Windows Analysis Report
aRmotFM1Zp

Overview

General Information

Sample Name: aRmotFM1Zp (renamed file extension from none to exe)
Analysis ID: 620774
MD5: 5bbcc9d01bd32453756a8e65edd2723a
SHA1: 48a5b77ef099971fb4d7e9fbd47cc20d910767e6
SHA256: c36ec3f847b81b6e59ee1e6d17544ee886a3a85105d1aa06646df073f8590838
Tags: 32AgentTeslaexetrojan
Infos:

Detection

AgentTesla
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Multi AV Scanner detection for dropped file
Installs a global keyboard hook
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Injects a PE file into a foreign processes
PE file has nameless sections
Machine Learning detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Tries to harvest and steal browser information (history, passwords, etc)
PE file contains section with special chars
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Binary contains a suspicious time stamp
Uses SMTP (mail sending)
Creates a window with clipboard capturing capabilities
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Dropped file seen in connection with other malware
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

AV Detection

barindex
Source: 16.0.HSpMzoJ.exe.400000.10.unpack Malware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "r.heikal@alfursaneq.com", "Password": " kOOdr$f8", "Host": "us2.smtp.mailhostbox.com"}
Source: aRmotFM1Zp.exe Virustotal: Detection: 35% Perma Link
Source: aRmotFM1Zp.exe ReversingLabs: Detection: 28%
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Virustotal: Detection: 35% Perma Link
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe ReversingLabs: Detection: 28%
Source: aRmotFM1Zp.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Joe Sandbox ML: detected
Source: 16.0.HSpMzoJ.exe.400000.10.unpack Avira: Label: TR/Spy.Gen8
Source: 3.0.aRmotFM1Zp.exe.400000.10.unpack Avira: Label: TR/Spy.Gen8
Source: 16.0.HSpMzoJ.exe.400000.12.unpack Avira: Label: TR/Spy.Gen8
Source: 3.0.aRmotFM1Zp.exe.400000.12.unpack Avira: Label: TR/Spy.Gen8
Source: 3.0.aRmotFM1Zp.exe.400000.4.unpack Avira: Label: TR/Spy.Gen8
Source: 16.2.HSpMzoJ.exe.400000.0.unpack Avira: Label: TR/Spy.Gen8
Source: 16.0.HSpMzoJ.exe.400000.8.unpack Avira: Label: TR/Spy.Gen8
Source: 3.0.aRmotFM1Zp.exe.400000.8.unpack Avira: Label: TR/Spy.Gen8
Source: 16.0.HSpMzoJ.exe.400000.4.unpack Avira: Label: TR/Spy.Gen8
Source: 3.2.aRmotFM1Zp.exe.400000.0.unpack Avira: Label: TR/Spy.Gen8
Source: 16.0.HSpMzoJ.exe.400000.6.unpack Avira: Label: TR/Spy.Gen8
Source: 3.0.aRmotFM1Zp.exe.400000.6.unpack Avira: Label: TR/Spy.Gen8
Source: aRmotFM1Zp.exe Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: aRmotFM1Zp.exe Static PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 4x nop then cmp dword ptr [ebp-20h], 00000000h 14_2_00B416F8
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 4x nop then cmp dword ptr [ebp-20h], 00000000h 14_2_00B415F8
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 4x nop then cmp dword ptr [ebp-20h], 00000000h 14_2_00B4165A
Source: Joe Sandbox View IP Address: 162.222.225.29 162.222.225.29
Source: Joe Sandbox View IP Address: 208.91.198.38 208.91.198.38
Source: global traffic TCP traffic: 192.168.2.4:49761 -> 162.222.225.29:587
Source: global traffic TCP traffic: 192.168.2.4:49770 -> 208.91.198.38:587
Source: global traffic TCP traffic: 192.168.2.4:49761 -> 162.222.225.29:587
Source: global traffic TCP traffic: 192.168.2.4:49770 -> 208.91.198.38:587
Source: aRmotFM1Zp.exe, 00000003.00000002.529873536.00000000028C1000.00000004.00000800.00020000.00000000.sdmp, HSpMzoJ.exe, 00000010.00000002.530370723.0000000002C81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://127.0.0.1:HTTP/1.1
Source: HSpMzoJ.exe, 00000010.00000002.530370723.0000000002C81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
Source: aRmotFM1Zp.exe, 00000003.00000002.531217917.0000000002C1A000.00000004.00000800.00020000.00000000.sdmp, HSpMzoJ.exe, 00000010.00000002.531732412.0000000002FDD000.00000004.00000800.00020000.00000000.sdmp, HSpMzoJ.exe, 00000010.00000002.527332027.0000000000E75000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: aRmotFM1Zp.exe, 00000003.00000002.531217917.0000000002C1A000.00000004.00000800.00020000.00000000.sdmp, aRmotFM1Zp.exe, 00000003.00000002.534066906.0000000005F10000.00000004.00000800.00020000.00000000.sdmp, HSpMzoJ.exe, 00000010.00000002.531732412.0000000002FDD000.00000004.00000800.00020000.00000000.sdmp, HSpMzoJ.exe, 00000010.00000003.402680529.0000000000F32000.00000004.00000020.00020000.00000000.sdmp, HSpMzoJ.exe, 00000010.00000002.528240722.0000000000F32000.00000004.00000020.00020000.00000000.sdmp, HSpMzoJ.exe, 00000010.00000003.402114851.0000000000F32000.00000004.00000020.00020000.00000000.sdmp, HSpMzoJ.exe, 00000010.00000003.401861573.0000000000F32000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: aRmotFM1Zp.exe, 00000003.00000002.531217917.0000000002C1A000.00000004.00000800.00020000.00000000.sdmp, HSpMzoJ.exe, 00000010.00000002.531732412.0000000002FDD000.00000004.00000800.00020000.00000000.sdmp, HSpMzoJ.exe, 00000010.00000002.527332027.0000000000E75000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
Source: aRmotFM1Zp.exe, 00000000.00000002.307503472.00000000095A2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://fontfabrik.com
Source: HSpMzoJ.exe, 00000010.00000002.530370723.0000000002C81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://loVTdM.com
Source: aRmotFM1Zp.exe, 00000003.00000002.531217917.0000000002C1A000.00000004.00000800.00020000.00000000.sdmp, HSpMzoJ.exe, 00000010.00000002.531732412.0000000002FDD000.00000004.00000800.00020000.00000000.sdmp, HSpMzoJ.exe, 00000010.00000002.527332027.0000000000E75000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.comodoca.com0
Source: aRmotFM1Zp.exe, 00000003.00000002.531217917.0000000002C1A000.00000004.00000800.00020000.00000000.sdmp, HSpMzoJ.exe, 00000010.00000002.531732412.0000000002FDD000.00000004.00000800.00020000.00000000.sdmp, HSpMzoJ.exe, 00000010.00000002.527332027.0000000000E75000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.sectigo.com0A
Source: aRmotFM1Zp.exe, 00000003.00000002.531217917.0000000002C1A000.00000004.00000800.00020000.00000000.sdmp, HSpMzoJ.exe, 00000010.00000002.531732412.0000000002FDD000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://us2.smtp.mailhostbox.com
Source: aRmotFM1Zp.exe, 00000000.00000002.307503472.00000000095A2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: aRmotFM1Zp.exe, 00000000.00000002.307503472.00000000095A2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.carterandcone.coml
Source: aRmotFM1Zp.exe, 00000000.00000002.307503472.00000000095A2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.fontbureau.com
Source: aRmotFM1Zp.exe, 00000000.00000002.307503472.00000000095A2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.fontbureau.com/designers
Source: aRmotFM1Zp.exe, 00000000.00000002.307503472.00000000095A2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.fontbureau.com/designers/?
Source: aRmotFM1Zp.exe, 00000000.00000002.307503472.00000000095A2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
Source: aRmotFM1Zp.exe, 00000000.00000002.307503472.00000000095A2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
Source: aRmotFM1Zp.exe, 00000000.00000002.307503472.00000000095A2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.fontbureau.com/designers8
Source: aRmotFM1Zp.exe, 00000000.00000002.307503472.00000000095A2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.fontbureau.com/designers?
Source: aRmotFM1Zp.exe, 00000000.00000002.307503472.00000000095A2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.fontbureau.com/designersG
Source: aRmotFM1Zp.exe, 00000000.00000002.307503472.00000000095A2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.fonts.com
Source: aRmotFM1Zp.exe, 00000000.00000002.307503472.00000000095A2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.founder.com.cn/cn
Source: aRmotFM1Zp.exe, 00000000.00000002.307503472.00000000095A2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.founder.com.cn/cn/bThe
Source: aRmotFM1Zp.exe, 00000000.00000002.307503472.00000000095A2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.founder.com.cn/cn/cThe
Source: aRmotFM1Zp.exe, 00000000.00000002.307503472.00000000095A2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.galapagosdesign.com/DPlease
Source: aRmotFM1Zp.exe, 00000000.00000002.307503472.00000000095A2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
Source: aRmotFM1Zp.exe, 00000000.00000002.307503472.00000000095A2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.goodfont.co.kr
Source: aRmotFM1Zp.exe, 00000000.00000002.307503472.00000000095A2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/
Source: aRmotFM1Zp.exe, 00000000.00000002.307503472.00000000095A2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.sajatypeworks.com
Source: aRmotFM1Zp.exe, 00000000.00000002.307503472.00000000095A2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.sakkal.com
Source: aRmotFM1Zp.exe, 00000000.00000002.307503472.00000000095A2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.sandoll.co.kr
Source: aRmotFM1Zp.exe, 00000000.00000002.307503472.00000000095A2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.tiro.com
Source: aRmotFM1Zp.exe, 00000000.00000002.307503472.00000000095A2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.typography.netD
Source: aRmotFM1Zp.exe, 00000000.00000002.307503472.00000000095A2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.urwpp.deDPlease
Source: aRmotFM1Zp.exe, 00000000.00000002.307503472.00000000095A2000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.zhongyicts.com.cn
Source: aRmotFM1Zp.exe, 00000003.00000002.529873536.00000000028C1000.00000004.00000800.00020000.00000000.sdmp, HSpMzoJ.exe, 00000010.00000002.530370723.0000000002C81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://api.ipify.org%
Source: HSpMzoJ.exe, 00000010.00000002.530370723.0000000002C81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://api.ipify.org%appdata
Source: HSpMzoJ.exe, 00000010.00000002.531698848.0000000002FD5000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://rw3y87WIqxS3D5b0nQ.com
Source: aRmotFM1Zp.exe, 00000003.00000002.531217917.0000000002C1A000.00000004.00000800.00020000.00000000.sdmp, HSpMzoJ.exe, 00000010.00000002.531732412.0000000002FDD000.00000004.00000800.00020000.00000000.sdmp, HSpMzoJ.exe, 00000010.00000002.534760312.0000000006A70000.00000004.00000800.00020000.00000000.sdmp, HSpMzoJ.exe, 00000010.00000002.527332027.0000000000E75000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://sectigo.com/CPS0
Source: aRmotFM1Zp.exe, 00000003.00000002.529873536.00000000028C1000.00000004.00000800.00020000.00000000.sdmp, HSpMzoJ.exe, 00000010.00000002.530370723.0000000002C81000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
Source: unknown DNS traffic detected: queries for: us2.smtp.mailhostbox.com

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Windows user hook set: 0 keyboard low level C:\Users\user\Desktop\aRmotFM1Zp.exe Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Windows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Jump to behavior
Source: HSpMzoJ.exe, 0000000D.00000002.363261608.00000000014B8000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Window created: window name: CLIPBRDWNDCLASS Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Window created: window name: CLIPBRDWNDCLASS Jump to behavior

System Summary

barindex
Source: 16.0.HSpMzoJ.exe.400000.12.unpack, type: UNPACKEDPE Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
Source: 16.0.HSpMzoJ.exe.400000.10.unpack, type: UNPACKEDPE Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
Source: 0.2.aRmotFM1Zp.exe.4c586b0.8.unpack, type: UNPACKEDPE Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
Source: 3.0.aRmotFM1Zp.exe.400000.10.unpack, type: UNPACKEDPE Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
Source: 0.2.aRmotFM1Zp.exe.4c586b0.8.raw.unpack, type: UNPACKEDPE Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
Source: 0.2.aRmotFM1Zp.exe.4c24090.7.raw.unpack, type: UNPACKEDPE Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
Source: 0.2.aRmotFM1Zp.exe.4c24090.7.unpack, type: UNPACKEDPE Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
Source: 0.2.aRmotFM1Zp.exe.4bedc70.9.raw.unpack, type: UNPACKEDPE Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
Source: 3.0.aRmotFM1Zp.exe.400000.4.unpack, type: UNPACKEDPE Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
Source: 3.0.aRmotFM1Zp.exe.400000.12.unpack, type: UNPACKEDPE Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
Source: 13.2.HSpMzoJ.exe.4cf86b0.7.unpack, type: UNPACKEDPE Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
Source: 16.2.HSpMzoJ.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
Source: 16.0.HSpMzoJ.exe.400000.8.unpack, type: UNPACKEDPE Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
Source: 16.0.HSpMzoJ.exe.400000.4.unpack, type: UNPACKEDPE Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
Source: 3.0.aRmotFM1Zp.exe.400000.8.unpack, type: UNPACKEDPE Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
Source: 3.2.aRmotFM1Zp.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
Source: 13.2.HSpMzoJ.exe.4cc4090.9.unpack, type: UNPACKEDPE Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
Source: 0.2.aRmotFM1Zp.exe.32c5e18.3.raw.unpack, type: UNPACKEDPE Matched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
Source: 16.0.HSpMzoJ.exe.400000.6.unpack, type: UNPACKEDPE Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
Source: 3.0.aRmotFM1Zp.exe.400000.6.unpack, type: UNPACKEDPE Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
Source: 13.2.HSpMzoJ.exe.4cc4090.9.raw.unpack, type: UNPACKEDPE Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
Source: 13.2.HSpMzoJ.exe.4c8dc70.8.raw.unpack, type: UNPACKEDPE Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
Source: 13.2.HSpMzoJ.exe.4cf86b0.7.raw.unpack, type: UNPACKEDPE Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
Source: 13.2.HSpMzoJ.exe.3367ab0.2.raw.unpack, type: UNPACKEDPE Matched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
Source: aRmotFM1Zp.exe Static PE information: section name:
Source: HSpMzoJ.exe.3.dr Static PE information: section name:
Source: aRmotFM1Zp.exe Static PE information: section name: >Uuj
Source: HSpMzoJ.exe.3.dr Static PE information: section name: >Uuj
Source: aRmotFM1Zp.exe Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: 16.0.HSpMzoJ.exe.400000.12.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
Source: 16.0.HSpMzoJ.exe.400000.10.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
Source: 0.2.aRmotFM1Zp.exe.4c586b0.8.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
Source: 3.0.aRmotFM1Zp.exe.400000.10.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
Source: 0.2.aRmotFM1Zp.exe.4c586b0.8.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
Source: 0.2.aRmotFM1Zp.exe.4c24090.7.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
Source: 0.2.aRmotFM1Zp.exe.4c24090.7.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
Source: 0.2.aRmotFM1Zp.exe.4bedc70.9.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
Source: 3.0.aRmotFM1Zp.exe.400000.4.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
Source: 3.0.aRmotFM1Zp.exe.400000.12.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
Source: 13.2.HSpMzoJ.exe.4cf86b0.7.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
Source: 16.2.HSpMzoJ.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
Source: 16.0.HSpMzoJ.exe.400000.8.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
Source: 16.0.HSpMzoJ.exe.400000.4.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
Source: 3.0.aRmotFM1Zp.exe.400000.8.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
Source: 3.2.aRmotFM1Zp.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
Source: 13.2.HSpMzoJ.exe.4cc4090.9.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
Source: 0.2.aRmotFM1Zp.exe.32c5e18.3.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
Source: 16.0.HSpMzoJ.exe.400000.6.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
Source: 3.0.aRmotFM1Zp.exe.400000.6.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
Source: 13.2.HSpMzoJ.exe.4cc4090.9.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
Source: 13.2.HSpMzoJ.exe.4c8dc70.8.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
Source: 13.2.HSpMzoJ.exe.4cf86b0.7.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
Source: 13.2.HSpMzoJ.exe.3367ab0.2.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Code function: 0_2_09989D88 0_2_09989D88
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Code function: 0_2_0998F670 0_2_0998F670
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Code function: 0_2_09989D78 0_2_09989D78
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Code function: 0_2_0998F2A8 0_2_0998F2A8
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Code function: 0_2_0A070006 0_2_0A070006
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Code function: 0_2_0A070040 0_2_0A070040
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Code function: 0_2_0A079058 0_2_0A079058
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Code function: 3_2_005AEEE5 3_2_005AEEE5
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Code function: 3_2_00F5F380 3_2_00F5F380
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Code function: 3_2_00F5F6C8 3_2_00F5F6C8
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Code function: 3_2_00F56560 3_2_00F56560
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Code function: 3_2_05D4BC70 3_2_05D4BC70
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Code function: 3_2_05D4C9C1 3_2_05D4C9C1
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Code function: 3_2_05D42120 3_2_05D42120
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Code function: 3_2_05D40040 3_2_05D40040
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 13_2_0AE00040 13_2_0AE00040
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 13_2_0AE09058 13_2_0AE09058
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 13_2_0AE00007 13_2_0AE00007
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 14_2_00B430D8 14_2_00B430D8
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 14_2_00B42488 14_2_00B42488
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 14_2_00B404E0 14_2_00B404E0
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 14_2_00B44520 14_2_00B44520
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 14_2_00B43620 14_2_00B43620
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 14_2_00B42C28 14_2_00B42C28
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 14_2_00B430C9 14_2_00B430C9
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 14_2_00B4239F 14_2_00B4239F
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 14_2_00B444F7 14_2_00B444F7
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 14_2_00B404D0 14_2_00B404D0
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 14_2_00B42451 14_2_00B42451
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 14_2_00B46520 14_2_00B46520
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 14_2_00B46510 14_2_00B46510
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 14_2_00B43610 14_2_00B43610
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 14_2_00B46790 14_2_00B46790
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 14_2_00B46780 14_2_00B46780
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 14_2_00B469F8 14_2_00B469F8
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 14_2_00B41928 14_2_00B41928
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 14_2_00B41919 14_2_00B41919
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 14_2_00B46A08 14_2_00B46A08
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 14_2_00B42C19 14_2_00B42C19
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_007BEEE5 16_2_007BEEE5
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_0105F380 16_2_0105F380
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_0105F6C8 16_2_0105F6C8
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_01056560 16_2_01056560
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_0105F6BD 16_2_0105F6BD
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_06166F30 16_2_06166F30
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_06169420 16_2_06169420
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_0616E348 16_2_0616E348
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_0616BB67 16_2_0616BB67
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_061661C0 16_2_061661C0
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_0616562F 16_2_0616562F
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_06163330 16_2_06163330
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_061693BC 16_2_061693BC
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_0649EB30 16_2_0649EB30
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_06497F88 16_2_06497F88
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_06499858 16_2_06499858
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_0649C4A0 16_2_0649C4A0
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_0649B0B8 16_2_0649B0B8
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_06495A4E 16_2_06495A4E
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_06497E39 16_2_06497E39
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_0649DAD0 16_2_0649DAD0
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_06495AB0 16_2_06495AB0
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_0649D160 16_2_0649D160
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_06491108 16_2_06491108
Source: aRmotFM1Zp.exe Binary or memory string: OriginalFilename vs aRmotFM1Zp.exe
Source: aRmotFM1Zp.exe, 00000000.00000002.311773818.0000000009E00000.00000004.08000000.00040000.00000000.sdmp Binary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs aRmotFM1Zp.exe
Source: aRmotFM1Zp.exe, 00000000.00000002.296427062.0000000003051000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenameEvWTMpfsxfejaxYfeqVgKrjLScR.exe4 vs aRmotFM1Zp.exe
Source: aRmotFM1Zp.exe, 00000000.00000002.298973097.0000000003275000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamePoolWait.dll" vs aRmotFM1Zp.exe
Source: aRmotFM1Zp.exe, 00000000.00000002.309761505.0000000009B10000.00000004.08000000.00040000.00000000.sdmp Binary or memory string: OriginalFilenamePoolWait.dll" vs aRmotFM1Zp.exe
Source: aRmotFM1Zp.exe, 00000000.00000002.303899433.0000000004BED000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenameEvWTMpfsxfejaxYfeqVgKrjLScR.exe4 vs aRmotFM1Zp.exe
Source: aRmotFM1Zp.exe Binary or memory string: OriginalFilename vs aRmotFM1Zp.exe
Source: aRmotFM1Zp.exe, 00000003.00000002.525470477.00000000007C8000.00000004.00000010.00020000.00000000.sdmp Binary or memory string: OriginalFilenameUNKNOWN_FILET vs aRmotFM1Zp.exe
Source: aRmotFM1Zp.exe, 00000003.00000000.289976740.0000000000402000.00000040.00000400.00020000.00000000.sdmp Binary or memory string: OriginalFilenameEvWTMpfsxfejaxYfeqVgKrjLScR.exe4 vs aRmotFM1Zp.exe
Source: aRmotFM1Zp.exe, 00000003.00000002.534066906.0000000005F10000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenameLoaderOptimizat.exe4 vs aRmotFM1Zp.exe
Source: aRmotFM1Zp.exe Binary or memory string: OriginalFilenameLoaderOptimizat.exe4 vs aRmotFM1Zp.exe
Source: Joe Sandbox View Dropped File: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe C36EC3F847B81B6E59EE1E6D17544EE886A3A85105D1AA06646DF073F8590838
Source: aRmotFM1Zp.exe Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: HSpMzoJ.exe.3.dr Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: aRmotFM1Zp.exe Static PE information: Section: >Uuj ZLIB complexity 1.00043633644
Source: HSpMzoJ.exe.3.dr Static PE information: Section: >Uuj ZLIB complexity 1.00043633644
Source: aRmotFM1Zp.exe Virustotal: Detection: 35%
Source: aRmotFM1Zp.exe ReversingLabs: Detection: 28%
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe File read: C:\Users\user\Desktop\aRmotFM1Zp.exe Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\aRmotFM1Zp.exe "C:\Users\user\Desktop\aRmotFM1Zp.exe"
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process created: C:\Users\user\Desktop\aRmotFM1Zp.exe C:\Users\user\Desktop\aRmotFM1Zp.exe
Source: unknown Process created: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe "C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe"
Source: unknown Process created: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe "C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe"
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process created: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process created: C:\Users\user\Desktop\aRmotFM1Zp.exe C:\Users\user\Desktop\aRmotFM1Zp.exe Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process created: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32 Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe File created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\aRmotFM1Zp.exe.log Jump to behavior
Source: classification engine Classification label: mal100.troj.spyw.evad.winEXE@7/4@2/2
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe File opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Jump to behavior
Source: aRmotFM1Zp.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: aRmotFM1Zp.exe Static PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Code function: 0_2_00CE65B9 push es; ret 0_2_00CE65CA
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Code function: 0_2_00CE5B16 push es; retf 0_2_00CE5B18
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Code function: 0_2_00CE3F2C push esi; iretd 0_2_00CE3F33
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Code function: 0_2_0998D62C push eax; iretd 0_2_0998D62D
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Code function: 0_2_0A074CD2 push FFFFFFE4h; ret 0_2_0A074CD4
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Code function: 3_2_005AEC35 push es; iretd 3_2_005AECF6
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Code function: 3_2_05D4A5A0 push 8B000005h; retf 3_2_05D4A5A7
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Code function: 3_2_05D42E6D push esp; ret 3_2_05D42E6E
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Code function: 3_2_05D42BBD push edi; ret 3_2_05D42BBE
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 14_2_002A3F2C push esi; iretd 14_2_002A3F33
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 14_2_002A5B16 push es; retf 14_2_002A5B18
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 14_2_002A65B9 push es; ret 14_2_002A65CA
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_007BEC35 push es; iretd 16_2_007BECF6
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_0616BB67 push es; retf 0616h 16_2_0616CAE0
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_0616165E push es; ret 16_2_061618C4
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_06161662 push es; ret 16_2_061618C4
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_0616166A push es; ret 16_2_061618C4
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_0616169E push es; ret 16_2_061618C4
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_0616169A push es; ret 16_2_061618C4
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_061616B6 push es; ret 16_2_061618C4
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_061616B2 push es; ret 16_2_061618C4
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_061616BE push es; ret 16_2_061618C4
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_0616CEBE push es; ret 16_2_0616CEC0
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_061616BA push es; ret 16_2_061618C4
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_061616A6 push es; ret 16_2_061618C4
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_061616AE push es; ret 16_2_061618C4
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_061616AA push es; ret 16_2_061618C4
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_061616D6 push es; ret 16_2_061618C4
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_061616D2 push es; ret 16_2_061618C4
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_061616DE push es; ret 16_2_061618C4
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_061616DA push es; ret 16_2_061618C4
Source: aRmotFM1Zp.exe Static PE information: section name: >Uuj
Source: aRmotFM1Zp.exe Static PE information: section name:
Source: HSpMzoJ.exe.3.dr Static PE information: section name: >Uuj
Source: HSpMzoJ.exe.3.dr Static PE information: section name:
Source: aRmotFM1Zp.exe Static PE information: 0xFB984FB0 [Fri Oct 5 21:31:28 2103 UTC]
Source: initial sample Static PE information: section name: >Uuj entropy: 7.99627258012
Source: initial sample Static PE information: section name: .text entropy: 7.91715713466
Source: initial sample Static PE information: section name: >Uuj entropy: 7.99627258012
Source: initial sample Static PE information: section name: .text entropy: 7.91715713466
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe File created: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Jump to dropped file
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Registry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run HSpMzoJ Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Registry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run HSpMzoJ Jump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe File opened: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe:Zone.Identifier read attributes | delete Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Registry key monitored for changes: HKEY_CURRENT_USER_Classes Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion

barindex
Source: Yara match File source: 0.2.aRmotFM1Zp.exe.32c5e18.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.HSpMzoJ.exe.3367ab0.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000D.00000002.364235592.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.364734676.0000000003318000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.296427062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.298973097.0000000003275000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: aRmotFM1Zp.exe PID: 4376, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: HSpMzoJ.exe PID: 6104, type: MEMORYSTR
Source: aRmotFM1Zp.exe, 00000000.00000002.296427062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, aRmotFM1Zp.exe, 00000000.00000002.298973097.0000000003275000.00000004.00000800.00020000.00000000.sdmp, HSpMzoJ.exe, 0000000D.00000002.364734676.0000000003318000.00000004.00000800.00020000.00000000.sdmp, HSpMzoJ.exe, 0000000D.00000002.364235592.00000000030F1000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: SBIEDLL.DLL
Source: aRmotFM1Zp.exe, 00000000.00000002.296427062.0000000003051000.00000004.00000800.00020000.00000000.sdmp, aRmotFM1Zp.exe, 00000000.00000002.298973097.0000000003275000.00000004.00000800.00020000.00000000.sdmp, HSpMzoJ.exe, 0000000D.00000002.364734676.0000000003318000.00000004.00000800.00020000.00000000.sdmp, HSpMzoJ.exe, 0000000D.00000002.364235592.00000000030F1000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe TID: 5620 Thread sleep time: -45733s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe TID: 5500 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe TID: 3736 Thread sleep time: -23980767295822402s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe TID: 5848 Thread sleep count: 6211 > 30 Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe TID: 5848 Thread sleep count: 2558 > 30 Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe TID: 3536 Thread sleep time: -45733s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe TID: 5500 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe TID: 3368 Thread sleep time: -45733s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe TID: 1556 Thread sleep time: -23058430092136925s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe TID: 1524 Thread sleep count: 4279 > 30 Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe TID: 1524 Thread sleep count: 4480 > 30 Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Window / User API: threadDelayed 6211 Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Window / User API: threadDelayed 2558 Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Window / User API: threadDelayed 4279 Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Window / User API: threadDelayed 4480 Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Thread delayed: delay time: 45733 Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Thread delayed: delay time: 45733 Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Thread delayed: delay time: 45733 Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: HSpMzoJ.exe, 0000000D.00000002.364235592.00000000030F1000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: HSpMzoJ.exe, 0000000D.00000002.364235592.00000000030F1000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: vmware
Source: HSpMzoJ.exe, 0000000D.00000002.364235592.00000000030F1000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: VMware SVGA II
Source: HSpMzoJ.exe, 00000010.00000002.527332027.0000000000E75000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: HSpMzoJ.exe, 0000000D.00000002.364235592.00000000030F1000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools

Anti Debugging

barindex
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 14_2_00B416F8 CheckRemoteDebuggerPresent, 14_2_00B416F8
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Code function: 16_2_0649DF28 LdrInitializeThunk, 16_2_0649DF28
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Memory allocated: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Memory written: C:\Users\user\Desktop\aRmotFM1Zp.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Memory written: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Process created: C:\Users\user\Desktop\aRmotFM1Zp.exe C:\Users\user\Desktop\aRmotFM1Zp.exe Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Process created: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Users\user\Desktop\aRmotFM1Zp.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Users\user\Desktop\aRmotFM1Zp.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Queries volume information: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Queries volume information: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Queries volume information: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Code function: 3_2_05D44C28 GetUserNameW, 3_2_05D44C28

Stealing of Sensitive Information

barindex
Source: Yara match File source: 16.0.HSpMzoJ.exe.400000.12.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.0.HSpMzoJ.exe.400000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.aRmotFM1Zp.exe.4c586b0.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.aRmotFM1Zp.exe.400000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.aRmotFM1Zp.exe.4c586b0.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.aRmotFM1Zp.exe.4c24090.7.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.aRmotFM1Zp.exe.4c24090.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.aRmotFM1Zp.exe.4bedc70.9.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.aRmotFM1Zp.exe.400000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.aRmotFM1Zp.exe.400000.12.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.HSpMzoJ.exe.4cf86b0.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.2.HSpMzoJ.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.0.HSpMzoJ.exe.400000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.0.HSpMzoJ.exe.400000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.aRmotFM1Zp.exe.400000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.aRmotFM1Zp.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.HSpMzoJ.exe.4cc4090.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.0.HSpMzoJ.exe.400000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.aRmotFM1Zp.exe.400000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.HSpMzoJ.exe.4cc4090.9.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.HSpMzoJ.exe.4c8dc70.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.HSpMzoJ.exe.4cf86b0.7.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000010.00000002.522438754.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.369643217.0000000004C8D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000010.00000000.352232161.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000010.00000000.354545797.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000010.00000000.353714867.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000000.289976740.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000010.00000000.352943219.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.522484035.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000000.291340877.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000000.290808406.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000000.289323287.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.303899433.0000000004BED000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000010.00000002.530370723.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.529873536.00000000028C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: aRmotFM1Zp.exe PID: 4376, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: aRmotFM1Zp.exe PID: 5856, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: HSpMzoJ.exe PID: 6104, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: HSpMzoJ.exe PID: 5088, type: MEMORYSTR
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Key opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Key opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Jump to behavior
Source: C:\Users\user\Desktop\aRmotFM1Zp.exe Key opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe Key opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe File opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe File opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\ Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data Jump to behavior
Source: C:\Users\user\AppData\Roaming\HSpMzoJ\HSpMzoJ.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini Jump to behavior
Source: Yara match File source: 00000010.00000002.530370723.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.529873536.00000000028C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: aRmotFM1Zp.exe PID: 5856, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: HSpMzoJ.exe PID: 5088, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: 16.0.HSpMzoJ.exe.400000.12.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.0.HSpMzoJ.exe.400000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.aRmotFM1Zp.exe.4c586b0.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.aRmotFM1Zp.exe.400000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.aRmotFM1Zp.exe.4c586b0.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.aRmotFM1Zp.exe.4c24090.7.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.aRmotFM1Zp.exe.4c24090.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.aRmotFM1Zp.exe.4bedc70.9.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.aRmotFM1Zp.exe.400000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.aRmotFM1Zp.exe.400000.12.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.HSpMzoJ.exe.4cf86b0.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.2.HSpMzoJ.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.0.HSpMzoJ.exe.400000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.0.HSpMzoJ.exe.400000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.aRmotFM1Zp.exe.400000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.aRmotFM1Zp.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.HSpMzoJ.exe.4cc4090.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.0.HSpMzoJ.exe.400000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.0.aRmotFM1Zp.exe.400000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.HSpMzoJ.exe.4cc4090.9.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.HSpMzoJ.exe.4c8dc70.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.HSpMzoJ.exe.4cf86b0.7.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000010.00000002.522438754.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.369643217.0000000004C8D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000010.00000000.352232161.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000010.00000000.354545797.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000010.00000000.353714867.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000000.289976740.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000010.00000000.352943219.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.522484035.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000000.291340877.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000000.290808406.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000000.289323287.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.303899433.0000000004BED000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000010.00000002.530370723.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.529873536.00000000028C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: aRmotFM1Zp.exe PID: 4376, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: aRmotFM1Zp.exe PID: 5856, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: HSpMzoJ.exe PID: 6104, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: HSpMzoJ.exe PID: 5088, type: MEMORYSTR
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs