Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ZzO0LX45zz.exe

Overview

General Information

Sample Name:ZzO0LX45zz.exe
Analysis ID:652381
MD5:b625707c8cbc671fac1b182d7fe604a0
SHA1:518b0b9801baca0e481a0db5fc8ea11139597369
SHA256:37d4738584a69274cc886fca7482ede95c472c60b66bc4acab7ad16a261e8001
Tags:exeSnakeKeylogger
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AntiVM3
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal ftp login credentials
.NET source code references suspicious native API functions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
May check the online IP address of the machine
.NET source code contains potential unpacker
Yara detected Generic Downloader
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • ZzO0LX45zz.exe (PID: 4040 cmdline: "C:\Users\user\Desktop\ZzO0LX45zz.exe" MD5: B625707C8CBC671FAC1B182D7FE604A0)
    • ZzO0LX45zz.exe (PID: 1316 cmdline: C:\Users\user\Desktop\ZzO0LX45zz.exe MD5: B625707C8CBC671FAC1B182D7FE604A0)
    • ZzO0LX45zz.exe (PID: 256 cmdline: C:\Users\user\Desktop\ZzO0LX45zz.exe MD5: B625707C8CBC671FAC1B182D7FE604A0)
  • cleanup
{"Exfil Mode": "SMTP", "Username": "myreportlog@valete.buzz", "Password": "7213575aceACE@#$", "Host": "cp5ua.hyperhost.ua", "Port": "myreport@valete.buzz"}
SourceRuleDescriptionAuthorStrings
00000005.00000000.261744352.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000005.00000000.261744352.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
      00000005.00000000.261744352.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000005.00000000.261744352.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
        • 0x173b0:$x1: $%SMTPDV$
        • 0x173c6:$x2: $#TheHashHere%&
        • 0x18760:$x3: %FTPDV$
        • 0x18828:$x4: $%TelegramDv$
        • 0x14cf7:$x5: KeyLoggerEventArgs
        • 0x1508d:$x5: KeyLoggerEventArgs
        • 0x187d0:$m1: | Snake Keylogger
        • 0x18888:$m1: | Snake Keylogger
        • 0x189dc:$m1: | Snake Keylogger
        • 0x18b02:$m1: | Snake Keylogger
        • 0x18c5c:$m1: | Snake Keylogger
        • 0x18784:$m2: Clipboard Logs ID
        • 0x18992:$m2: Screenshot Logs ID
        • 0x18aa6:$m2: keystroke Logs ID
        • 0x18c92:$m3: SnakePW
        • 0x1896a:$m4: \SnakeKeylogger\
        00000005.00000000.262216439.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          Click to see the 27 entries
          SourceRuleDescriptionAuthorStrings
          5.0.ZzO0LX45zz.exe.400000.8.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
          • 0x1b2e6:$a2: \Comodo\Dragon\User Data\Default\Login Data
          • 0x1a4cf:$a3: \Google\Chrome\User Data\Default\Login Data
          • 0x1a916:$a4: \Orbitum\User Data\Default\Login Data
          • 0x1ba97:$a5: \Kometa\User Data\Default\Login Data
          5.0.ZzO0LX45zz.exe.400000.8.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
            5.0.ZzO0LX45zz.exe.400000.8.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
              5.0.ZzO0LX45zz.exe.400000.8.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                5.0.ZzO0LX45zz.exe.400000.8.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  Click to see the 73 entries
                  No Sigma rule has matched
                  Timestamp:192.168.2.4193.122.130.049758802842536 06/26/22-09:30:30.658014
                  SID:2842536
                  Source Port:49758
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: ZzO0LX45zz.exeVirustotal: Detection: 35%Perma Link
                  Source: ZzO0LX45zz.exeReversingLabs: Detection: 34%
                  Source: ZzO0LX45zz.exeJoe Sandbox ML: detected
                  Source: 5.0.ZzO0LX45zz.exe.400000.6.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 5.0.ZzO0LX45zz.exe.400000.4.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 5.0.ZzO0LX45zz.exe.400000.12.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 5.0.ZzO0LX45zz.exe.400000.8.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 5.2.ZzO0LX45zz.exe.400000.0.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 5.0.ZzO0LX45zz.exe.400000.10.unpackAvira: Label: TR/ATRAPS.Gen
                  Source: 0.2.ZzO0LX45zz.exe.3aa8340.10.raw.unpackMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "myreportlog@valete.buzz", "Password": "7213575aceACE@#$", "Host": "cp5ua.hyperhost.ua", "Port": "myreport@valete.buzz"}
                  Source: ZzO0LX45zz.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                  Source: ZzO0LX45zz.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Networking

                  barindex
                  Source: TrafficSnort IDS: 2842536 ETPRO TROJAN 404/Snake/Matiex Keylogger Style External IP Check 192.168.2.4:49758 -> 193.122.130.0:80
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeDNS query: name: checkip.dyndns.org
                  Source: Yara matchFile source: 5.0.ZzO0LX45zz.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.ZzO0LX45zz.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.ZzO0LX45zz.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.ZzO0LX45zz.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.ZzO0LX45zz.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ZzO0LX45zz.exe.3aa8340.10.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.ZzO0LX45zz.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ZzO0LX45zz.exe.3ac7f60.11.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ZzO0LX45zz.exe.28c76f0.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ZzO0LX45zz.exe.3a86920.9.raw.unpack, type: UNPACKEDPE
                  Source: Joe Sandbox ViewASN Name: ORACLE-BMC-31898US ORACLE-BMC-31898US
                  Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: ZzO0LX45zz.exe, 00000005.00000002.502047978.0000000002C76000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                  Source: ZzO0LX45zz.exe, 00000005.00000002.502004163.0000000002C66000.00000004.00000800.00020000.00000000.sdmp, ZzO0LX45zz.exe, 00000005.00000002.502047978.0000000002C76000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                  Source: ZzO0LX45zz.exe, 00000005.00000002.501881378.0000000002BD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                  Source: ZzO0LX45zz.exe, 00000000.00000002.267113155.0000000003A86000.00000004.00000800.00020000.00000000.sdmp, ZzO0LX45zz.exe, 00000005.00000000.261744352.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                  Source: ZzO0LX45zz.exe, 00000005.00000002.502004163.0000000002C66000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org4_k
                  Source: ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                  Source: ZzO0LX45zz.exe, 00000005.00000002.501881378.0000000002BD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                  Source: ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                  Source: ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                  Source: ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                  Source: ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                  Source: ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                  Source: ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                  Source: ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                  Source: ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                  Source: ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                  Source: ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                  Source: ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                  Source: ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                  Source: ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                  Source: ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                  Source: ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                  Source: ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                  Source: ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                  Source: ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                  Source: ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                  Source: ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                  Source: ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                  Source: ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                  Source: ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                  Source: ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                  Source: ZzO0LX45zz.exe, 00000000.00000002.267113155.0000000003A86000.00000004.00000800.00020000.00000000.sdmp, ZzO0LX45zz.exe, 00000005.00000000.261744352.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                  Source: unknownDNS traffic detected: queries for: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: ZzO0LX45zz.exe, 00000000.00000002.265229429.0000000000A5A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                  System Summary

                  barindex
                  Source: 5.0.ZzO0LX45zz.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 5.0.ZzO0LX45zz.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 5.0.ZzO0LX45zz.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 5.0.ZzO0LX45zz.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 5.0.ZzO0LX45zz.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 5.0.ZzO0LX45zz.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.ZzO0LX45zz.exe.3ac7f60.11.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.ZzO0LX45zz.exe.3ac7f60.11.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.ZzO0LX45zz.exe.3ac7f60.11.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 5.0.ZzO0LX45zz.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 5.0.ZzO0LX45zz.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 5.0.ZzO0LX45zz.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 5.0.ZzO0LX45zz.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 5.0.ZzO0LX45zz.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 5.0.ZzO0LX45zz.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 5.2.ZzO0LX45zz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 5.2.ZzO0LX45zz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 5.2.ZzO0LX45zz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.ZzO0LX45zz.exe.3aa8340.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.ZzO0LX45zz.exe.3aa8340.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.ZzO0LX45zz.exe.3aa8340.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 5.0.ZzO0LX45zz.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 5.0.ZzO0LX45zz.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 5.0.ZzO0LX45zz.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.ZzO0LX45zz.exe.3ac7f60.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.ZzO0LX45zz.exe.3ac7f60.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.ZzO0LX45zz.exe.3ac7f60.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.ZzO0LX45zz.exe.3aa8340.10.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.ZzO0LX45zz.exe.3aa8340.10.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.ZzO0LX45zz.exe.3aa8340.10.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0.2.ZzO0LX45zz.exe.28c76f0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                  Source: 0.2.ZzO0LX45zz.exe.3a86920.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.ZzO0LX45zz.exe.3a86920.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.ZzO0LX45zz.exe.3a86920.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000005.00000000.261744352.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000005.00000000.262216439.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000005.00000002.499883054.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000005.00000000.262752684.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000005.00000000.261323981.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000000.00000002.267113155.0000000003A86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: Process Memory Space: ZzO0LX45zz.exe PID: 4040, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: Process Memory Space: ZzO0LX45zz.exe PID: 256, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: ZzO0LX45zz.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                  Source: 5.0.ZzO0LX45zz.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 5.0.ZzO0LX45zz.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 5.0.ZzO0LX45zz.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 5.0.ZzO0LX45zz.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 5.0.ZzO0LX45zz.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 5.0.ZzO0LX45zz.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.ZzO0LX45zz.exe.3ac7f60.11.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 0.2.ZzO0LX45zz.exe.3ac7f60.11.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.ZzO0LX45zz.exe.3ac7f60.11.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 5.0.ZzO0LX45zz.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 5.0.ZzO0LX45zz.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 5.0.ZzO0LX45zz.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 5.0.ZzO0LX45zz.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 5.0.ZzO0LX45zz.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 5.0.ZzO0LX45zz.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 5.2.ZzO0LX45zz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 5.2.ZzO0LX45zz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 5.2.ZzO0LX45zz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.ZzO0LX45zz.exe.3aa8340.10.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 0.2.ZzO0LX45zz.exe.3aa8340.10.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.ZzO0LX45zz.exe.3aa8340.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 5.0.ZzO0LX45zz.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 5.0.ZzO0LX45zz.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 5.0.ZzO0LX45zz.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.ZzO0LX45zz.exe.3ac7f60.11.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 0.2.ZzO0LX45zz.exe.3ac7f60.11.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.ZzO0LX45zz.exe.3ac7f60.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.ZzO0LX45zz.exe.3aa8340.10.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 0.2.ZzO0LX45zz.exe.3aa8340.10.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.ZzO0LX45zz.exe.3aa8340.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0.2.ZzO0LX45zz.exe.28c76f0.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                  Source: 0.2.ZzO0LX45zz.exe.3a86920.9.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                  Source: 0.2.ZzO0LX45zz.exe.3a86920.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.ZzO0LX45zz.exe.3a86920.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000005.00000000.261744352.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000005.00000000.262216439.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000005.00000002.499883054.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000005.00000000.262752684.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000005.00000000.261323981.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000000.00000002.267113155.0000000003A86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: Process Memory Space: ZzO0LX45zz.exe PID: 4040, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: Process Memory Space: ZzO0LX45zz.exe PID: 256, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeCode function: 0_2_00A2CAA40_2_00A2CAA4
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeCode function: 0_2_00A2EEE00_2_00A2EEE0
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeCode function: 0_2_00A2EEF00_2_00A2EEF0
                  Source: ZzO0LX45zz.exeBinary or memory string: OriginalFilename vs ZzO0LX45zz.exe
                  Source: ZzO0LX45zz.exe, 00000000.00000002.265229429.0000000000A5A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs ZzO0LX45zz.exe
                  Source: ZzO0LX45zz.exe, 00000000.00000002.265962238.0000000002821000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloneHelper.dll4 vs ZzO0LX45zz.exe
                  Source: ZzO0LX45zz.exe, 00000000.00000002.266495533.0000000003829000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTweenEngineAPI.dllD vs ZzO0LX45zz.exe
                  Source: ZzO0LX45zz.exe, 00000000.00000002.264399044.0000000000392000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMethodB.exeF vs ZzO0LX45zz.exe
                  Source: ZzO0LX45zz.exe, 00000000.00000002.268692405.0000000006E40000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTweenEngineAPI.dllD vs ZzO0LX45zz.exe
                  Source: ZzO0LX45zz.exe, 00000000.00000002.267113155.0000000003A86000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs ZzO0LX45zz.exe
                  Source: ZzO0LX45zz.exe, 00000000.00000002.266053572.00000000028BF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNativeVariant.dll" vs ZzO0LX45zz.exe
                  Source: ZzO0LX45zz.exe, 00000000.00000002.266053572.00000000028BF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs ZzO0LX45zz.exe
                  Source: ZzO0LX45zz.exeBinary or memory string: OriginalFilename vs ZzO0LX45zz.exe
                  Source: ZzO0LX45zz.exe, 00000004.00000000.257292074.00000000002A2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMethodB.exeF vs ZzO0LX45zz.exe
                  Source: ZzO0LX45zz.exe, 00000005.00000000.260919726.0000000000702000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMethodB.exeF vs ZzO0LX45zz.exe
                  Source: ZzO0LX45zz.exe, 00000005.00000000.262245820.0000000000422000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs ZzO0LX45zz.exe
                  Source: ZzO0LX45zz.exe, 00000005.00000002.501133326.0000000000B37000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs ZzO0LX45zz.exe
                  Source: ZzO0LX45zz.exeBinary or memory string: OriginalFilenameMethodB.exeF vs ZzO0LX45zz.exe
                  Source: ZzO0LX45zz.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: ZzO0LX45zz.exeVirustotal: Detection: 35%
                  Source: ZzO0LX45zz.exeReversingLabs: Detection: 34%
                  Source: ZzO0LX45zz.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\ZzO0LX45zz.exe "C:\Users\user\Desktop\ZzO0LX45zz.exe"
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess created: C:\Users\user\Desktop\ZzO0LX45zz.exe C:\Users\user\Desktop\ZzO0LX45zz.exe
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess created: C:\Users\user\Desktop\ZzO0LX45zz.exe C:\Users\user\Desktop\ZzO0LX45zz.exe
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess created: C:\Users\user\Desktop\ZzO0LX45zz.exe C:\Users\user\Desktop\ZzO0LX45zz.exeJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess created: C:\Users\user\Desktop\ZzO0LX45zz.exe C:\Users\user\Desktop\ZzO0LX45zz.exeJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ZzO0LX45zz.exe.logJump to behavior
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/1@2/1
                  Source: ZzO0LX45zz.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: ZzO0LX45zz.exe, z2/yg.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 0.0.ZzO0LX45zz.exe.390000.0.unpack, z2/yg.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 0.2.ZzO0LX45zz.exe.390000.0.unpack, z2/yg.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 4.0.ZzO0LX45zz.exe.2a0000.1.unpack, z2/yg.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 4.2.ZzO0LX45zz.exe.2a0000.0.unpack, z2/yg.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 4.0.ZzO0LX45zz.exe.2a0000.2.unpack, z2/yg.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: ZzO0LX45zz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: ZzO0LX45zz.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Data Obfuscation

                  barindex
                  Source: ZzO0LX45zz.exe, z2/yg.cs.Net Code: W1 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 0.0.ZzO0LX45zz.exe.390000.0.unpack, z2/yg.cs.Net Code: W1 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 0.2.ZzO0LX45zz.exe.390000.0.unpack, z2/yg.cs.Net Code: W1 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 4.0.ZzO0LX45zz.exe.2a0000.1.unpack, z2/yg.cs.Net Code: W1 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 4.2.ZzO0LX45zz.exe.2a0000.0.unpack, z2/yg.cs.Net Code: W1 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 4.0.ZzO0LX45zz.exe.2a0000.2.unpack, z2/yg.cs.Net Code: W1 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 4.0.ZzO0LX45zz.exe.2a0000.3.unpack, z2/yg.cs.Net Code: W1 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 4.0.ZzO0LX45zz.exe.2a0000.0.unpack, z2/yg.cs.Net Code: W1 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 5.0.ZzO0LX45zz.exe.700000.2.unpack, z2/yg.cs.Net Code: W1 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 5.0.ZzO0LX45zz.exe.700000.1.unpack, z2/yg.cs.Net Code: W1 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 5.0.ZzO0LX45zz.exe.700000.13.unpack, z2/yg.cs.Net Code: W1 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 5.0.ZzO0LX45zz.exe.700000.5.unpack, z2/yg.cs.Net Code: W1 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeCode function: 0_2_00A21C58 push ebx; iretd 0_2_00A21C7A
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.811427817284098
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: 0.2.ZzO0LX45zz.exe.28c76f0.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.266053572.00000000028BF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ZzO0LX45zz.exe PID: 4040, type: MEMORYSTR
                  Source: ZzO0LX45zz.exe, 00000000.00000002.266053572.00000000028BF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: ZzO0LX45zz.exe, 00000000.00000002.266053572.00000000028BF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exe TID: 5352Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: ZzO0LX45zz.exe, 00000000.00000002.266053572.00000000028BF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: ZzO0LX45zz.exe, 00000000.00000002.266053572.00000000028BF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: ZzO0LX45zz.exe, 00000000.00000002.266053572.00000000028BF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                  Source: ZzO0LX45zz.exe, 00000000.00000002.266053572.00000000028BF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: 5.0.ZzO0LX45zz.exe.400000.6.unpack, U????/??Z??.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
                  Source: 5.0.ZzO0LX45zz.exe.400000.6.unpack, ????A/u0032u060cufffd??.csReference to suspicious API methods: ('???A?', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                  Source: 5.0.ZzO0LX45zz.exe.400000.4.unpack, U????/??Z??.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
                  Source: 5.0.ZzO0LX45zz.exe.400000.4.unpack, ????A/u0032u060cufffd??.csReference to suspicious API methods: ('???A?', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                  Source: 5.0.ZzO0LX45zz.exe.400000.12.unpack, U????/??Z??.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
                  Source: 5.0.ZzO0LX45zz.exe.400000.12.unpack, ????A/u0032u060cufffd??.csReference to suspicious API methods: ('???A?', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess created: C:\Users\user\Desktop\ZzO0LX45zz.exe C:\Users\user\Desktop\ZzO0LX45zz.exeJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeProcess created: C:\Users\user\Desktop\ZzO0LX45zz.exe C:\Users\user\Desktop\ZzO0LX45zz.exeJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Users\user\Desktop\ZzO0LX45zz.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Users\user\Desktop\ZzO0LX45zz.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 5.0.ZzO0LX45zz.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.ZzO0LX45zz.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ZzO0LX45zz.exe.3ac7f60.11.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.ZzO0LX45zz.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.ZzO0LX45zz.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.ZzO0LX45zz.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ZzO0LX45zz.exe.3aa8340.10.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.ZzO0LX45zz.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ZzO0LX45zz.exe.3ac7f60.11.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ZzO0LX45zz.exe.3aa8340.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ZzO0LX45zz.exe.3a86920.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000000.261744352.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.262216439.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.499883054.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.262752684.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.261323981.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.267113155.0000000003A86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 5.0.ZzO0LX45zz.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.ZzO0LX45zz.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ZzO0LX45zz.exe.3ac7f60.11.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.ZzO0LX45zz.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.ZzO0LX45zz.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.ZzO0LX45zz.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ZzO0LX45zz.exe.3aa8340.10.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.ZzO0LX45zz.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ZzO0LX45zz.exe.3ac7f60.11.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ZzO0LX45zz.exe.3aa8340.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ZzO0LX45zz.exe.3a86920.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000000.261744352.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.262216439.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.499883054.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.262752684.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.261323981.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.267113155.0000000003A86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ZzO0LX45zz.exe PID: 4040, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: ZzO0LX45zz.exe PID: 256, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                  Source: C:\Users\user\Desktop\ZzO0LX45zz.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: Yara matchFile source: 5.0.ZzO0LX45zz.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.ZzO0LX45zz.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ZzO0LX45zz.exe.3ac7f60.11.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.ZzO0LX45zz.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.ZzO0LX45zz.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.ZzO0LX45zz.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ZzO0LX45zz.exe.3aa8340.10.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.ZzO0LX45zz.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ZzO0LX45zz.exe.3ac7f60.11.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ZzO0LX45zz.exe.3aa8340.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ZzO0LX45zz.exe.3a86920.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000000.261744352.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.262216439.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.499883054.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.262752684.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.261323981.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.267113155.0000000003A86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ZzO0LX45zz.exe PID: 4040, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: ZzO0LX45zz.exe PID: 256, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 5.0.ZzO0LX45zz.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.ZzO0LX45zz.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ZzO0LX45zz.exe.3ac7f60.11.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.ZzO0LX45zz.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.ZzO0LX45zz.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.ZzO0LX45zz.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ZzO0LX45zz.exe.3aa8340.10.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.ZzO0LX45zz.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ZzO0LX45zz.exe.3ac7f60.11.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ZzO0LX45zz.exe.3aa8340.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ZzO0LX45zz.exe.3a86920.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000000.261744352.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.262216439.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.499883054.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.262752684.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.261323981.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.267113155.0000000003A86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 5.0.ZzO0LX45zz.exe.400000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.ZzO0LX45zz.exe.400000.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ZzO0LX45zz.exe.3ac7f60.11.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.ZzO0LX45zz.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.ZzO0LX45zz.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.ZzO0LX45zz.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ZzO0LX45zz.exe.3aa8340.10.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.ZzO0LX45zz.exe.400000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ZzO0LX45zz.exe.3ac7f60.11.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ZzO0LX45zz.exe.3aa8340.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.ZzO0LX45zz.exe.3a86920.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000000.261744352.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.262216439.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.499883054.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.262752684.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.261323981.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.267113155.0000000003A86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: ZzO0LX45zz.exe PID: 4040, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: ZzO0LX45zz.exe PID: 256, type: MEMORYSTR
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid Accounts1
                  Native API
                  Path Interception11
                  Process Injection
                  1
                  Masquerading
                  2
                  OS Credential Dumping
                  11
                  Security Software Discovery
                  Remote Services1
                  Email Collection
                  Exfiltration Over Other Network Medium1
                  Encrypted Channel
                  Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                  Disable or Modify Tools
                  1
                  Input Capture
                  1
                  Process Discovery
                  Remote Desktop Protocol1
                  Input Capture
                  Exfiltration Over Bluetooth1
                  Ingress Tool Transfer
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
                  Virtualization/Sandbox Evasion
                  Security Account Manager21
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin Shares11
                  Archive Collected Data
                  Automated Exfiltration2
                  Non-Application Layer Protocol
                  Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
                  Process Injection
                  NTDS1
                  Remote System Discovery
                  Distributed Component Object Model2
                  Data from Local System
                  Scheduled Transfer12
                  Application Layer Protocol
                  SIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                  Deobfuscate/Decode Files or Information
                  LSA Secrets1
                  System Network Configuration Discovery
                  SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.common2
                  Obfuscated Files or Information
                  Cached Domain Credentials13
                  System Information Discovery
                  VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup Items13
                  Software Packing
                  DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  ZzO0LX45zz.exe36%VirustotalBrowse
                  ZzO0LX45zz.exe34%ReversingLabs
                  ZzO0LX45zz.exe100%Joe Sandbox ML
                  No Antivirus matches
                  SourceDetectionScannerLabelLinkDownload
                  5.0.ZzO0LX45zz.exe.400000.6.unpack100%AviraTR/ATRAPS.GenDownload File
                  5.0.ZzO0LX45zz.exe.400000.4.unpack100%AviraTR/ATRAPS.GenDownload File
                  5.0.ZzO0LX45zz.exe.400000.12.unpack100%AviraTR/ATRAPS.GenDownload File
                  5.0.ZzO0LX45zz.exe.400000.8.unpack100%AviraTR/ATRAPS.GenDownload File
                  5.2.ZzO0LX45zz.exe.400000.0.unpack100%AviraTR/ATRAPS.GenDownload File
                  5.0.ZzO0LX45zz.exe.400000.10.unpack100%AviraTR/ATRAPS.GenDownload File
                  SourceDetectionScannerLabelLink
                  checkip.dyndns.com0%VirustotalBrowse
                  checkip.dyndns.org0%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  http://www.tiro.com0%URL Reputationsafe
                  http://checkip.dyndns.org0%URL Reputationsafe
                  http://www.goodfont.co.kr0%URL Reputationsafe
                  http://www.carterandcone.coml0%URL Reputationsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  http://www.typography.netD0%URL Reputationsafe
                  http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  http://fontfabrik.com0%URL Reputationsafe
                  http://www.founder.com.cn/cn0%URL Reputationsafe
                  http://checkip.dyndns.org/0%URL Reputationsafe
                  http://checkip.dyndns.org4_k0%Avira URL Cloudsafe
                  http://checkip.dyndns.org/q0%URL Reputationsafe
                  http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://checkip.dyndns.com0%URL Reputationsafe
                  http://www.urwpp.deDPlease0%URL Reputationsafe
                  http://www.zhongyicts.com.cn0%URL Reputationsafe
                  http://www.sakkal.com0%URL Reputationsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  checkip.dyndns.com
                  193.122.130.0
                  truetrueunknown
                  checkip.dyndns.org
                  unknown
                  unknowntrueunknown
                  NameMaliciousAntivirus DetectionReputation
                  http://checkip.dyndns.org/true
                  • URL Reputation: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://www.apache.org/licenses/LICENSE-2.0ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.comZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.com/designersGZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.com/designers/?ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.founder.com.cn/cn/bTheZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://api.telegram.org/botZzO0LX45zz.exe, 00000000.00000002.267113155.0000000003A86000.00000004.00000800.00020000.00000000.sdmp, ZzO0LX45zz.exe, 00000005.00000000.261744352.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.com/designers?ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.tiro.comZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://checkip.dyndns.orgZzO0LX45zz.exe, 00000005.00000002.502004163.0000000002C66000.00000004.00000800.00020000.00000000.sdmp, ZzO0LX45zz.exe, 00000005.00000002.502047978.0000000002C76000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designersZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.goodfont.co.krZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comlZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.sajatypeworks.comZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.typography.netDZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/cabarga.htmlNZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.founder.com.cn/cn/cTheZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.galapagosdesign.com/staff/dennis.htmZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://fontfabrik.comZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.founder.com.cn/cnZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers/frere-user.htmlZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://checkip.dyndns.org4_kZzO0LX45zz.exe, 00000005.00000002.502004163.0000000002C66000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    low
                                    http://checkip.dyndns.org/qZzO0LX45zz.exe, 00000000.00000002.267113155.0000000003A86000.00000004.00000800.00020000.00000000.sdmp, ZzO0LX45zz.exe, 00000005.00000000.261744352.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.galapagosdesign.com/DPleaseZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers8ZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.fonts.comZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.sandoll.co.krZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://checkip.dyndns.comZzO0LX45zz.exe, 00000005.00000002.502047978.0000000002C76000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.urwpp.deDPleaseZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.zhongyicts.com.cnZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameZzO0LX45zz.exe, 00000005.00000002.501881378.0000000002BD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.sakkal.comZzO0LX45zz.exe, 00000000.00000002.268065251.0000000006802000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          193.122.130.0
                                          checkip.dyndns.comUnited States
                                          31898ORACLE-BMC-31898UStrue
                                          Joe Sandbox Version:35.0.0 Citrine
                                          Analysis ID:652381
                                          Start date and time: 26/06/202209:29:092022-06-26 09:29:09 +02:00
                                          Joe Sandbox Product:CloudBasic
                                          Overall analysis duration:0h 11m 14s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Sample file name:ZzO0LX45zz.exe
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                          Number of analysed new started processes analysed:27
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • HDC enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Detection:MAL
                                          Classification:mal100.troj.spyw.evad.winEXE@5/1@2/1
                                          EGA Information:
                                          • Successful, ratio: 50%
                                          HDC Information:
                                          • Successful, ratio: 0.6% (good quality ratio 0.3%)
                                          • Quality average: 37.2%
                                          • Quality standard deviation: 34.9%
                                          HCA Information:
                                          • Successful, ratio: 97%
                                          • Number of executed functions: 18
                                          • Number of non-executed functions: 3
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Adjust boot time
                                          • Enable AMSI
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                          • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                          • Execution Graph export aborted for target ZzO0LX45zz.exe, PID 1316 because there are no executed function
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report creation exceeded maximum time and may have missing disassembly code information.
                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          TimeTypeDescription
                                          09:30:21API Interceptor1x Sleep call for process: ZzO0LX45zz.exe modified
                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          193.122.130.0MV SEA EVERGOLD.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          4vQAHpapFz.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          aercUUUX2C.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          CUSTOMER REQUEST.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          Import shipment.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          854F1E97-5DBB-4A87-A566-33D9012B05E2 pdf.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          tka30O3OZN.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          ViAKIk7T7X.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          qzzwd4Mg1N.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          4008765678900--98765.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          F96UcEk8Z9.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          t5nmFGhdVA.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          Order Details.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          uc2RxH8hO7.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          gsjRXEqpy51bLEm.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          RFQ_5076414.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          0043302751 22062022 pdf.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          SecuriteInfo.com.Trojan.DownloaderNET.345.29836.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          Remittance Advice.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          ORDEN DE COMPRA.001.exeGet hashmaliciousBrowse
                                          • checkip.dyndns.org/
                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          checkip.dyndns.comMV CHINALAND.exeGet hashmaliciousBrowse
                                          • 158.101.44.242
                                          Import shipment.exeGet hashmaliciousBrowse
                                          • 132.226.247.73
                                          MV SEA EVERGOLD.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          4vQAHpapFz.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          SecuriteInfo.com.IL.Trojan.MSILZilla.16190.26221.exeGet hashmaliciousBrowse
                                          • 193.122.6.168
                                          gD5LFrPtfc.exeGet hashmaliciousBrowse
                                          • 132.226.247.73
                                          aercUUUX2C.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          vSgQo7dqYG.exeGet hashmaliciousBrowse
                                          • 158.101.44.242
                                          MV CHINALAND.exeGet hashmaliciousBrowse
                                          • 132.226.8.169
                                          22017_TIEM2 - RFQ.exeGet hashmaliciousBrowse
                                          • 158.101.44.242
                                          CUSTOMER REQUEST.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          Import shipment.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          854F1E97-5DBB-4A87-A566-33D9012B05E2 pdf.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          tka30O3OZN.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          MV SEA EVERGOLD.exeGet hashmaliciousBrowse
                                          • 132.226.247.73
                                          Docume001.exeGet hashmaliciousBrowse
                                          • 132.226.8.169
                                          ViAKIk7T7X.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          qzzwd4Mg1N.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          4008765678900--98765.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          MV SEA EVERGOLD.exeGet hashmaliciousBrowse
                                          • 132.226.247.73
                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          ORACLE-BMC-31898USMV CHINALAND.exeGet hashmaliciousBrowse
                                          • 158.101.44.242
                                          MV SEA EVERGOLD.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          4vQAHpapFz.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          SecuriteInfo.com.IL.Trojan.MSILZilla.16190.26221.exeGet hashmaliciousBrowse
                                          • 193.122.6.168
                                          aercUUUX2C.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          vSgQo7dqYG.exeGet hashmaliciousBrowse
                                          • 158.101.44.242
                                          22017_TIEM2 - RFQ.exeGet hashmaliciousBrowse
                                          • 158.101.44.242
                                          CUSTOMER REQUEST.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          Import shipment.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          854F1E97-5DBB-4A87-A566-33D9012B05E2 pdf.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          tka30O3OZN.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          ViAKIk7T7X.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          qzzwd4Mg1N.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          4008765678900--98765.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          https://wallpaperaccess.com/miami-nightGet hashmaliciousBrowse
                                          • 150.136.25.38
                                          b8sqHJocuX.exeGet hashmaliciousBrowse
                                          • 193.122.6.168
                                          report.exeGet hashmaliciousBrowse
                                          • 193.122.6.168
                                          F96UcEk8Z9.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          t5nmFGhdVA.exeGet hashmaliciousBrowse
                                          • 193.122.130.0
                                          Payment Copy.exeGet hashmaliciousBrowse
                                          • 193.122.6.168
                                          No context
                                          No context
                                          Process:C:\Users\user\Desktop\ZzO0LX45zz.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1216
                                          Entropy (8bit):5.355304211458859
                                          Encrypted:false
                                          SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                          MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                          SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                          SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                          SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                          Malicious:true
                                          Reputation:high, very likely benign file
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Entropy (8bit):7.801032133113793
                                          TrID:
                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                          • DOS Executable Generic (2002/1) 0.01%
                                          File name:ZzO0LX45zz.exe
                                          File size:514560
                                          MD5:b625707c8cbc671fac1b182d7fe604a0
                                          SHA1:518b0b9801baca0e481a0db5fc8ea11139597369
                                          SHA256:37d4738584a69274cc886fca7482ede95c472c60b66bc4acab7ad16a261e8001
                                          SHA512:d65677824d5a518cc9795df85d9ee73486757640882b48fe94f0f2f5b6bc00b1267b71d70e3713eacf326227729bd5cbbb5a7b6d8a5ef53d4cb9fa04eb1a2768
                                          SSDEEP:12288:KY4H2iNDkPRxliW1ja0aHqaxLlDwkFUFJtPMzFv0gZW:i1pkPRrh+xHqqDXFUZMzFvnY
                                          TLSH:FCB4F195F7A5899AC0835375D8E8D0141263F74A82FEC61B78FA320AD9733E744A2F47
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......b..............0.................. ........@.. .......................@............@................................
                                          Icon Hash:00828e8e8686b000
                                          Entrypoint:0x47f1ee
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x62B7C394 [Sun Jun 26 02:25:24 2022 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                          Instruction
                                          jmp dword ptr [00402000h]
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x7f1a00x4b.text
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x800000x394.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x820000xc.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x20000x7d1f40x7d200False0.8612247127872128data7.811427817284098IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rsrc0x800000x3940x400False0.375data2.9045572751661806IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0x820000xc0x200False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountry
                                          RT_VERSION0x800580x33cdata
                                          DLLImport
                                          mscoree.dll_CorExeMain
                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                          192.168.2.4193.122.130.049758802842536 06/26/22-09:30:30.658014TCP2842536ETPRO TROJAN 404/Snake/Matiex Keylogger Style External IP Check4975880192.168.2.4193.122.130.0
                                          TimestampSource PortDest PortSource IPDest IP
                                          Jun 26, 2022 09:30:30.548811913 CEST4975880192.168.2.4193.122.130.0
                                          Jun 26, 2022 09:30:30.657449961 CEST8049758193.122.130.0192.168.2.4
                                          Jun 26, 2022 09:30:30.657552004 CEST4975880192.168.2.4193.122.130.0
                                          Jun 26, 2022 09:30:30.658014059 CEST4975880192.168.2.4193.122.130.0
                                          Jun 26, 2022 09:30:30.768340111 CEST8049758193.122.130.0192.168.2.4
                                          Jun 26, 2022 09:30:30.769058943 CEST8049758193.122.130.0192.168.2.4
                                          Jun 26, 2022 09:30:30.843415022 CEST4975880192.168.2.4193.122.130.0
                                          Jun 26, 2022 09:31:35.768660069 CEST8049758193.122.130.0192.168.2.4
                                          Jun 26, 2022 09:31:35.768879890 CEST4975880192.168.2.4193.122.130.0
                                          Jun 26, 2022 09:32:10.786947012 CEST4975880192.168.2.4193.122.130.0
                                          Jun 26, 2022 09:32:10.895704985 CEST8049758193.122.130.0192.168.2.4
                                          TimestampSource PortDest PortSource IPDest IP
                                          Jun 26, 2022 09:30:30.462578058 CEST6445453192.168.2.48.8.8.8
                                          Jun 26, 2022 09:30:30.481302023 CEST53644548.8.8.8192.168.2.4
                                          Jun 26, 2022 09:30:30.508626938 CEST6050653192.168.2.48.8.8.8
                                          Jun 26, 2022 09:30:30.525662899 CEST53605068.8.8.8192.168.2.4
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                          Jun 26, 2022 09:30:30.462578058 CEST192.168.2.48.8.8.80x5b58Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                                          Jun 26, 2022 09:30:30.508626938 CEST192.168.2.48.8.8.80xe705Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                          Jun 26, 2022 09:30:30.481302023 CEST8.8.8.8192.168.2.40x5b58No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                                          Jun 26, 2022 09:30:30.481302023 CEST8.8.8.8192.168.2.40x5b58No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)
                                          Jun 26, 2022 09:30:30.481302023 CEST8.8.8.8192.168.2.40x5b58No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)
                                          Jun 26, 2022 09:30:30.481302023 CEST8.8.8.8192.168.2.40x5b58No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)
                                          Jun 26, 2022 09:30:30.481302023 CEST8.8.8.8192.168.2.40x5b58No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)
                                          Jun 26, 2022 09:30:30.481302023 CEST8.8.8.8192.168.2.40x5b58No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)
                                          Jun 26, 2022 09:30:30.525662899 CEST8.8.8.8192.168.2.40xe705No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                                          Jun 26, 2022 09:30:30.525662899 CEST8.8.8.8192.168.2.40xe705No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)
                                          Jun 26, 2022 09:30:30.525662899 CEST8.8.8.8192.168.2.40xe705No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)
                                          Jun 26, 2022 09:30:30.525662899 CEST8.8.8.8192.168.2.40xe705No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)
                                          Jun 26, 2022 09:30:30.525662899 CEST8.8.8.8192.168.2.40xe705No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)
                                          Jun 26, 2022 09:30:30.525662899 CEST8.8.8.8192.168.2.40xe705No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)
                                          • checkip.dyndns.org
                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                          0192.168.2.449758193.122.130.080C:\Users\user\Desktop\ZzO0LX45zz.exe
                                          TimestampkBytes transferredDirectionData
                                          Jun 26, 2022 09:30:30.658014059 CEST1144OUTGET / HTTP/1.1
                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                          Host: checkip.dyndns.org
                                          Connection: Keep-Alive
                                          Jun 26, 2022 09:30:30.769058943 CEST1144INHTTP/1.1 200 OK
                                          Date: Sun, 26 Jun 2022 07:30:30 GMT
                                          Content-Type: text/html
                                          Content-Length: 106
                                          Connection: keep-alive
                                          Cache-Control: no-cache
                                          Pragma: no-cache
                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 34 33 2e 36 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.143.61</body></html>


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:09:30:09
                                          Start date:26/06/2022
                                          Path:C:\Users\user\Desktop\ZzO0LX45zz.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\ZzO0LX45zz.exe"
                                          Imagebase:0x390000
                                          File size:514560 bytes
                                          MD5 hash:B625707C8CBC671FAC1B182D7FE604A0
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.267113155.0000000003A86000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.267113155.0000000003A86000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.267113155.0000000003A86000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.267113155.0000000003A86000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.266053572.00000000028BF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low

                                          Target ID:4
                                          Start time:09:30:23
                                          Start date:26/06/2022
                                          Path:C:\Users\user\Desktop\ZzO0LX45zz.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Users\user\Desktop\ZzO0LX45zz.exe
                                          Imagebase:0x2a0000
                                          File size:514560 bytes
                                          MD5 hash:B625707C8CBC671FAC1B182D7FE604A0
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:low

                                          Target ID:5
                                          Start time:09:30:24
                                          Start date:26/06/2022
                                          Path:C:\Users\user\Desktop\ZzO0LX45zz.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Desktop\ZzO0LX45zz.exe
                                          Imagebase:0x700000
                                          File size:514560 bytes
                                          MD5 hash:B625707C8CBC671FAC1B182D7FE604A0
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000005.00000000.261744352.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000000.261744352.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000000.261744352.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000005.00000000.261744352.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000005.00000000.262216439.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000000.262216439.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000000.262216439.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000005.00000000.262216439.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000005.00000002.499883054.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000002.499883054.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.499883054.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000005.00000002.499883054.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000005.00000000.262752684.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000000.262752684.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000000.262752684.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000005.00000000.262752684.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000005.00000000.261323981.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000000.261323981.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000000.261323981.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000005.00000000.261323981.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                          Reputation:low

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:12.2%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:104
                                            Total number of Limit Nodes:7
                                            execution_graph 15214 a2c010 15215 a2c012 GetCurrentProcess 15214->15215 15216 a2c083 15215->15216 15217 a2c08a GetCurrentThread 15215->15217 15216->15217 15218 a2c0c7 GetCurrentProcess 15217->15218 15220 a2c0c0 15217->15220 15219 a2c0fd 15218->15219 15221 a2c125 GetCurrentThreadId 15219->15221 15220->15218 15222 a2c156 15221->15222 15126 a240e8 15127 a24105 15126->15127 15128 a2412c 15127->15128 15132 a24249 15127->15132 15137 a23c7c 15128->15137 15130 a24115 15133 a2426d 15132->15133 15141 a24348 15133->15141 15145 a24338 15133->15145 15138 a23c87 15137->15138 15153 a26dbc 15138->15153 15140 a2714f 15140->15130 15143 a2436f 15141->15143 15142 a2444c 15142->15142 15143->15142 15149 a23e58 15143->15149 15147 a2436f 15145->15147 15146 a2444c 15146->15146 15147->15146 15148 a23e58 CreateActCtxA 15147->15148 15148->15146 15150 a253d8 CreateActCtxA 15149->15150 15152 a2549b 15150->15152 15154 a26dc7 15153->15154 15157 a26dec 15154->15157 15156 a273ad 15156->15140 15158 a26df7 15157->15158 15161 a26e1c 15158->15161 15160 a27482 15160->15156 15162 a26e27 15161->15162 15165 a26e4c 15162->15165 15164 a27582 15164->15160 15166 a26e57 15165->15166 15167 a27cdc 15166->15167 15169 a2bd38 15166->15169 15167->15164 15170 a2bcf8 15169->15170 15171 a2bd3e 15169->15171 15170->15167 15172 a2bd8d 15171->15172 15175 a2bee8 15171->15175 15179 a2bef8 15171->15179 15172->15167 15176 a2bf05 15175->15176 15177 a2bf3f 15176->15177 15183 a2a9b4 15176->15183 15177->15172 15181 a2bf05 15179->15181 15180 a2bf3f 15180->15172 15181->15180 15182 a2a9b4 2 API calls 15181->15182 15182->15180 15184 a2a9bf 15183->15184 15186 a2cc38 15184->15186 15187 a2c7d4 15184->15187 15186->15186 15188 a2c7df 15187->15188 15189 a26e4c 2 API calls 15188->15189 15190 a2cca7 15189->15190 15195 a2ea18 15190->15195 15201 a2ea28 15190->15201 15207 a2ea02 15190->15207 15191 a2cce0 15191->15186 15197 a2ea59 15195->15197 15198 a2eaa5 15195->15198 15196 a2ea65 15196->15191 15197->15196 15199 a2ee97 LoadLibraryExW GetModuleHandleW 15197->15199 15200 a2eea8 LoadLibraryExW GetModuleHandleW 15197->15200 15198->15191 15199->15198 15200->15198 15203 a2ea59 15201->15203 15204 a2eaa5 15201->15204 15202 a2ea65 15202->15191 15203->15202 15205 a2ee97 LoadLibraryExW GetModuleHandleW 15203->15205 15206 a2eea8 LoadLibraryExW GetModuleHandleW 15203->15206 15204->15191 15205->15204 15206->15204 15208 a2ea0c 15207->15208 15209 a2ea65 15208->15209 15210 a2ee97 LoadLibraryExW GetModuleHandleW 15208->15210 15211 a2eea8 LoadLibraryExW GetModuleHandleW 15208->15211 15209->15191 15210->15209 15211->15209 15212 a2c238 DuplicateHandle 15213 a2c2ce 15212->15213 15223 a29c18 15224 a29c27 15223->15224 15227 a29d10 15223->15227 15235 a29cff 15223->15235 15228 a29d23 15227->15228 15229 a29d3b 15228->15229 15243 a29f88 15228->15243 15247 a29f98 15228->15247 15229->15224 15230 a29d33 15230->15229 15231 a29f38 GetModuleHandleW 15230->15231 15232 a29f65 15231->15232 15232->15224 15236 a29d23 15235->15236 15238 a29d3b 15236->15238 15241 a29f88 LoadLibraryExW 15236->15241 15242 a29f98 LoadLibraryExW 15236->15242 15237 a29d33 15237->15238 15239 a29f38 GetModuleHandleW 15237->15239 15238->15224 15240 a29f65 15239->15240 15240->15224 15241->15237 15242->15237 15244 a29fac 15243->15244 15246 a29fd1 15244->15246 15251 a29090 15244->15251 15246->15230 15248 a29fac 15247->15248 15249 a29090 LoadLibraryExW 15248->15249 15250 a29fd1 15248->15250 15249->15250 15250->15230 15252 a2a178 LoadLibraryExW 15251->15252 15254 a2a1f1 15252->15254 15254->15246

                                            Control-flow Graph

                                            APIs
                                            • GetCurrentProcess.KERNEL32 ref: 00A2C070
                                            • GetCurrentThread.KERNEL32 ref: 00A2C0AD
                                            • GetCurrentProcess.KERNEL32 ref: 00A2C0EA
                                            • GetCurrentThreadId.KERNEL32 ref: 00A2C143
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.265061610.0000000000A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a20000_ZzO0LX45zz.jbxd
                                            Similarity
                                            • API ID: Current$ProcessThread
                                            • String ID: jiJa
                                            • API String ID: 2063062207-49991317
                                            • Opcode ID: 970ca42667821c2166836ffab2db653114a83e31aa6bea88bcb16f9d5d3ce267
                                            • Instruction ID: f73f16ec2d0ff996ca9fbd279c77c3916c35d4251ad189274a63f94f6e44aaf6
                                            • Opcode Fuzzy Hash: 970ca42667821c2166836ffab2db653114a83e31aa6bea88bcb16f9d5d3ce267
                                            • Instruction Fuzzy Hash: 465177B0904748CFDB10CFA9D548BEEBBF0EF89318F248469E509A7361C774A948CB65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            APIs
                                            • GetCurrentProcess.KERNEL32 ref: 00A2C070
                                            • GetCurrentThread.KERNEL32 ref: 00A2C0AD
                                            • GetCurrentProcess.KERNEL32 ref: 00A2C0EA
                                            • GetCurrentThreadId.KERNEL32 ref: 00A2C143
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.265061610.0000000000A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a20000_ZzO0LX45zz.jbxd
                                            Similarity
                                            • API ID: Current$ProcessThread
                                            • String ID: jiJa
                                            • API String ID: 2063062207-49991317
                                            • Opcode ID: fc1901a827e054119717219e7ed817c91e9d80debbd833da83a272ce2047c8ca
                                            • Instruction ID: f8fc91696cec6f90326cd350fcf9bee3befeb10d52e450fc9fc157a529d8a8f6
                                            • Opcode Fuzzy Hash: fc1901a827e054119717219e7ed817c91e9d80debbd833da83a272ce2047c8ca
                                            • Instruction Fuzzy Hash: 575144B0D006498FDB14CFA9D548BEEBBF1EB88318F248469E509A7350C775A948CF65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 41 a29d10-a29d18 42 a29d23-a29d25 41->42 43 a29d1e call a279f4 41->43 44 a29d27 42->44 45 a29d3b-a29d3f 42->45 43->42 94 a29d2d call a29f88 44->94 95 a29d2d call a29f98 44->95 46 a29d53-a29d94 45->46 47 a29d41-a29d4b 45->47 52 a29da1-a29daf 46->52 53 a29d96-a29d9e 46->53 47->46 48 a29d33-a29d35 48->45 49 a29e70-a29f30 48->49 89 a29f32-a29f35 49->89 90 a29f38-a29f63 GetModuleHandleW 49->90 55 a29dd3-a29dd5 52->55 56 a29db1-a29db6 52->56 53->52 57 a29dd8-a29ddf 55->57 58 a29dc1 56->58 59 a29db8-a29dbf call a29038 56->59 61 a29de1-a29de9 57->61 62 a29dec-a29df3 57->62 60 a29dc3-a29dd1 58->60 59->60 60->57 61->62 65 a29e00-a29e09 call a29048 62->65 66 a29df5-a29dfd 62->66 71 a29e16-a29e1b 65->71 72 a29e0b-a29e13 65->72 66->65 74 a29e39-a29e3d 71->74 75 a29e1d-a29e24 71->75 72->71 96 a29e40 call a2a2a0 74->96 97 a29e40 call a2a270 74->97 75->74 76 a29e26-a29e36 call a29058 call a29068 75->76 76->74 78 a29e43-a29e46 81 a29e48-a29e66 78->81 82 a29e69-a29e6f 78->82 81->82 89->90 91 a29f65-a29f6b 90->91 92 a29f6c-a29f80 90->92 91->92 94->48 95->48 96->78 97->78
                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 00A29F56
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.265061610.0000000000A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a20000_ZzO0LX45zz.jbxd
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID: jiJa
                                            • API String ID: 4139908857-49991317
                                            • Opcode ID: e9c978d354a36b945c239fadeeb4596777bb184ded49f623e93da558fb659c8c
                                            • Instruction ID: c45d13729b477ed856aa6dec158229301718d7a2af9dae2a7e82628e457a28de
                                            • Opcode Fuzzy Hash: e9c978d354a36b945c239fadeeb4596777bb184ded49f623e93da558fb659c8c
                                            • Instruction Fuzzy Hash: BB714470A00B158FDB24CF2AE54079BBBF5BF88714F008A2DD44AD7A50D735E9058F91
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 98 a253cc-a25499 CreateActCtxA 100 a254a2-a254fc 98->100 101 a2549b-a254a1 98->101 108 a2550b-a2550f 100->108 109 a254fe-a25501 100->109 101->100 110 a25520 108->110 111 a25511-a2551d 108->111 109->108 113 a25521 110->113 111->110 113->113
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 00A25489
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.265061610.0000000000A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a20000_ZzO0LX45zz.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID: jiJa
                                            • API String ID: 2289755597-49991317
                                            • Opcode ID: 2e36515fe98bb42c6e5892f1ed97c3b661eb5115e620bc314e1797c808f21128
                                            • Instruction ID: fdcde993b787f25055b54a1a6a4a0a745bda92ff1c29d674b8bf1e7b6c8f054a
                                            • Opcode Fuzzy Hash: 2e36515fe98bb42c6e5892f1ed97c3b661eb5115e620bc314e1797c808f21128
                                            • Instruction Fuzzy Hash: 58410470C04718CEDB24CFA9D8847DEFBB1BF49314F24856AD458AB251D774594ACF90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 114 a23e58-a25499 CreateActCtxA 117 a254a2-a254fc 114->117 118 a2549b-a254a1 114->118 125 a2550b-a2550f 117->125 126 a254fe-a25501 117->126 118->117 127 a25520 125->127 128 a25511-a2551d 125->128 126->125 130 a25521 127->130 128->127 130->130
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 00A25489
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.265061610.0000000000A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a20000_ZzO0LX45zz.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID: jiJa
                                            • API String ID: 2289755597-49991317
                                            • Opcode ID: 7f8a03510b2dcbcdaa4cbf06bbd72cb546047c06928a3c8f3e086ec3e6ac36be
                                            • Instruction ID: 6a5be6067ca563ef6a8e8d24a3338f37a66703890d17a0ab43235f78fe5c7bff
                                            • Opcode Fuzzy Hash: 7f8a03510b2dcbcdaa4cbf06bbd72cb546047c06928a3c8f3e086ec3e6ac36be
                                            • Instruction Fuzzy Hash: 0F410270C04728CFDB24DFA9D884B9EFBB5BF48314F24846AD509AB251DB745949CF90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 131 a2c230-a2c2cc DuplicateHandle 132 a2c2d5-a2c2f2 131->132 133 a2c2ce-a2c2d4 131->133 133->132
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00A2C2BF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.265061610.0000000000A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a20000_ZzO0LX45zz.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID: jiJa
                                            • API String ID: 3793708945-49991317
                                            • Opcode ID: b615147ad7f46bdb9921883bc06b772daa059e727e071ee1888da9d517ca6b9a
                                            • Instruction ID: 8bde59d938cbaf017d5d9b88c7d003c217d6920ba71494df574445cd9b8520bd
                                            • Opcode Fuzzy Hash: b615147ad7f46bdb9921883bc06b772daa059e727e071ee1888da9d517ca6b9a
                                            • Instruction Fuzzy Hash: 4E2105B5900248DFCB10CFA9D484ADEBBF4FB58324F15841AE954A7350D374A944CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 136 a2c238-a2c2cc DuplicateHandle 137 a2c2d5-a2c2f2 136->137 138 a2c2ce-a2c2d4 136->138 138->137
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00A2C2BF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.265061610.0000000000A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a20000_ZzO0LX45zz.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID: jiJa
                                            • API String ID: 3793708945-49991317
                                            • Opcode ID: 3d668b7c8d4b581a21012fcb01448129059ce4302d63e0c28c09d80314bf18db
                                            • Instruction ID: 53b0a0fc8e431bfa4d5477ea31f792c8d0629dea859777f2f152caa06cd25774
                                            • Opcode Fuzzy Hash: 3d668b7c8d4b581a21012fcb01448129059ce4302d63e0c28c09d80314bf18db
                                            • Instruction Fuzzy Hash: 1421C4B59002589FDB10CFA9D884ADEBBF8EB58324F15841AE954A7350D374A944CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 141 a29090-a2a1b8 143 a2a1c0-a2a1ef LoadLibraryExW 141->143 144 a2a1ba-a2a1bd 141->144 145 a2a1f1-a2a1f7 143->145 146 a2a1f8-a2a215 143->146 144->143 145->146
                                            APIs
                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00A29FD1,00000800,00000000,00000000), ref: 00A2A1E2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.265061610.0000000000A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a20000_ZzO0LX45zz.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID: jiJa
                                            • API String ID: 1029625771-49991317
                                            • Opcode ID: 8b7841f6186a753c656f3861f201892d6f78c4fd887eead45554cdb43cd1117c
                                            • Instruction ID: 96e6fc300090b6edf3eeac137aef22dd31fc84f3841bcb0d2f4dd1f3f039ca75
                                            • Opcode Fuzzy Hash: 8b7841f6186a753c656f3861f201892d6f78c4fd887eead45554cdb43cd1117c
                                            • Instruction Fuzzy Hash: 2F1114B69003499FCB10CF9AD844BEEFBF8EB58324F14852EE515A7200C374A945CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 149 a2a171-a2a1b8 150 a2a1c0-a2a1ef LoadLibraryExW 149->150 151 a2a1ba-a2a1bd 149->151 152 a2a1f1-a2a1f7 150->152 153 a2a1f8-a2a215 150->153 151->150 152->153
                                            APIs
                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00A29FD1,00000800,00000000,00000000), ref: 00A2A1E2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.265061610.0000000000A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a20000_ZzO0LX45zz.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID: jiJa
                                            • API String ID: 1029625771-49991317
                                            • Opcode ID: a5973b89d824b7eae267648bf82d67c955542fb6995715f6bda657c30ed7dadc
                                            • Instruction ID: af3a9af67be6015339019b1daa8685ca7adbcbfcb4b3eac56a8fa40b23361262
                                            • Opcode Fuzzy Hash: a5973b89d824b7eae267648bf82d67c955542fb6995715f6bda657c30ed7dadc
                                            • Instruction Fuzzy Hash: 8E2114B68003498FCB10CFAAD444ADEFBF4EB98324F15852ED555A7250C375AA45CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 156 a29ef0-a29f30 157 a29f32-a29f35 156->157 158 a29f38-a29f63 GetModuleHandleW 156->158 157->158 159 a29f65-a29f6b 158->159 160 a29f6c-a29f80 158->160 159->160
                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 00A29F56
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.265061610.0000000000A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a20000_ZzO0LX45zz.jbxd
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID: jiJa
                                            • API String ID: 4139908857-49991317
                                            • Opcode ID: 66cebc3dc4bdd6317ac13010db814ff6a9c1d39c7ea96bff4fe1d07cb85b2f24
                                            • Instruction ID: 857456dfafe00282a0ec8db0f6d4eaacef394615985697e4401ce1cc452388f4
                                            • Opcode Fuzzy Hash: 66cebc3dc4bdd6317ac13010db814ff6a9c1d39c7ea96bff4fe1d07cb85b2f24
                                            • Instruction Fuzzy Hash: A911FDB58002498BCB10CF9AD544BDEBBF8AB88724F10842AD869A7200C378A545CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.264803894.00000000009CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009CD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9cd000_ZzO0LX45zz.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a3e4c219e01b529b316c1323964ad19a90715dbaef92264deab62a4e293e220d
                                            • Instruction ID: 04c365af5eb37efd590e51a5e23d32c750b4213c166ea0065644d00d4850037a
                                            • Opcode Fuzzy Hash: a3e4c219e01b529b316c1323964ad19a90715dbaef92264deab62a4e293e220d
                                            • Instruction Fuzzy Hash: 77212BB5904244DFDB04DF10D9C0F26BB69FB94324F24C57DDA054B296C33AE856C7A2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.264842934.00000000009DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009DD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9dd000_ZzO0LX45zz.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bc05cdb04ab6698c66ff60e517106ea955ca1d951ba987dbcb755e7eb9763171
                                            • Instruction ID: d96147883f48c8e121bcaf251e45e6a09ea27b6bec0de11fd9b8dbc0412f9ed7
                                            • Opcode Fuzzy Hash: bc05cdb04ab6698c66ff60e517106ea955ca1d951ba987dbcb755e7eb9763171
                                            • Instruction Fuzzy Hash: 8321F2B5548244DFDB14DF24D9C0B26BB69FBC8318F24C96AE9494B346C33AD847CA61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.264842934.00000000009DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009DD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9dd000_ZzO0LX45zz.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6547e0d3b1a30c621c90bd875ac97ae27e06d6e44a2c696f9243138f9701deeb
                                            • Instruction ID: 4f5a6733b82efce9b014b9495ae9d9f3465df5ec4cdb925e1611b90b8cc082bf
                                            • Opcode Fuzzy Hash: 6547e0d3b1a30c621c90bd875ac97ae27e06d6e44a2c696f9243138f9701deeb
                                            • Instruction Fuzzy Hash: B82129B5548244EFDB05DF50D9C0B26BB69FB84318F24C96EEA494B346C33AD846CB61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.264842934.00000000009DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009DD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9dd000_ZzO0LX45zz.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 212a2491b8290d554dd77145727c80a5d68df24aecd5944eba4e24a140072d9f
                                            • Instruction ID: d632fd87727677f2f796bcb2ceeea28f2dade0552c18e41946aea1028af32f15
                                            • Opcode Fuzzy Hash: 212a2491b8290d554dd77145727c80a5d68df24aecd5944eba4e24a140072d9f
                                            • Instruction Fuzzy Hash: 802180755493C08FCB12CF20D990715BF71EB86314F28C5DAD8498B657C33A980ACB62
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.264803894.00000000009CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009CD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9cd000_ZzO0LX45zz.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5a2e30cc68d7dd21b2a1a142c7ab3deebdcd8f6eb20e665a8f6e2b4a9e2b1ed0
                                            • Instruction ID: 682cd72aff4660e109e6e3c9feff7b5948162dcf1ae887436965b077d565027b
                                            • Opcode Fuzzy Hash: 5a2e30cc68d7dd21b2a1a142c7ab3deebdcd8f6eb20e665a8f6e2b4a9e2b1ed0
                                            • Instruction Fuzzy Hash: 0511B176804280DFDB15CF10D9C4B16BF71FB94324F24C6ADD9494B666C33AE85ACBA2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.264842934.00000000009DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009DD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9dd000_ZzO0LX45zz.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 68c9b6963931172e85e9e27774d35ddedbe4ace98a2482f56133bf4f9dca757b
                                            • Instruction ID: 776b7de6dc0935e058e815d62f7c8cb6b4883d80229a4ea3a6b2c9d55f698bfe
                                            • Opcode Fuzzy Hash: 68c9b6963931172e85e9e27774d35ddedbe4ace98a2482f56133bf4f9dca757b
                                            • Instruction Fuzzy Hash: 41118B75944280DFDB11CF10D5C4B15BBB1FB84324F28C6AED9494B756C33AD85ACB61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.264803894.00000000009CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009CD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9cd000_ZzO0LX45zz.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4f24d0d6b3fd8cf0860514ea5bfed3aef0a77ab9568698e1bd472de4775d65de
                                            • Instruction ID: dee2b144bb89341b0b3ee0917eb0190821aa25033e583235b78b0ea33cff27e9
                                            • Opcode Fuzzy Hash: 4f24d0d6b3fd8cf0860514ea5bfed3aef0a77ab9568698e1bd472de4775d65de
                                            • Instruction Fuzzy Hash: 5101F7B18093849AE7104A15CD84F66BB9CDF51768F18892EEE085B286D3799844C6B2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.264803894.00000000009CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009CD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9cd000_ZzO0LX45zz.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 76e421e4d531a0176fa16bac0448bd03234296b9b6a6001ae64d8b65f0d93a35
                                            • Instruction ID: 1699bda41f8def0b21d1a8f6e30a604d440b7b9a48f629f76b2413ca6dfcb8fb
                                            • Opcode Fuzzy Hash: 76e421e4d531a0176fa16bac0448bd03234296b9b6a6001ae64d8b65f0d93a35
                                            • Instruction Fuzzy Hash: C0F062B1409384AAEB108E16CCC4B62FB9CEB91734F18C45EED085B286C3799C44CAB1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.265061610.0000000000A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a20000_ZzO0LX45zz.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2b2b436320e33348ab0c69983f2acb91ac94cd5ea29f8615a1f30d6354e1ac44
                                            • Instruction ID: 47c083175ba184d937c35b80dbde56ffa786819fa2ca8ea8321ab5d18d470784
                                            • Opcode Fuzzy Hash: 2b2b436320e33348ab0c69983f2acb91ac94cd5ea29f8615a1f30d6354e1ac44
                                            • Instruction Fuzzy Hash: 811292BDC11F468BD310CFB5ED8C1893BA1B7C63A8B904728D2615AAE2D7B6154BCF44
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.265061610.0000000000A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a20000_ZzO0LX45zz.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 00b8ee87bdf453bf487fd0eab1464e3e4cddd1714b42293ec51455c7a8f33ea4
                                            • Instruction ID: 5c8c360f49698b548ea5a2cf912d55a2ffa290f89583effbeb31fb3d0260fcdd
                                            • Opcode Fuzzy Hash: 00b8ee87bdf453bf487fd0eab1464e3e4cddd1714b42293ec51455c7a8f33ea4
                                            • Instruction Fuzzy Hash: C7A18F36E006298FCF05DFB9D9445DDB7B2FF85300B25857AE805AB221EB31E955CB80
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.265061610.0000000000A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_a20000_ZzO0LX45zz.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 619c094217d8a4278c0399a57c1eabe9e42126251803000bac953d2bbb6c1149
                                            • Instruction ID: 8adb494115ccffa5a9c81bbd137fff179d203cfb3343c92cae5f150e5da243c5
                                            • Opcode Fuzzy Hash: 619c094217d8a4278c0399a57c1eabe9e42126251803000bac953d2bbb6c1149
                                            • Instruction Fuzzy Hash: 33C105BDC11B468BD710CFB5EC881893BA1BBC6368F504729D2616B6E2D7B6144BCF84
                                            Uniqueness

                                            Uniqueness Score: -1.00%