURCHASE ORDER # 12076038 & 12076022.exe, jVvIi9fq9MfQaRHsIU/ayQGj2bHV7w9MNffvt.csReference to suspicious API methods: ('ceVK8Vd1G9', 'GetProcAddress@kernel32'), ('EO2KGTO024', 'LoadLibrary@kernel32')
                Source: WytzFSULZWRc.exe.0.dr, jVvIi9fq9MfQaRHsIU/ayQGj2bHV7w9MNffvt.csReference to suspicious API methods: ('ceVK8Vd1G9', 'GetProcAddress@kernel32'), ('EO2KGTO024', 'LoadLibrary@kernel32')
                Source: 0.0.PURCHASE ORDER # 12076038 & 12076022.exe.f20000.0.unpack, jVvIi9fq9MfQaRHsIU/ayQGj2bHV7w9MNffvt.csReference to suspicious API methods: ('ceVK8Vd1G9', 'GetProcAddress@kernel32'), ('EO2KGTO024', 'LoadLibrary@kernel32')
                Source: 3.0.RegSvcs.exe.400000.0.unpack, A/C1.csReference to suspicious API methods: ('A', 'VirtualAllocExNuma@kernel32.dll')
                Source: 3.0.RegSvcs.exe.400000.0.unpack, A/e2.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WytzFSULZWRc" /XML "C:\Users\user\AppData\Local\Temp\tmp778D.tmp
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WytzFSULZWRc" /XML "C:\Users\user\AppData\Local\Temp\tmpF325.tmp
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeQueries volume information: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeQueries volume information: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeQueries volume information: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 3.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.45619a0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.45619a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.47ce798.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000000.277620591.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.367091202.000000000452E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.283195697.0000000004499000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.285809118.0000000004780000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000015.00000002.514436513.000000000332C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.361131528.0000000003051000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: PURCHASE ORDER # 12076038 & 12076022.exe PID: 6092, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4700, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: WytzFSULZWRc.exe PID: 2336, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2240, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: Yara matchFile source: 00000015.00000002.514436513.000000000332C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.361131528.0000000003051000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4700, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2240, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 3.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.45619a0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.45619a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.PURCHASE ORDER # 12076038 & 12076022.exe.47ce798.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000000.277620591.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.367091202.000000000452E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.283195697.0000000004499000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.285809118.0000000004780000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000015.00000002.514436513.000000000332C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.361131528.0000000003051000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: PURCHASE ORDER # 12076038 & 12076022.exe PID: 6092, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4700, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: WytzFSULZWRc.exe PID: 2336, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2240, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts211
                Windows Management Instrumentation
                1
                Scheduled Task/Job
                211
                Process Injection
                1
                Disable or Modify Tools
                2
                OS Credential Dumping
                1
                File and Directory Discovery
                Remote Services11
                Archive Collected Data
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts1
                Native API
                1
                Registry Run Keys / Startup Folder
                1
                Scheduled Task/Job
                11
                Deobfuscate/Decode Files or Information
                1
                Input Capture
                114
                System Information Discovery
                Remote Desktop Protocol2
                Data from Local System
                Exfiltration Over Bluetooth1
                Non-Standard Port
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain Accounts1
                Scheduled Task/Job
                Logon Script (Windows)1
                Registry Run Keys / Startup Folder
                3
                Obfuscated Files or Information
                1
                Credentials in Registry
                311
                Security Software Discovery
                SMB/Windows Admin Shares1
                Email Collection
                Automated Exfiltration1
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)23
                Software Packing
                NTDS1
                Process Discovery
                Distributed Component Object Model1
                Input Capture
                Scheduled Transfer11
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Masquerading
                LSA Secrets131
                Virtualization/Sandbox Evasion
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common131
                Virtualization/Sandbox Evasion
                Cached Domain Credentials1
                Application Window Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items211
                Process Injection
                DCSync1
                Remote System Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                Hidden Files and Directories
                Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 756258 Sample: PURCHASE ORDER # 12076038 &... Startdate: 29/11/2022 Architecture: WINDOWS Score: 100 55 Snort IDS alert for network traffic 2->55 57 Malicious sample detected (through community Yara rule) 2->57 59 Sigma detected: Scheduled temp file as task from temp location 2->59 61 11 other signatures 2->61 7 PURCHASE ORDER # 12076038 & 12076022.exe 6 2->7         started        11 WytzFSULZWRc.exe 5 2->11         started        13 zBwkauB.exe 2 2->13         started        15 zBwkauB.exe 1 2->15         started        process3 file4 41 C:\Users\user\AppData\...\WytzFSULZWRc.exe, PE32 7->41 dropped 43 C:\Users\user\AppData\Local\...\tmp778D.tmp, XML 7->43 dropped 45 PURCHASE ORDER # 1... & 12076022.exe.log, ASCII 7->45 dropped 81 Writes to foreign memory regions 7->81 83 Injects a PE file into a foreign processes 7->83 17 RegSvcs.exe 2 5 7->17         started        22 schtasks.exe 1 7->22         started        85 Multi AV Scanner detection for dropped file 11->85 87 Machine Learning detection for dropped file 11->87 24 RegSvcs.exe 11->24         started        26 schtasks.exe 1 11->26         started        28 RegSvcs.exe 11->28         started        30 conhost.exe 13->30         started        32 conhost.exe 15->32         started        signatures5 process6 dnsIp7 47 dmstech.in 208.91.199.89, 49705, 49706, 587 PUBLIC-DOMAIN-REGISTRYUS United States 17->47 49 mail.dmstech.in 17->49 39 C:\Users\user\AppData\Roaming\...\zBwkauB.exe, PE32 17->39 dropped 67 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 17->67 69 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 17->69 71 Tries to steal Mail credentials (via file / registry access) 17->71 73 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 17->73 34 conhost.exe 22->34         started        51 mail.dmstech.in 24->51 53 192.168.2.1 unknown unknown 24->53 75 Tries to harvest and steal ftp login credentials 24->75 77 Tries to harvest and steal browser information (history, passwords, etc) 24->77 79 Hides that the sample has been downloaded from the Internet (zone.identifier) 24->79 37 conhost.exe 26->37         started        file8 signatures9 process10 signatures11 63 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 34->63 65 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 34->65

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                PURCHASE ORDER # 12076038 & 12076022.exe58%ReversingLabsWin32.Trojan.AgentTesla
                PURCHASE ORDER # 12076038 & 12076022.exe39%VirustotalBrowse
                PURCHASE ORDER # 12076038 & 12076022.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe58%ReversingLabsWin32.Trojan.AgentTesla
                C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe0%ReversingLabs
                SourceDetectionScannerLabelLinkDownload
                3.0.RegSvcs.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                SourceDetectionScannerLabelLink
                dmstech.in0%VirustotalBrowse
                mail.dmstech.in0%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                http://www.tiro.com0%URL Reputationsafe
                http://www.goodfont.co.kr0%URL Reputationsafe
                http://en.w0%URL Reputationsafe
                http://www.carterandcone.coml0%URL Reputationsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://www.typography.netD0%URL Reputationsafe
                http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                http://fontfabrik.com0%URL Reputationsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                http://www.sandoll.co.kr0%URL Reputationsafe
                http://www.urwpp.deDPlease0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://www.sakkal.com0%URL Reputationsafe
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                https://3NOOLBR7kS.org0%Avira URL Cloudsafe
                http://sWLumX.com0%Avira URL Cloudsafe
                http://dmstech.in0%Avira URL Cloudsafe
                http://mail.dmstech.in0%Avira URL Cloudsafe
                http://microsoft.coY0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                dmstech.in
                208.91.199.89
                truetrueunknown
                mail.dmstech.in
                unknown
                unknowntrueunknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://127.0.0.1:HTTP/1.1RegSvcs.exe, 00000003.00000002.361131528.0000000003051000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000015.00000002.514436513.000000000332C000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://www.apache.org/licenses/LICENSE-2.0PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.comPURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.com/designersGPURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://sWLumX.comRegSvcs.exe, 00000015.00000002.514436513.000000000332C000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.com/designers/?PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.founder.com.cn/cn/bThePURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers?PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwRegSvcs.exe, 00000003.00000002.361131528.0000000003051000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000015.00000002.514436513.000000000332C000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.tiro.comPURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designersPURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.goodfont.co.krPURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://en.wPURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000003.241071729.0000000001B1D000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comlPURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.sajatypeworks.comPURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.typography.netDPURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/cabarga.htmlNPURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.founder.com.cn/cn/cThePURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.galapagosdesign.com/staff/dennis.htmPURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://fontfabrik.comPURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cnPURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://3NOOLBR7kS.orgRegSvcs.exe, 00000015.00000002.520096733.00000000036EF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000015.00000002.520049418.00000000036E9000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fontbureau.com/designers/frere-jones.htmlPURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://dmstech.inRegSvcs.exe, 00000003.00000002.366864567.00000000033DB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000015.00000002.520096733.00000000036EF000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://DynDns.comDynDNSnamejidpasswordPsi/PsiRegSvcs.exe, 00000015.00000002.514436513.000000000332C000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.galapagosdesign.com/DPleasePURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers8PURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fonts.comPURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.sandoll.co.krPURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://mail.dmstech.inRegSvcs.exe, 00000003.00000002.366864567.00000000033DB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000015.00000002.520096733.00000000036EF000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.urwpp.deDPleasePURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.zhongyicts.com.cnPURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.279939033.0000000003491000.00000004.00000800.00020000.00000000.sdmp, WytzFSULZWRc.exe, 00000004.00000002.354685884.00000000031F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.sakkal.comPURCHASE ORDER # 12076038 & 12076022.exe, 00000000.00000002.289112556.0000000007492000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://microsoft.coYRegSvcs.exe, 00000003.00000003.320266236.0000000006602000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      208.91.199.89
                                      dmstech.inUnited States
                                      394695PUBLIC-DOMAIN-REGISTRYUStrue
                                      IP
                                      192.168.2.1
                                      Joe Sandbox Version:36.0.0 Rainbow Opal
                                      Analysis ID:756258
                                      Start date and time:2022-11-29 22:18:06 +01:00
                                      Joe Sandbox Product:CloudBasic
                                      Overall analysis duration:0h 9m 5s
                                      Hypervisor based Inspection enabled:false
                                      Report type:light
                                      Sample file name:PURCHASE ORDER # 12076038 & 12076022.exe
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                      Number of analysed new started processes analysed:24
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • HDC enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Detection:MAL
                                      Classification:mal100.troj.spyw.evad.winEXE@18/9@4/2
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HDC Information:Failed
                                      HCA Information:
                                      • Successful, ratio: 100%
                                      • Number of executed functions: 0
                                      • Number of non-executed functions: 0
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                      • Excluded domains from analysis (whitelisted): fs.microsoft.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      TimeTypeDescription
                                      22:19:07API Interceptor1x Sleep call for process: PURCHASE ORDER # 12076038 & 12076022.exe modified
                                      22:19:15Task SchedulerRun new task: WytzFSULZWRc path: C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe
                                      22:19:21AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run zBwkauB C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe
                                      22:19:30AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run zBwkauB C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe
                                      22:19:35API Interceptor426x Sleep call for process: RegSvcs.exe modified
                                      22:19:37API Interceptor1x Sleep call for process: WytzFSULZWRc.exe modified
                                      No context
                                      No context
                                      No context
                                      No context
                                      No context
                                      Process:C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1216
                                      Entropy (8bit):5.355304211458859
                                      Encrypted:false
                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                      MD5:69206D3AF7D6EFD08F4B4726998856D3
                                      SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                      SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                      SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                      Malicious:true
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                      Process:C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1216
                                      Entropy (8bit):5.355304211458859
                                      Encrypted:false
                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                      MD5:69206D3AF7D6EFD08F4B4726998856D3
                                      SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                      SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                      SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                      Malicious:false
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                      Process:C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:modified
                                      Size (bytes):142
                                      Entropy (8bit):5.090621108356562
                                      Encrypted:false
                                      SSDEEP:3:QHXMKa/xwwUC7WglAFXMWA2yTMGfsbNRLFS9Am12MFuAvOAsDeieVyn:Q3La/xwczlAFXMWTyAGCDLIP12MUAvvw
                                      MD5:8C0458BB9EA02D50565175E38D577E35
                                      SHA1:F0B50702CD6470F3C17D637908F83212FDBDB2F2
                                      SHA-256:C578E86DB701B9AFA3626E804CF434F9D32272FF59FB32FA9A51835E5A148B53
                                      SHA-512:804A47494D9A462FFA6F39759480700ECBE5A7F3A15EC3A6330176ED9C04695D2684BF6BF85AB86286D52E7B727436D0BB2E8DA96E20D47740B5CE3F856B5D0F
                                      Malicious:false
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.EnterpriseServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                      Process:C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1645
                                      Entropy (8bit):5.197464487238917
                                      Encrypted:false
                                      SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBgetn:cbh47TlNQ//rydbz9I3YODOLNdq3aY
                                      MD5:F31D3B5FC676A964BDB321B5C21BAD9B
                                      SHA1:95DB52D0B3424AC005CDF70E64031BFBA4C0F70A
                                      SHA-256:BF09998C04F6E0DBA73F0163DC84D6E8C5E3D5213EDF3A3398379E847D64C4C3
                                      SHA-512:8439161FE446F12A05498FB39920B4036CCF3A06D40A599EF0CC5A803C3AC4C4CE81AED4CE253AFA432BE708032A24A8183E49F270308A42C4554828C07CFFCA
                                      Malicious:true
                                      Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                      Process:C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1645
                                      Entropy (8bit):5.197464487238917
                                      Encrypted:false
                                      SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBgetn:cbh47TlNQ//rydbz9I3YODOLNdq3aY
                                      MD5:F31D3B5FC676A964BDB321B5C21BAD9B
                                      SHA1:95DB52D0B3424AC005CDF70E64031BFBA4C0F70A
                                      SHA-256:BF09998C04F6E0DBA73F0163DC84D6E8C5E3D5213EDF3A3398379E847D64C4C3
                                      SHA-512:8439161FE446F12A05498FB39920B4036CCF3A06D40A599EF0CC5A803C3AC4C4CE81AED4CE253AFA432BE708032A24A8183E49F270308A42C4554828C07CFFCA
                                      Malicious:false
                                      Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                      Process:C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):918528
                                      Entropy (8bit):7.515567629788117
                                      Encrypted:false
                                      SSDEEP:24576:A7mvLPt69/L1tmzf5LzjG1Vq5p73+KXGUInp:Di/L1t8F61VqP3+KC
                                      MD5:152C62372D3EA07D023E1E187766FD4B
                                      SHA1:32B630BC22B63D7EEE42851175EBE43A13A92C15
                                      SHA-256:B3E12ECDEE9EACC7354A7D43CCD3EBE7E6DB207E93F73B7A847FF4BEE9F27F86
                                      SHA-512:CDE084B3AD2E0E7068B4E48D7A58F1173D17BD297A95F3C4AF7EE104A80E3D9189D93877F044D652DE42F13D6E6C446BE97FC2C74D4AE857E93A10F84C68DCE7
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 58%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......c..............P......J......>.... ........@.. .......................`............@.....................................K........G...................@....................................................... ............... ..H............text...D.... ...................... ..`.rsrc....G.......H..................@..@.reloc.......@......................@..B................ .......H.......................................................................Z(....8.....(....8....*.&~.......*...~....*.b(....8......(....8.....*...&~.......*...~....*..0..y.......8j.......E.... ...8....s......... .....9....&8....*s.........8....s.........8....s.........8....s.........8....(....8........0..$.......8....8....8.....~....o......8......*.0..$.......8....8....8......*.~....o......8.....0..$.......8....8....8.....~....o......8......*.0...........~....o......8......*8..
                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):45152
                                      Entropy (8bit):6.149629800481177
                                      Encrypted:false
                                      SSDEEP:768:bBbSoy+SdIBf0k2dsYyV6Iq87PiU9FViaLmf:EoOIBf0ddsYy8LUjVBC
                                      MD5:2867A3817C9245F7CF518524DFD18F28
                                      SHA1:D7BA2A111CEDD5BF523224B3F1CFE58EEC7C2FDC
                                      SHA-256:43026DCFF238F20CFF0419924486DEE45178119CFDD0D366B79D67D950A9BF50
                                      SHA-512:7D3D3DBB42B7966644D716AA9CBC75327B2ACB02E43C61F1DAD4AFE5521F9FE248B33347DFE15B637FB33EB97CDB322BCAEAE08BAE3F2FD863A9AD9B3A4D6B42
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...zX.Z..............0..d..........V.... ........@.. ..............................."....`.....................................O.......8............r..`>.......................................................... ............... ..H............text...\c... ...d.................. ..`.rsrc...8............f..............@..@.reloc...............p..............@..B................8.......H........+...S..........|...P...........................................r...p(....*2.(....(....*z..r...p(....(....(......}....*..{....*.s.........*.0..{...........Q.-.s.....+i~....o....(.....s.......o.....r!..p..(....Q.P,:.P.....(....o....o ........(....o!...o".....,..o#...t......*..0..(....... ....s$........o%....X..(....-..*.o&...*.0...........('......&.....*.*...................0...........(.......&.....*.................0............(.....(....~....,.(....~....o....9]...
                                      Process:C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1141
                                      Entropy (8bit):4.44831826838854
                                      Encrypted:false
                                      SSDEEP:24:zKLXkb4DObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0b4DQntKKH1MqJC
                                      MD5:1AEB3A784552CFD2AEDEDC1D43A97A4F
                                      SHA1:804286AB9F8B3DE053222826A69A7CDA3492411A
                                      SHA-256:0BC438F4B1208E1390C12D375B6CBB08BF47599D1F24BD07799BB1DF384AA293
                                      SHA-512:5305059BA86D5C2185E590EC036044B2A17ED9FD9863C2E3C7E7D8035EF0C79E53357AF5AE735F7D432BC70156D4BD3ACB42D100CFB05C2FB669EA22368F1415
                                      Malicious:false
                                      Preview:Microsoft (R) .NET Framework Services Installation Utility Version 4.7.3056.0..Copyright (C) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output... /c
                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):7.515567629788117
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                      • Win32 Executable (generic) a (10002005/4) 49.75%
                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                      • Windows Screen Saver (13104/52) 0.07%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      File name:PURCHASE ORDER # 12076038 & 12076022.exe
                                      File size:918528
                                      MD5:152c62372d3ea07d023e1e187766fd4b
                                      SHA1:32b630bc22b63d7eee42851175ebe43a13a92c15
                                      SHA256:b3e12ecdee9eacc7354a7d43ccd3ebe7e6db207e93f73b7a847ff4bee9f27f86
                                      SHA512:cde084b3ad2e0e7068b4e48d7a58f1173d17bd297a95f3c4af7ee104a80e3d9189d93877f044d652de42f13d6e6c446be97fc2c74d4ae857e93a10f84c68dce7
                                      SSDEEP:24576:A7mvLPt69/L1tmzf5LzjG1Vq5p73+KXGUInp:Di/L1t8F61VqP3+KC
                                      TLSH:CF158C5173728973F5CF01398485718DAEBCA543A2A6E3076F763A8146027FBFA9CE41
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......c..............P......J......>.... ........@.. .......................`............@................................
                                      Icon Hash:b1c8e8b28e86b2ce
                                      Entrypoint:0x4dd63e
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x63858EAD [Tue Nov 29 04:46:37 2022 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                      Instruction
                                      jmp dword ptr [00402000h]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xdd5f00x4b.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xde0000x478c.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xe40000xc.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0xdd5aa0x1c.text
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000xdb6440xdb800False0.7776351615888383data7.509653314187712IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rsrc0xde0000x478c0x4800False0.9128689236111112data7.700204068393804IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0xe40000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountry
                                      RT_ICON0xde1300x411fPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                      RT_GROUP_ICON0xe22500x14data
                                      RT_VERSION0xe22640x33cdata
                                      RT_MANIFEST0xe25a00x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                      DLLImport
                                      mscoree.dll_CorExeMain
                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                      192.168.2.3208.91.199.89497065872030171 11/29/22-22:20:18.265371TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49706587192.168.2.3208.91.199.89
                                      192.168.2.3208.91.199.89497065872851779 11/29/22-22:20:18.265452TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49706587192.168.2.3208.91.199.89
                                      192.168.2.3208.91.199.89497055872840032 11/29/22-22:19:37.697367TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249705587192.168.2.3208.91.199.89
                                      192.168.2.3208.91.199.89497055872839723 11/29/22-22:19:37.697241TCP2839723ETPRO TROJAN Win32/Agent Tesla SMTP Activity49705587192.168.2.3208.91.199.89
                                      192.168.2.3208.91.199.89497065872840032 11/29/22-22:20:18.265452TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249706587192.168.2.3208.91.199.89
                                      192.168.2.3208.91.199.89497055872851779 11/29/22-22:19:37.697367TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49705587192.168.2.3208.91.199.89
                                      192.168.2.3208.91.199.89497055872030171 11/29/22-22:19:37.697241TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49705587192.168.2.3208.91.199.89
                                      192.168.2.3208.91.199.89497065872839723 11/29/22-22:20:18.265371TCP2839723ETPRO TROJAN Win32/Agent Tesla SMTP Activity49706587192.168.2.3208.91.199.89
                                      TimestampSource PortDest PortSource IPDest IP
                                      Nov 29, 2022 22:19:35.801080942 CET49705587192.168.2.3208.91.199.89
                                      Nov 29, 2022 22:19:35.968539953 CET58749705208.91.199.89192.168.2.3
                                      Nov 29, 2022 22:19:35.968652010 CET49705587192.168.2.3208.91.199.89
                                      Nov 29, 2022 22:19:36.523387909 CET58749705208.91.199.89192.168.2.3
                                      Nov 29, 2022 22:19:36.523840904 CET49705587192.168.2.3208.91.199.89
                                      Nov 29, 2022 22:19:36.691860914 CET58749705208.91.199.89192.168.2.3
                                      Nov 29, 2022 22:19:36.694359064 CET49705587192.168.2.3208.91.199.89
                                      Nov 29, 2022 22:19:36.863188028 CET58749705208.91.199.89192.168.2.3
                                      Nov 29, 2022 22:19:36.863584995 CET49705587192.168.2.3208.91.199.89
                                      Nov 29, 2022 22:19:37.071551085 CET58749705208.91.199.89192.168.2.3
                                      Nov 29, 2022 22:19:37.145133972 CET58749705208.91.199.89192.168.2.3
                                      Nov 29, 2022 22:19:37.154403925 CET49705587192.168.2.3208.91.199.89
                                      Nov 29, 2022 22:19:37.322257042 CET58749705208.91.199.89192.168.2.3
                                      Nov 29, 2022 22:19:37.322310925 CET58749705208.91.199.89192.168.2.3
                                      Nov 29, 2022 22:19:37.322535992 CET49705587192.168.2.3208.91.199.89
                                      Nov 29, 2022 22:19:37.527550936 CET58749705208.91.199.89192.168.2.3
                                      Nov 29, 2022 22:19:37.528011084 CET49705587192.168.2.3208.91.199.89
                                      Nov 29, 2022 22:19:37.695395947 CET58749705208.91.199.89192.168.2.3
                                      Nov 29, 2022 22:19:37.695449114 CET58749705208.91.199.89192.168.2.3
                                      Nov 29, 2022 22:19:37.697241068 CET49705587192.168.2.3208.91.199.89
                                      Nov 29, 2022 22:19:37.697366953 CET49705587192.168.2.3208.91.199.89
                                      Nov 29, 2022 22:19:37.698301077 CET49705587192.168.2.3208.91.199.89
                                      Nov 29, 2022 22:19:37.698385000 CET49705587192.168.2.3208.91.199.89
                                      Nov 29, 2022 22:19:37.865403891 CET58749705208.91.199.89192.168.2.3
                                      Nov 29, 2022 22:19:37.865840912 CET58749705208.91.199.89192.168.2.3
                                      Nov 29, 2022 22:19:37.867372990 CET58749705208.91.199.89192.168.2.3
                                      Nov 29, 2022 22:19:38.034188986 CET49705587192.168.2.3208.91.199.89
                                      Nov 29, 2022 22:19:59.552499056 CET49705587192.168.2.3208.91.199.89
                                      Nov 29, 2022 22:20:16.669173956 CET49706587192.168.2.3208.91.199.89
                                      Nov 29, 2022 22:20:16.835613012 CET58749706208.91.199.89192.168.2.3
                                      Nov 29, 2022 22:20:16.839237928 CET49706587192.168.2.3208.91.199.89
                                      Nov 29, 2022 22:20:17.111228943 CET58749706208.91.199.89192.168.2.3
                                      Nov 29, 2022 22:20:17.111500978 CET49706587192.168.2.3208.91.199.89
                                      Nov 29, 2022 22:20:17.278064966 CET58749706208.91.199.89192.168.2.3
                                      Nov 29, 2022 22:20:17.279891014 CET49706587192.168.2.3208.91.199.89
                                      Nov 29, 2022 22:20:17.446726084 CET58749706208.91.199.89192.168.2.3
                                      Nov 29, 2022 22:20:17.451299906 CET49706587192.168.2.3208.91.199.89
                                      Nov 29, 2022 22:20:17.658471107 CET58749706208.91.199.89192.168.2.3
                                      Nov 29, 2022 22:20:17.717804909 CET58749706208.91.199.89192.168.2.3
                                      Nov 29, 2022 22:20:17.718281984 CET49706587192.168.2.3208.91.199.89
                                      Nov 29, 2022 22:20:17.885377884 CET58749706208.91.199.89192.168.2.3
                                      Nov 29, 2022 22:20:17.885437012 CET58749706208.91.199.89192.168.2.3
                                      Nov 29, 2022 22:20:17.886018038 CET49706587192.168.2.3208.91.199.89
                                      Nov 29, 2022 22:20:18.092221975 CET58749706208.91.199.89192.168.2.3
                                      Nov 29, 2022 22:20:18.097486973 CET58749706208.91.199.89192.168.2.3
                                      Nov 29, 2022 22:20:18.098026037 CET49706587192.168.2.3208.91.199.89
                                      Nov 29, 2022 22:20:18.264190912 CET58749706208.91.199.89192.168.2.3
                                      Nov 29, 2022 22:20:18.264388084 CET58749706208.91.199.89192.168.2.3
                                      Nov 29, 2022 22:20:18.265371084 CET49706587192.168.2.3208.91.199.89
                                      Nov 29, 2022 22:20:18.265451908 CET49706587192.168.2.3208.91.199.89
                                      Nov 29, 2022 22:20:18.265486002 CET49706587192.168.2.3208.91.199.89
                                      Nov 29, 2022 22:20:18.265549898 CET49706587192.168.2.3208.91.199.89
                                      Nov 29, 2022 22:20:18.432292938 CET58749706208.91.199.89192.168.2.3
                                      Nov 29, 2022 22:20:18.432522058 CET58749706208.91.199.89192.168.2.3
                                      Nov 29, 2022 22:20:18.434081078 CET58749706208.91.199.89192.168.2.3
                                      Nov 29, 2022 22:20:18.537656069 CET49706587192.168.2.3208.91.199.89
                                      TimestampSource PortDest PortSource IPDest IP
                                      Nov 29, 2022 22:19:35.390892982 CET5784053192.168.2.38.8.8.8
                                      Nov 29, 2022 22:19:35.550303936 CET53578408.8.8.8192.168.2.3
                                      Nov 29, 2022 22:19:35.618180990 CET5799053192.168.2.38.8.8.8
                                      Nov 29, 2022 22:19:35.788932085 CET53579908.8.8.8192.168.2.3
                                      Nov 29, 2022 22:20:16.405905008 CET5238753192.168.2.38.8.8.8
                                      Nov 29, 2022 22:20:16.564357042 CET53523878.8.8.8192.168.2.3
                                      Nov 29, 2022 22:20:16.630955935 CET5692453192.168.2.38.8.8.8
                                      Nov 29, 2022 22:20:16.648231030 CET53569248.8.8.8192.168.2.3
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Nov 29, 2022 22:19:35.390892982 CET192.168.2.38.8.8.80xfd0Standard query (0)mail.dmstech.inA (IP address)IN (0x0001)false
                                      Nov 29, 2022 22:19:35.618180990 CET192.168.2.38.8.8.80x871cStandard query (0)mail.dmstech.inA (IP address)IN (0x0001)false
                                      Nov 29, 2022 22:20:16.405905008 CET192.168.2.38.8.8.80xc336Standard query (0)mail.dmstech.inA (IP address)IN (0x0001)false
                                      Nov 29, 2022 22:20:16.630955935 CET192.168.2.38.8.8.80x9333Standard query (0)mail.dmstech.inA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Nov 29, 2022 22:19:35.550303936 CET8.8.8.8192.168.2.30xfd0No error (0)mail.dmstech.indmstech.inCNAME (Canonical name)IN (0x0001)false
                                      Nov 29, 2022 22:19:35.550303936 CET8.8.8.8192.168.2.30xfd0No error (0)dmstech.in208.91.199.89A (IP address)IN (0x0001)false
                                      Nov 29, 2022 22:19:35.788932085 CET8.8.8.8192.168.2.30x871cNo error (0)mail.dmstech.indmstech.inCNAME (Canonical name)IN (0x0001)false
                                      Nov 29, 2022 22:19:35.788932085 CET8.8.8.8192.168.2.30x871cNo error (0)dmstech.in208.91.199.89A (IP address)IN (0x0001)false
                                      Nov 29, 2022 22:20:16.564357042 CET8.8.8.8192.168.2.30xc336No error (0)mail.dmstech.indmstech.inCNAME (Canonical name)IN (0x0001)false
                                      Nov 29, 2022 22:20:16.564357042 CET8.8.8.8192.168.2.30xc336No error (0)dmstech.in208.91.199.89A (IP address)IN (0x0001)false
                                      Nov 29, 2022 22:20:16.648231030 CET8.8.8.8192.168.2.30x9333No error (0)mail.dmstech.indmstech.inCNAME (Canonical name)IN (0x0001)false
                                      Nov 29, 2022 22:20:16.648231030 CET8.8.8.8192.168.2.30x9333No error (0)dmstech.in208.91.199.89A (IP address)IN (0x0001)false
                                      TimestampSource PortDest PortSource IPDest IPCommands
                                      Nov 29, 2022 22:19:36.523387909 CET58749705208.91.199.89192.168.2.3220-bh-14.webhostbox.net ESMTP Exim 4.95 #2 Tue, 29 Nov 2022 21:19:36 +0000
                                      220-We do not authorize the use of this system to transport unsolicited,
                                      220 and/or bulk e-mail.
                                      Nov 29, 2022 22:19:36.523840904 CET49705587192.168.2.3208.91.199.89EHLO 632922
                                      Nov 29, 2022 22:19:36.691860914 CET58749705208.91.199.89192.168.2.3250-bh-14.webhostbox.net Hello 632922 [102.129.143.49]
                                      250-SIZE 52428800
                                      250-8BITMIME
                                      250-PIPELINING
                                      250-PIPE_CONNECT
                                      250-AUTH PLAIN LOGIN
                                      250-STARTTLS
                                      250 HELP
                                      Nov 29, 2022 22:19:36.694359064 CET49705587192.168.2.3208.91.199.89AUTH login c2FuamVldkBkbXN0ZWNoLmlu
                                      Nov 29, 2022 22:19:36.863188028 CET58749705208.91.199.89192.168.2.3334 UGFzc3dvcmQ6
                                      Nov 29, 2022 22:19:37.145133972 CET58749705208.91.199.89192.168.2.3235 Authentication succeeded
                                      Nov 29, 2022 22:19:37.154403925 CET49705587192.168.2.3208.91.199.89MAIL FROM:<sanjeev@dmstech.in>
                                      Nov 29, 2022 22:19:37.322310925 CET58749705208.91.199.89192.168.2.3250 OK
                                      Nov 29, 2022 22:19:37.322535992 CET49705587192.168.2.3208.91.199.89RCPT TO:<zakirrome@ostdubai.com>
                                      Nov 29, 2022 22:19:37.527550936 CET58749705208.91.199.89192.168.2.3250 Accepted
                                      Nov 29, 2022 22:19:37.528011084 CET49705587192.168.2.3208.91.199.89DATA
                                      Nov 29, 2022 22:19:37.695449114 CET58749705208.91.199.89192.168.2.3354 Enter message, ending with "." on a line by itself
                                      Nov 29, 2022 22:19:37.698385000 CET49705587192.168.2.3208.91.199.89.
                                      Nov 29, 2022 22:19:37.867372990 CET58749705208.91.199.89192.168.2.3250 OK id=1p080v-003OlA-Jk
                                      Nov 29, 2022 22:20:17.111228943 CET58749706208.91.199.89192.168.2.3220-bh-14.webhostbox.net ESMTP Exim 4.95 #2 Tue, 29 Nov 2022 21:20:17 +0000
                                      220-We do not authorize the use of this system to transport unsolicited,
                                      220 and/or bulk e-mail.
                                      Nov 29, 2022 22:20:17.111500978 CET49706587192.168.2.3208.91.199.89EHLO 632922
                                      Nov 29, 2022 22:20:17.278064966 CET58749706208.91.199.89192.168.2.3250-bh-14.webhostbox.net Hello 632922 [102.129.143.49]
                                      250-SIZE 52428800
                                      250-8BITMIME
                                      250-PIPELINING
                                      250-PIPE_CONNECT
                                      250-AUTH PLAIN LOGIN
                                      250-STARTTLS
                                      250 HELP
                                      Nov 29, 2022 22:20:17.279891014 CET49706587192.168.2.3208.91.199.89AUTH login c2FuamVldkBkbXN0ZWNoLmlu
                                      Nov 29, 2022 22:20:17.446726084 CET58749706208.91.199.89192.168.2.3334 UGFzc3dvcmQ6
                                      Nov 29, 2022 22:20:17.717804909 CET58749706208.91.199.89192.168.2.3235 Authentication succeeded
                                      Nov 29, 2022 22:20:17.718281984 CET49706587192.168.2.3208.91.199.89MAIL FROM:<sanjeev@dmstech.in>
                                      Nov 29, 2022 22:20:17.885437012 CET58749706208.91.199.89192.168.2.3250 OK
                                      Nov 29, 2022 22:20:17.886018038 CET49706587192.168.2.3208.91.199.89RCPT TO:<zakirrome@ostdubai.com>
                                      Nov 29, 2022 22:20:18.097486973 CET58749706208.91.199.89192.168.2.3250 Accepted
                                      Nov 29, 2022 22:20:18.098026037 CET49706587192.168.2.3208.91.199.89DATA
                                      Nov 29, 2022 22:20:18.264388084 CET58749706208.91.199.89192.168.2.3354 Enter message, ending with "." on a line by itself
                                      Nov 29, 2022 22:20:18.265549898 CET49706587192.168.2.3208.91.199.89.
                                      Nov 29, 2022 22:20:18.434081078 CET58749706208.91.199.89192.168.2.3250 OK id=1p081a-003PsE-5q

                                      Click to jump to process

                                      Target ID:0
                                      Start time:22:18:55
                                      Start date:29/11/2022
                                      Path:C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\Desktop\PURCHASE ORDER # 12076038 & 12076022.exe
                                      Imagebase:0xf20000
                                      File size:918528 bytes
                                      MD5 hash:152C62372D3EA07D023E1E187766FD4B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.283195697.0000000004499000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.283195697.0000000004499000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.283195697.0000000004499000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.285809118.0000000004780000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.285809118.0000000004780000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.285809118.0000000004780000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      Reputation:low

                                      Target ID:1
                                      Start time:22:19:13
                                      Start date:29/11/2022
                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WytzFSULZWRc" /XML "C:\Users\user\AppData\Local\Temp\tmp778D.tmp
                                      Imagebase:0xab0000
                                      File size:185856 bytes
                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:2
                                      Start time:22:19:14
                                      Start date:29/11/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff745070000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:3
                                      Start time:22:19:14
                                      Start date:29/11/2022
                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      Wow64 process (32bit):true
                                      Commandline:{path}
                                      Imagebase:0xd50000
                                      File size:45152 bytes
                                      MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000000.277620591.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000003.00000000.277620591.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000003.00000000.277620591.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.361131528.0000000003051000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.361131528.0000000003051000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:high

                                      Target ID:4
                                      Start time:22:19:15
                                      Start date:29/11/2022
                                      Path:C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\AppData\Roaming\WytzFSULZWRc.exe
                                      Imagebase:0xd60000
                                      File size:918528 bytes
                                      MD5 hash:152C62372D3EA07D023E1E187766FD4B
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.367091202.000000000452E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000004.00000002.367091202.000000000452E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000004.00000002.367091202.000000000452E000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      Antivirus matches:
                                      • Detection: 100%, Joe Sandbox ML
                                      • Detection: 58%, ReversingLabs
                                      Reputation:low

                                      Target ID:14
                                      Start time:22:19:30
                                      Start date:29/11/2022
                                      Path:C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe"
                                      Imagebase:0x3b0000
                                      File size:45152 bytes
                                      MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:.Net C# or VB.NET
                                      Antivirus matches:
                                      • Detection: 0%, ReversingLabs
                                      Reputation:high

                                      Target ID:15
                                      Start time:22:19:30
                                      Start date:29/11/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff745070000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:16
                                      Start time:22:19:39
                                      Start date:29/11/2022
                                      Path:C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\AppData\Roaming\zBwkauB\zBwkauB.exe"
                                      Imagebase:0x580000
                                      File size:45152 bytes
                                      MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:.Net C# or VB.NET
                                      Reputation:high

                                      Target ID:17
                                      Start time:22:19:40
                                      Start date:29/11/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff745070000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:18
                                      Start time:22:19:45
                                      Start date:29/11/2022
                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WytzFSULZWRc" /XML "C:\Users\user\AppData\Local\Temp\tmpF325.tmp
                                      Imagebase:0xab0000
                                      File size:185856 bytes
                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:19
                                      Start time:22:19:46
                                      Start date:29/11/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff745070000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:20
                                      Start time:22:19:46
                                      Start date:29/11/2022
                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      Wow64 process (32bit):false
                                      Commandline:{path}
                                      Imagebase:0x330000
                                      File size:45152 bytes
                                      MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language

                                      Target ID:21
                                      Start time:22:19:48
                                      Start date:29/11/2022
                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      Wow64 process (32bit):true
                                      Commandline:{path}
                                      Imagebase:0xf10000
                                      File size:45152 bytes
                                      MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000015.00000002.514436513.000000000332C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000015.00000002.514436513.000000000332C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security

                                      No disassembly