Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO.exe

Overview

General Information

Sample Name:PO.exe
Analysis ID:830558
MD5:03d90e26c8a6fbbeb284359b0f90ee91
SHA1:68b83832a4423003564a8df9af2cda29622190a0
SHA256:eb2ad014aa499fd10c8ec16353295ace996e28a7d822097caf7bd11929c0b558
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Multi AV Scanner detection for dropped file
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Machine Learning detection for sample
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • PO.exe (PID: 5176 cmdline: C:\Users\user\Desktop\PO.exe MD5: 03D90E26C8A6FBBEB284359B0F90EE91)
    • PO.exe (PID: 1116 cmdline: C:\Users\user\Desktop\PO.exe MD5: 03D90E26C8A6FBBEB284359B0F90EE91)
  • keWKhH.exe (PID: 5144 cmdline: "C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe" MD5: 03D90E26C8A6FBBEB284359B0F90EE91)
    • keWKhH.exe (PID: 2888 cmdline: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe MD5: 03D90E26C8A6FBBEB284359B0F90EE91)
    • keWKhH.exe (PID: 4980 cmdline: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe MD5: 03D90E26C8A6FBBEB284359B0F90EE91)
  • keWKhH.exe (PID: 6084 cmdline: "C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe" MD5: 03D90E26C8A6FBBEB284359B0F90EE91)
    • keWKhH.exe (PID: 3932 cmdline: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe MD5: 03D90E26C8A6FBBEB284359B0F90EE91)
    • keWKhH.exe (PID: 3180 cmdline: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe MD5: 03D90E26C8A6FBBEB284359B0F90EE91)
  • cleanup
{"Exfil Mode": "SMTP", "Host": "us2.smtp.mailhostbox.com", "Username": "sudeni@dalwabo-jp.com", "Password": "     dLm)Xyz9     "}
SourceRuleDescriptionAuthorStrings
00000006.00000002.536082591.0000000002E81000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000006.00000002.536082591.0000000002E81000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000010.00000002.536562013.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000010.00000002.536562013.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0000000D.00000002.536833086.000000000311C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 7 entries
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: PO.exeReversingLabs: Detection: 38%
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeReversingLabs: Detection: 38%
            Source: PO.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeJoe Sandbox ML: detected
            Source: 0.2.PO.exe.3f2eeb0.8.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "us2.smtp.mailhostbox.com", "Username": "sudeni@dalwabo-jp.com", "Password": " dLm)Xyz9 "}
            Source: PO.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: PO.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: wAGa.pdb source: PO.exe, keWKhH.exe.6.dr
            Source: Binary string: wAGa.pdbSHA256 source: PO.exe, keWKhH.exe.6.dr
            Source: Joe Sandbox ViewIP Address: 208.91.198.143 208.91.198.143
            Source: global trafficTCP traffic: 192.168.2.3:49700 -> 208.91.198.143:587
            Source: global trafficTCP traffic: 192.168.2.3:49703 -> 208.91.199.223:587
            Source: global trafficTCP traffic: 192.168.2.3:49700 -> 208.91.198.143:587
            Source: global trafficTCP traffic: 192.168.2.3:49703 -> 208.91.199.223:587
            Source: PO.exe, 00000006.00000002.533158671.00000000012C0000.00000004.00000020.00020000.00000000.sdmp, PO.exe, 00000006.00000002.533158671.0000000001258000.00000004.00000020.00020000.00000000.sdmp, PO.exe, 00000006.00000002.536082591.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 0000000D.00000002.536833086.0000000003169000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 00000010.00000002.536562013.0000000002AF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
            Source: PO.exe, 00000006.00000002.533158671.0000000001258000.00000004.00000020.00020000.00000000.sdmp, PO.exe, 00000006.00000002.553635276.00000000068B4000.00000004.00000020.00020000.00000000.sdmp, PO.exe, 00000006.00000002.536082591.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 00000006.00000002.533158671.000000000129D000.00000004.00000020.00020000.00000000.sdmp, keWKhH.exe, 0000000D.00000002.536833086.0000000003169000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 00000010.00000002.536562013.0000000002AF9000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 00000010.00000002.533734950.0000000000E48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
            Source: PO.exe, 00000006.00000002.533158671.0000000001258000.00000004.00000020.00020000.00000000.sdmp, PO.exe, 00000006.00000002.536082591.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 00000006.00000002.533158671.000000000129D000.00000004.00000020.00020000.00000000.sdmp, keWKhH.exe, 0000000D.00000002.536833086.0000000003169000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 00000010.00000002.536562013.0000000002AF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
            Source: PO.exe, 00000006.00000002.533158671.00000000012C0000.00000004.00000020.00020000.00000000.sdmp, PO.exe, 00000006.00000002.533158671.0000000001258000.00000004.00000020.00020000.00000000.sdmp, PO.exe, 00000006.00000002.536082591.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 0000000D.00000002.536833086.0000000003169000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 00000010.00000002.536562013.0000000002AF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
            Source: PO.exe, 00000006.00000002.533158671.0000000001258000.00000004.00000020.00020000.00000000.sdmp, PO.exe, 00000006.00000002.536082591.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 00000006.00000002.533158671.000000000129D000.00000004.00000020.00020000.00000000.sdmp, keWKhH.exe, 0000000D.00000002.536833086.0000000003169000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 00000010.00000002.536562013.0000000002AF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0A
            Source: PO.exe, 00000006.00000002.536082591.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 0000000D.00000002.536833086.0000000003169000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 00000010.00000002.536562013.0000000002AF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://us2.smtp.mailhostbox.com
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
            Source: PO.exe, 00000006.00000002.533158671.0000000001258000.00000004.00000020.00020000.00000000.sdmp, PO.exe, 00000006.00000002.536082591.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 00000006.00000002.533158671.000000000129D000.00000004.00000020.00020000.00000000.sdmp, keWKhH.exe, 0000000D.00000002.536833086.0000000003169000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 00000010.00000002.536562013.0000000002AF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
            Source: unknownDNS traffic detected: queries for: us2.smtp.mailhostbox.com
            Source: keWKhH.exe, 0000000B.00000002.330356628.00000000007B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
            Source: PO.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_00FDC844
            Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_00FDF1F8
            Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_00FDF1E8
            Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_054A0040
            Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_054A0006
            Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_054A02D1
            Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_054A02E0
            Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_054A9D40
            Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_05B302E0
            Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_05B348C0
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_02D6A9B8
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_02D6C978
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_02D69DA0
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_02D6A0E8
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06325668
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06320400
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_063223E8
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_063273C8
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06329008
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06321D28
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06326A38
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06AACEC0
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06AA3E51
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06AA0040
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06AAF188
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06AABFC8
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06AAAD48
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06AA3A48
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06AAF390
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06AAF8FF
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06AA81A0
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_022CC844
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_022CF1E8
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_022CF1F8
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_04A80240
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_04A84278
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_04A80882
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_065E02D1
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_065E02E0
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_065E0040
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_065E0006
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_065F02E0
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_065F4940
            Source: PO.exe, 00000000.00000000.264075707.0000000000748000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewAGa.exe> vs PO.exe
            Source: PO.exe, 00000000.00000002.312416410.0000000007340000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameOutimurs.dll2 vs PO.exe
            Source: PO.exe, 00000000.00000002.302999935.0000000003B79000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOutimurs.dll2 vs PO.exe
            Source: PO.exe, 00000000.00000002.289521683.0000000002C47000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCruiser.dll, vs PO.exe
            Source: PO.exe, 00000000.00000002.302999935.0000000003ED8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename48fb3650-a520-48b4-9e2f-1fc3b6395358.exe4 vs PO.exe
            Source: PO.exe, 00000000.00000002.289521683.0000000002BB7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCruiser.dll, vs PO.exe
            Source: PO.exe, 00000000.00000002.289521683.0000000002BB7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename48fb3650-a520-48b4-9e2f-1fc3b6395358.exe4 vs PO.exe
            Source: PO.exe, 00000006.00000002.532341288.0000000000F88000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs PO.exe
            Source: PO.exe, 00000006.00000002.531388720.000000000042C000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename48fb3650-a520-48b4-9e2f-1fc3b6395358.exe4 vs PO.exe
            Source: PO.exeBinary or memory string: OriginalFilenamewAGa.exe> vs PO.exe
            Source: PO.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: keWKhH.exe.6.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: PO.exeReversingLabs: Detection: 38%
            Source: C:\Users\user\Desktop\PO.exeFile read: C:\Users\user\Desktop\PO.exeJump to behavior
            Source: PO.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\PO.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Users\user\Desktop\PO.exe C:\Users\user\Desktop\PO.exe
            Source: C:\Users\user\Desktop\PO.exeProcess created: C:\Users\user\Desktop\PO.exe C:\Users\user\Desktop\PO.exe
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe "C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe"
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess created: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess created: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe "C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe"
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess created: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess created: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
            Source: C:\Users\user\Desktop\PO.exeProcess created: C:\Users\user\Desktop\PO.exe C:\Users\user\Desktop\PO.exe
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess created: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess created: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess created: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess created: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
            Source: C:\Users\user\Desktop\PO.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
            Source: C:\Users\user\Desktop\PO.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\PO.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\PO.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO.exe.logJump to behavior
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@13/4@4/2
            Source: PO.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\PO.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\PO.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\PO.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\PO.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\Desktop\PO.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
            Source: C:\Users\user\Desktop\PO.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: PO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: PO.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: PO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: wAGa.pdb source: PO.exe, keWKhH.exe.6.dr
            Source: Binary string: wAGa.pdbSHA256 source: PO.exe, keWKhH.exe.6.dr
            Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_00FDCB38 pushfd ; ret
            Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_054A4106 push es; ret
            Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_054A40BD push ebx; ret
            Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_05B30924 push es; retf
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06AA6660 push es; ret
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06AA5FB5 push es; ret
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_065E6371 push es; ret
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_065E633D push es; ret
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_065E6021 push es; ret
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_065E40BD push ebx; ret
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_065E4106 push es; ret
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_065F0924 push es; retf
            Source: initial sampleStatic PE information: section name: .text entropy: 7.870304849303137
            Source: initial sampleStatic PE information: section name: .text entropy: 7.870304849303137
            Source: C:\Users\user\Desktop\PO.exeFile created: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeJump to dropped file
            Source: C:\Users\user\Desktop\PO.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run keWKhHJump to behavior
            Source: C:\Users\user\Desktop\PO.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run keWKhHJump to behavior

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Users\user\Desktop\PO.exeFile opened: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe:Zone.Identifier read attributes | delete
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\PO.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\Desktop\PO.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Users\user\Desktop\PO.exe TID: 5224Thread sleep time: -40023s >= -30000s
            Source: C:\Users\user\Desktop\PO.exe TID: 5192Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\Desktop\PO.exe TID: 5916Thread sleep count: 6216 > 30
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -13835058055282155s >= -30000s
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -100000s >= -30000s
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -99841s >= -30000s
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -99732s >= -30000s
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -99623s >= -30000s
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -99509s >= -30000s
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -99391s >= -30000s
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -99250s >= -30000s
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -99141s >= -30000s
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -99016s >= -30000s
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -98875s >= -30000s
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -98766s >= -30000s
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -98641s >= -30000s
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -98529s >= -30000s
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -98419s >= -30000s
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -98288s >= -30000s
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -98159s >= -30000s
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -98000s >= -30000s
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -97872s >= -30000s
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -97753s >= -30000s
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -97622s >= -30000s
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -97516s >= -30000s
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -97394s >= -30000s
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -97242s >= -30000s
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -97121s >= -30000s
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -97000s >= -30000s
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -96889s >= -30000s
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -96749s >= -30000s
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 1244Thread sleep time: -40023s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2108Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 5352Thread sleep count: 5784 > 30
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -12912720851596678s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -100000s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -99842s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -99730s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -99621s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -99512s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -99378s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -99250s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -99140s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -99030s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -98921s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -98812s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -98703s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -98576s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -98467s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -98358s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -98249s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -98140s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -98029s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -97919s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -97811s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -97702s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -97592s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -97482s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -97176s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -97054s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -96929s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 6068Thread sleep time: -40023s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2228Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 5560Thread sleep count: 7608 > 30
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -14757395258967632s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -100000s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -99843s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -99734s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -99609s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -99500s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -99390s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -99281s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -99147s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -99031s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -98922s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -98797s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -98687s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -98578s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -98469s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -98297s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -98187s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -98078s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -97961s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -97843s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -97719s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -97609s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -97500s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -97391s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -97281s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -97172s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -97063s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -96907s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -96796s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -96687s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -96578s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -96469s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -96359s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -96249s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -96138s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -96030s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\PO.exeWindow / User API: threadDelayed 6216
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeWindow / User API: threadDelayed 5784
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeWindow / User API: threadDelayed 7608
            Source: C:\Users\user\Desktop\PO.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\PO.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 40023
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 100000
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 99841
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 99732
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 99623
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 99509
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 99391
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 99250
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 99141
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 99016
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 98875
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 98766
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 98641
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 98529
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 98419
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 98288
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 98159
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 98000
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 97872
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 97753
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 97622
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 97516
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 97394
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 97242
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 97121
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 97000
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 96889
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 96749
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 40023
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 100000
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99842
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99730
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99621
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99512
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99378
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99250
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99140
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99030
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98921
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98812
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98703
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98576
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98467
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98358
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98249
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98140
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98029
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97919
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97811
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97702
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97592
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97482
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97176
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97054
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 96929
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 40023
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 100000
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99843
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99734
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99609
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99500
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99390
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99281
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99147
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99031
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98922
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98797
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98687
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98578
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98469
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98297
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98187
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98078
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97961
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97843
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97719
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97609
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97500
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97391
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97281
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97172
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97063
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 96907
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 96796
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 96687
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 96578
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 96469
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 96359
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 96249
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 96138
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 96030
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 922337203685477
            Source: PO.exe, 00000006.00000002.533158671.000000000129D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\PO.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\PO.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeMemory written: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe base: 400000 value starts with: 4D5A
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeMemory written: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe base: 400000 value starts with: 4D5A
            Source: C:\Users\user\Desktop\PO.exeProcess created: C:\Users\user\Desktop\PO.exe C:\Users\user\Desktop\PO.exe
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess created: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess created: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess created: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess created: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Users\user\Desktop\PO.exe VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Users\user\Desktop\PO.exe VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe VolumeInformation
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe VolumeInformation
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe VolumeInformation
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe VolumeInformation
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_02D6F6D8 GetUserNameW,

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000006.00000002.536082591.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.536562013.0000000002AA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.536833086.000000000311C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: PO.exe PID: 1116, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: keWKhH.exe PID: 4980, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: keWKhH.exe PID: 3180, type: MEMORYSTR
            Source: C:\Users\user\Desktop\PO.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Users\user\Desktop\PO.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Users\user\Desktop\PO.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: C:\Users\user\Desktop\PO.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
            Source: C:\Users\user\Desktop\PO.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
            Source: Yara matchFile source: 00000006.00000002.536082591.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.536562013.0000000002AA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.536833086.000000000311C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: PO.exe PID: 1116, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: keWKhH.exe PID: 4980, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: keWKhH.exe PID: 3180, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000006.00000002.536082591.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.536562013.0000000002AA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.536833086.000000000311C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: PO.exe PID: 1116, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: keWKhH.exe PID: 4980, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: keWKhH.exe PID: 3180, type: MEMORYSTR
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts211
            Windows Management Instrumentation
            1
            Registry Run Keys / Startup Folder
            111
            Process Injection
            1
            Disable or Modify Tools
            1
            OS Credential Dumping
            1
            Account Discovery
            Remote Services1
            Archive Collected Data
            Exfiltration Over Other Network Medium1
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            Registry Run Keys / Startup Folder
            2
            Obfuscated Files or Information
            1
            Input Capture
            114
            System Information Discovery
            Remote Desktop Protocol1
            Data from Local System
            Exfiltration Over Bluetooth1
            Non-Standard Port
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)2
            Software Packing
            1
            Credentials in Registry
            211
            Security Software Discovery
            SMB/Windows Admin Shares1
            Email Collection
            Automated Exfiltration1
            Non-Application Layer Protocol
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
            Masquerading
            NTDS1
            Process Discovery
            Distributed Component Object Model1
            Input Capture
            Scheduled Transfer11
            Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script131
            Virtualization/Sandbox Evasion
            LSA Secrets131
            Virtualization/Sandbox Evasion
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common111
            Process Injection
            Cached Domain Credentials1
            Application Window Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items1
            Hidden Files and Directories
            DCSync1
            System Owner/User Discovery
            Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
            Remote System Discovery
            Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 830558 Sample: PO.exe Startdate: 20/03/2023 Architecture: WINDOWS Score: 100 45 Multi AV Scanner detection for submitted file 2->45 47 Yara detected AgentTesla 2->47 49 Machine Learning detection for sample 2->49 6 PO.exe 3 2->6         started        10 keWKhH.exe 3 2->10         started        12 keWKhH.exe 2 2->12         started        process3 file4 27 C:\Users\user\AppData\Local\...\PO.exe.log, ASCII 6->27 dropped 51 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 6->51 53 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 6->53 14 PO.exe 2 5 6->14         started        55 Multi AV Scanner detection for dropped file 10->55 57 Machine Learning detection for dropped file 10->57 59 Injects a PE file into a foreign processes 10->59 19 keWKhH.exe 2 10->19         started        21 keWKhH.exe 10->21         started        23 keWKhH.exe 2 12->23         started        25 keWKhH.exe 12->25         started        signatures5 process6 dnsIp7 33 us2.smtp.mailhostbox.com 208.91.198.143, 49700, 49702, 587 PUBLIC-DOMAIN-REGISTRYUS United States 14->33 29 C:\Users\user\AppData\Roaming\...\keWKhH.exe, PE32 14->29 dropped 31 C:\Users\user\...\keWKhH.exe:Zone.Identifier, ASCII 14->31 dropped 37 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->37 39 Tries to steal Mail credentials (via file / registry access) 14->39 41 Hides that the sample has been downloaded from the Internet (zone.identifier) 14->41 35 208.91.199.223, 49703, 587 PUBLIC-DOMAIN-REGISTRYUS United States 23->35 43 Tries to harvest and steal browser information (history, passwords, etc) 23->43 file8 signatures9

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            PO.exe38%ReversingLabsWin32.Trojan.Generic
            PO.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe38%ReversingLabsWin32.Trojan.Generic
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
            https://sectigo.com/CPS00%URL Reputationsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://ocsp.sectigo.com0A0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            us2.smtp.mailhostbox.com
            208.91.198.143
            truefalse
              high
              NameSourceMaliciousAntivirus DetectionReputation
              http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#PO.exe, 00000006.00000002.533158671.0000000001258000.00000004.00000020.00020000.00000000.sdmp, PO.exe, 00000006.00000002.536082591.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 00000006.00000002.533158671.000000000129D000.00000004.00000020.00020000.00000000.sdmp, keWKhH.exe, 0000000D.00000002.536833086.0000000003169000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 00000010.00000002.536562013.0000000002AF9000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.apache.org/licenses/LICENSE-2.0PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.comPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.com/designersGPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://sectigo.com/CPS0PO.exe, 00000006.00000002.533158671.0000000001258000.00000004.00000020.00020000.00000000.sdmp, PO.exe, 00000006.00000002.536082591.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 00000006.00000002.533158671.000000000129D000.00000004.00000020.00020000.00000000.sdmp, keWKhH.exe, 0000000D.00000002.536833086.0000000003169000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 00000010.00000002.536562013.0000000002AF9000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/?PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.founder.com.cn/cn/bThePO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://us2.smtp.mailhostbox.comPO.exe, 00000006.00000002.536082591.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 0000000D.00000002.536833086.0000000003169000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 00000010.00000002.536562013.0000000002AF9000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.com/designers?PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.tiro.comPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designersPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.goodfont.co.krPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comlPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.sajatypeworks.comPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.typography.netDPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/cabarga.htmlNPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.founder.com.cn/cn/cThePO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.galapagosdesign.com/staff/dennis.htmPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://fontfabrik.comPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cnPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers/frere-jones.htmlPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.jiyu-kobo.co.jp/PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.galapagosdesign.com/DPleasePO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers8PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://ocsp.sectigo.com0APO.exe, 00000006.00000002.533158671.0000000001258000.00000004.00000020.00020000.00000000.sdmp, PO.exe, 00000006.00000002.536082591.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 00000006.00000002.533158671.000000000129D000.00000004.00000020.00020000.00000000.sdmp, keWKhH.exe, 0000000D.00000002.536833086.0000000003169000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 00000010.00000002.536562013.0000000002AF9000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fonts.comPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.sandoll.co.krPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.urwpp.deDPleasePO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.zhongyicts.com.cnPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.sakkal.comPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    208.91.198.143
                                    us2.smtp.mailhostbox.comUnited States
                                    394695PUBLIC-DOMAIN-REGISTRYUSfalse
                                    208.91.199.223
                                    unknownUnited States
                                    394695PUBLIC-DOMAIN-REGISTRYUSfalse
                                    Joe Sandbox Version:37.0.0 Beryl
                                    Analysis ID:830558
                                    Start date and time:2023-03-20 13:54:26 +01:00
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 9m 30s
                                    Hypervisor based Inspection enabled:false
                                    Report type:light
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                    Number of analysed new started processes analysed:19
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample file name:PO.exe
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.evad.winEXE@13/4@4/2
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HDC Information:Failed
                                    HCA Information:
                                    • Successful, ratio: 98%
                                    • Number of executed functions: 0
                                    • Number of non-executed functions: 0
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                    • TCP Packets have been reduced to 100
                                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, ctldl.windowsupdate.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report creation exceeded maximum time and may have missing disassembly code information.
                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • VT rate limit hit for: PO.exe
                                    TimeTypeDescription
                                    13:55:36API Interceptor28x Sleep call for process: PO.exe modified
                                    13:55:43AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run keWKhH C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
                                    13:55:52AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run keWKhH C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
                                    13:55:56API Interceptor63x Sleep call for process: keWKhH.exe modified
                                    No context
                                    No context
                                    No context
                                    No context
                                    No context
                                    Process:C:\Users\user\Desktop\PO.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1216
                                    Entropy (8bit):5.355304211458859
                                    Encrypted:false
                                    SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                    MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                    SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                    SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                    SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                    Malicious:true
                                    Reputation:high, very likely benign file
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                    Process:C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1216
                                    Entropy (8bit):5.355304211458859
                                    Encrypted:false
                                    SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                    MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                    SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                    SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                    SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                    Malicious:false
                                    Reputation:high, very likely benign file
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                    Process:C:\Users\user\Desktop\PO.exe
                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Category:dropped
                                    Size (bytes):744960
                                    Entropy (8bit):7.861489987265584
                                    Encrypted:false
                                    SSDEEP:12288:chmmYMUnFW/NQbwf4i9aXFc4fUDC/MbGh+796B5PthWxnr569lgx/0PHSHFfG2Sc:chmUWPWa75EbGhK92Vcnr8Q90PQY2ShW
                                    MD5:03D90E26C8A6FBBEB284359B0F90EE91
                                    SHA1:68B83832A4423003564A8DF9AF2CDA29622190A0
                                    SHA-256:EB2AD014AA499FD10C8EC16353295ACE996E28A7D822097CAF7BD11929C0B558
                                    SHA-512:2D36BF943AC0B78940780209273C400F6B99344CAECEF2351A7EAE639A62B1B93DF8FF796215D75380B61CA2906DB1DB0A2A620BC7CB596B31806A2333CFE180
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 38%
                                    Reputation:low
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d..............0..H...........f... ........@.. ....................................@.................................mf..O...................................XR..T............................................ ............... ..H............text....F... ...H.................. ..`.rsrc................J..............@..@.reloc...............\..............@..B.................f......H.......@V...1......".......H............................................0..R..........4...%..{....{L....%.r...p.%..|....(.....%.r...p.%..{.....X...(.....(.......+..*...0..&..........{........,...{.....+....{....Z.+..*".(.....*..0..z..............}...........}......}.....(.......(......{.....s!...%.d}M...%r!..p}L...%.{....}P...%.{....}O.....{.....s!...%.d}M...%r)..p}L...%.{....}P...%.{....}O.....{.....s!...%.d}M...%r1..p}L...%.{....}P...%.{....}O......{.......+........o....&.
                                    Process:C:\Users\user\Desktop\PO.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:modified
                                    Size (bytes):26
                                    Entropy (8bit):3.95006375643621
                                    Encrypted:false
                                    SSDEEP:3:ggPYV:rPYV
                                    MD5:187F488E27DB4AF347237FE461A079AD
                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                    Malicious:true
                                    Reputation:high, very likely benign file
                                    Preview:[ZoneTransfer]....ZoneId=0
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):7.861489987265584
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                    • Win32 Executable (generic) a (10002005/4) 49.78%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    • DOS Executable Generic (2002/1) 0.01%
                                    File name:PO.exe
                                    File size:744960
                                    MD5:03d90e26c8a6fbbeb284359b0f90ee91
                                    SHA1:68b83832a4423003564a8df9af2cda29622190a0
                                    SHA256:eb2ad014aa499fd10c8ec16353295ace996e28a7d822097caf7bd11929c0b558
                                    SHA512:2d36bf943ac0b78940780209273c400f6b99344caecef2351a7eae639a62b1b93df8ff796215d75380b61ca2906db1db0a2a620bc7cb596b31806a2333cfe180
                                    SSDEEP:12288:chmmYMUnFW/NQbwf4i9aXFc4fUDC/MbGh+796B5PthWxnr569lgx/0PHSHFfG2Sc:chmUWPWa75EbGhK92Vcnr8Q90PQY2ShW
                                    TLSH:B2F401392BAA5238F83657BD85E42290577D77A32B17C58D14F121CE5B73B038AD0A3B
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d..............0..H...........f... ........@.. ....................................@................................
                                    Icon Hash:209480e66eb84902
                                    Entrypoint:0x4b66c2
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x6417B6B1 [Mon Mar 20 01:28:17 2023 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xb666d0x4f.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xb80000x1110.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xba0000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0xb52580x54.text
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000xb46c80xb4800False0.926453482081025data7.870304849303137IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0xb80000x11100x1200False0.7298177083333334data6.6330181066106375IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0xba0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountry
                                    RT_ICON0xb81000xa79PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                    RT_GROUP_ICON0xb8b8c0x14data
                                    RT_VERSION0xb8bb00x360data
                                    RT_MANIFEST0xb8f200x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    TimestampSource PortDest PortSource IPDest IP
                                    Mar 20, 2023 13:55:51.379208088 CET49700587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:55:51.561971903 CET58749700208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:55:51.568327904 CET49700587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:55:51.822913885 CET58749700208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:55:51.823677063 CET49700587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:55:52.006165981 CET58749700208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:55:52.007561922 CET58749700208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:55:52.022155046 CET49700587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:55:52.204807043 CET58749700208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:55:52.277923107 CET49700587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:55:52.469763041 CET58749700208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:55:52.469798088 CET58749700208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:55:52.469816923 CET58749700208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:55:52.469832897 CET58749700208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:55:52.469852924 CET58749700208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:55:52.469980001 CET49700587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:55:52.652877092 CET58749700208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:55:52.694524050 CET49700587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:55:52.722714901 CET49700587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:55:52.906130075 CET58749700208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:55:53.065079927 CET49700587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:55:53.248606920 CET58749700208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:55:53.249872923 CET49700587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:55:53.435743093 CET58749700208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:55:53.436301947 CET49700587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:55:53.630464077 CET58749700208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:55:53.631983042 CET49700587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:55:53.817394018 CET58749700208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:55:53.817768097 CET49700587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:55:54.025801897 CET58749700208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:55:54.051700115 CET49700587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:55:54.235774040 CET58749700208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:55:54.238713026 CET49700587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:55:54.238836050 CET49700587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:55:54.238903046 CET49700587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:55:54.238959074 CET49700587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:55:54.421613932 CET58749700208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:55:54.421794891 CET58749700208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:55:54.549983978 CET58749700208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:55:54.694654942 CET49700587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:56:19.372095108 CET49702587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:56:19.556463957 CET58749702208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:56:19.558954954 CET49702587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:56:19.747483969 CET58749702208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:56:19.750802994 CET49702587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:56:19.933517933 CET58749702208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:56:19.933639050 CET58749702208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:56:19.934598923 CET49702587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:56:20.118187904 CET58749702208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:56:20.132863045 CET49702587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:56:20.316102028 CET58749702208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:56:20.316154957 CET58749702208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:56:20.316188097 CET58749702208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:56:20.316232920 CET58749702208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:56:20.316243887 CET49702587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:56:20.316360950 CET49702587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:56:20.319158077 CET58749702208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:56:20.400011063 CET49702587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:56:20.499293089 CET58749702208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:56:20.507908106 CET49702587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:56:20.691613913 CET58749702208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:56:20.766664982 CET49702587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:56:20.949820995 CET58749702208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:56:20.950285912 CET49702587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:56:21.136104107 CET58749702208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:56:21.136550903 CET49702587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:56:21.325586081 CET58749702208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:56:21.325930119 CET49702587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:56:21.512427092 CET58749702208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:56:21.512749910 CET49702587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:56:21.726322889 CET58749702208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:56:21.753025055 CET49702587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:56:21.937357903 CET58749702208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:56:21.938667059 CET49702587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:56:21.938776016 CET49702587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:56:21.938776016 CET49702587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:56:21.938776016 CET49702587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:56:22.121570110 CET58749702208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:56:22.121669054 CET58749702208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:56:22.253518105 CET58749702208.91.198.143192.168.2.3
                                    Mar 20, 2023 13:56:22.400196075 CET49702587192.168.2.3208.91.198.143
                                    Mar 20, 2023 13:56:29.827996016 CET49703587192.168.2.3208.91.199.223
                                    Mar 20, 2023 13:56:30.011459112 CET58749703208.91.199.223192.168.2.3
                                    Mar 20, 2023 13:56:30.014067888 CET49703587192.168.2.3208.91.199.223
                                    Mar 20, 2023 13:56:30.268151045 CET58749703208.91.199.223192.168.2.3
                                    Mar 20, 2023 13:56:30.269398928 CET49703587192.168.2.3208.91.199.223
                                    Mar 20, 2023 13:56:30.452392101 CET58749703208.91.199.223192.168.2.3
                                    Mar 20, 2023 13:56:30.452708006 CET58749703208.91.199.223192.168.2.3
                                    Mar 20, 2023 13:56:30.453392982 CET49703587192.168.2.3208.91.199.223
                                    Mar 20, 2023 13:56:30.636518955 CET58749703208.91.199.223192.168.2.3
                                    Mar 20, 2023 13:56:30.647614002 CET49703587192.168.2.3208.91.199.223
                                    Mar 20, 2023 13:56:30.832444906 CET58749703208.91.199.223192.168.2.3
                                    Mar 20, 2023 13:56:30.832494020 CET58749703208.91.199.223192.168.2.3
                                    Mar 20, 2023 13:56:30.832515955 CET58749703208.91.199.223192.168.2.3
                                    Mar 20, 2023 13:56:30.832532883 CET58749703208.91.199.223192.168.2.3
                                    Mar 20, 2023 13:56:30.832700968 CET49703587192.168.2.3208.91.199.223
                                    Mar 20, 2023 13:56:30.832743883 CET49703587192.168.2.3208.91.199.223
                                    Mar 20, 2023 13:56:30.833830118 CET58749703208.91.199.223192.168.2.3
                                    Mar 20, 2023 13:56:30.901175022 CET49703587192.168.2.3208.91.199.223
                                    Mar 20, 2023 13:56:31.015933990 CET58749703208.91.199.223192.168.2.3
                                    TimestampSource PortDest PortSource IPDest IP
                                    Mar 20, 2023 13:55:51.338753939 CET4997753192.168.2.38.8.8.8
                                    Mar 20, 2023 13:55:51.360728979 CET53499778.8.8.8192.168.2.3
                                    Mar 20, 2023 13:56:19.286415100 CET5799053192.168.2.38.8.8.8
                                    Mar 20, 2023 13:56:19.307167053 CET53579908.8.8.8192.168.2.3
                                    Mar 20, 2023 13:56:28.777345896 CET5238753192.168.2.38.8.8.8
                                    Mar 20, 2023 13:56:29.781128883 CET5238753192.168.2.38.8.8.8
                                    Mar 20, 2023 13:56:29.801374912 CET53523878.8.8.8192.168.2.3
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Mar 20, 2023 13:55:51.338753939 CET192.168.2.38.8.8.80x12edStandard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)false
                                    Mar 20, 2023 13:56:19.286415100 CET192.168.2.38.8.8.80x4bacStandard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)false
                                    Mar 20, 2023 13:56:28.777345896 CET192.168.2.38.8.8.80x2cd4Standard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)false
                                    Mar 20, 2023 13:56:29.781128883 CET192.168.2.38.8.8.80x2cd4Standard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Mar 20, 2023 13:55:51.360728979 CET8.8.8.8192.168.2.30x12edNo error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                    Mar 20, 2023 13:55:51.360728979 CET8.8.8.8192.168.2.30x12edNo error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                    Mar 20, 2023 13:55:51.360728979 CET8.8.8.8192.168.2.30x12edNo error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                    Mar 20, 2023 13:55:51.360728979 CET8.8.8.8192.168.2.30x12edNo error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                    Mar 20, 2023 13:56:19.307167053 CET8.8.8.8192.168.2.30x4bacNo error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                    Mar 20, 2023 13:56:19.307167053 CET8.8.8.8192.168.2.30x4bacNo error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                    Mar 20, 2023 13:56:19.307167053 CET8.8.8.8192.168.2.30x4bacNo error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                    Mar 20, 2023 13:56:19.307167053 CET8.8.8.8192.168.2.30x4bacNo error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                    Mar 20, 2023 13:56:29.801374912 CET8.8.8.8192.168.2.30x2cd4No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                    Mar 20, 2023 13:56:29.801374912 CET8.8.8.8192.168.2.30x2cd4No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                    Mar 20, 2023 13:56:29.801374912 CET8.8.8.8192.168.2.30x2cd4No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                    Mar 20, 2023 13:56:29.801374912 CET8.8.8.8192.168.2.30x2cd4No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                    TimestampSource PortDest PortSource IPDest IPCommands
                                    Mar 20, 2023 13:55:51.822913885 CET58749700208.91.198.143192.168.2.3220 us2.outbound.mailhostbox.com ESMTP Postfix
                                    Mar 20, 2023 13:55:51.823677063 CET49700587192.168.2.3208.91.198.143EHLO 494126
                                    Mar 20, 2023 13:55:52.007561922 CET58749700208.91.198.143192.168.2.3250-us2.outbound.mailhostbox.com
                                    250-PIPELINING
                                    250-SIZE 41648128
                                    250-VRFY
                                    250-ETRN
                                    250-STARTTLS
                                    250-AUTH PLAIN LOGIN
                                    250-AUTH=PLAIN LOGIN
                                    250-ENHANCEDSTATUSCODES
                                    250-8BITMIME
                                    250-DSN
                                    250 CHUNKING
                                    Mar 20, 2023 13:55:52.022155046 CET49700587192.168.2.3208.91.198.143STARTTLS
                                    Mar 20, 2023 13:55:52.204807043 CET58749700208.91.198.143192.168.2.3220 2.0.0 Ready to start TLS
                                    Mar 20, 2023 13:56:19.747483969 CET58749702208.91.198.143192.168.2.3220 us2.outbound.mailhostbox.com ESMTP Postfix
                                    Mar 20, 2023 13:56:19.750802994 CET49702587192.168.2.3208.91.198.143EHLO 494126
                                    Mar 20, 2023 13:56:19.933639050 CET58749702208.91.198.143192.168.2.3250-us2.outbound.mailhostbox.com
                                    250-PIPELINING
                                    250-SIZE 41648128
                                    250-VRFY
                                    250-ETRN
                                    250-STARTTLS
                                    250-AUTH PLAIN LOGIN
                                    250-AUTH=PLAIN LOGIN
                                    250-ENHANCEDSTATUSCODES
                                    250-8BITMIME
                                    250-DSN
                                    250 CHUNKING
                                    Mar 20, 2023 13:56:19.934598923 CET49702587192.168.2.3208.91.198.143STARTTLS
                                    Mar 20, 2023 13:56:20.118187904 CET58749702208.91.198.143192.168.2.3220 2.0.0 Ready to start TLS
                                    Mar 20, 2023 13:56:30.268151045 CET58749703208.91.199.223192.168.2.3220 us2.outbound.mailhostbox.com ESMTP Postfix
                                    Mar 20, 2023 13:56:30.269398928 CET49703587192.168.2.3208.91.199.223EHLO 494126
                                    Mar 20, 2023 13:56:30.452708006 CET58749703208.91.199.223192.168.2.3250-us2.outbound.mailhostbox.com
                                    250-PIPELINING
                                    250-SIZE 41648128
                                    250-VRFY
                                    250-ETRN
                                    250-STARTTLS
                                    250-AUTH PLAIN LOGIN
                                    250-AUTH=PLAIN LOGIN
                                    250-ENHANCEDSTATUSCODES
                                    250-8BITMIME
                                    250-DSN
                                    250 CHUNKING
                                    Mar 20, 2023 13:56:30.453392982 CET49703587192.168.2.3208.91.199.223STARTTLS
                                    Mar 20, 2023 13:56:30.636518955 CET58749703208.91.199.223192.168.2.3220 2.0.0 Ready to start TLS

                                    Click to jump to process

                                    Target ID:0
                                    Start time:13:55:28
                                    Start date:20/03/2023
                                    Path:C:\Users\user\Desktop\PO.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\Desktop\PO.exe
                                    Imagebase:0x690000
                                    File size:744960 bytes
                                    MD5 hash:03D90E26C8A6FBBEB284359B0F90EE91
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Reputation:low

                                    Target ID:6
                                    Start time:13:55:38
                                    Start date:20/03/2023
                                    Path:C:\Users\user\Desktop\PO.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\Desktop\PO.exe
                                    Imagebase:0xb40000
                                    File size:744960 bytes
                                    MD5 hash:03D90E26C8A6FBBEB284359B0F90EE91
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.536082591.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.536082591.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low

                                    Target ID:11
                                    Start time:13:55:52
                                    Start date:20/03/2023
                                    Path:C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe"
                                    Imagebase:0xa0000
                                    File size:744960 bytes
                                    MD5 hash:03D90E26C8A6FBBEB284359B0F90EE91
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:.Net C# or VB.NET
                                    Antivirus matches:
                                    • Detection: 100%, Joe Sandbox ML
                                    • Detection: 38%, ReversingLabs
                                    Reputation:low

                                    Target ID:12
                                    Start time:13:55:58
                                    Start date:20/03/2023
                                    Path:C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
                                    Imagebase:0x10000
                                    File size:744960 bytes
                                    MD5 hash:03D90E26C8A6FBBEB284359B0F90EE91
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:low

                                    Target ID:13
                                    Start time:13:55:58
                                    Start date:20/03/2023
                                    Path:C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
                                    Imagebase:0xd70000
                                    File size:744960 bytes
                                    MD5 hash:03D90E26C8A6FBBEB284359B0F90EE91
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000D.00000002.536833086.000000000311C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000D.00000002.536833086.000000000311C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low

                                    Target ID:14
                                    Start time:13:56:00
                                    Start date:20/03/2023
                                    Path:C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe"
                                    Imagebase:0x850000
                                    File size:744960 bytes
                                    MD5 hash:03D90E26C8A6FBBEB284359B0F90EE91
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:.Net C# or VB.NET
                                    Reputation:low

                                    Target ID:15
                                    Start time:13:56:15
                                    Start date:20/03/2023
                                    Path:C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
                                    Imagebase:0x3a0000
                                    File size:744960 bytes
                                    MD5 hash:03D90E26C8A6FBBEB284359B0F90EE91
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:low

                                    Target ID:16
                                    Start time:13:56:15
                                    Start date:20/03/2023
                                    Path:C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
                                    Imagebase:0x660000
                                    File size:744960 bytes
                                    MD5 hash:03D90E26C8A6FBBEB284359B0F90EE91
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000002.536562013.0000000002AA1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000010.00000002.536562013.0000000002AA1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low

                                    No disassembly