Loading ...

Play interactive tourEdit tour

Windows Analysis Report IMAGE_0004.bat

Overview

General Information

Sample Name:IMAGE_0004.bat (renamed file extension from bat to exe)
Analysis ID:502635
MD5:3722d60a637a0c27261a839a04d7d4d2
SHA1:3933f5a2ea8b486ff8247e30d228e00d17f39e3f
SHA256:add10727ec98dd291126c26b084300c9c050722305e19ba54e8bd564897da586
Tags:AgentTeslabatexe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected AgentTesla
Initial sample is a PE file and has a suspicious name
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
Hides that the sample has been downloaded from the Internet (zone.identifier)
Moves itself to temp directory
Tries to steal Mail credentials (via file access)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Uses schtasks.exe or at.exe to add and modify task schedules
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Creates a window with clipboard capturing capabilities
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64
  • IMAGE_0004.exe (PID: 7060 cmdline: 'C:\Users\user\Desktop\IMAGE_0004.exe' MD5: 3722D60A637A0C27261A839A04D7D4D2)
    • schtasks.exe (PID: 6396 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\guqslNCu' /XML 'C:\Users\user\AppData\Local\Temp\tmp4781.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6384 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • IMAGE_0004.exe (PID: 4228 cmdline: {path} MD5: 3722D60A637A0C27261A839A04D7D4D2)
  • jNnIJrO.exe (PID: 6288 cmdline: 'C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exe' MD5: 3722D60A637A0C27261A839A04D7D4D2)
    • schtasks.exe (PID: 4876 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\guqslNCu' /XML 'C:\Users\user\AppData\Local\Temp\tmp42C9.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6244 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • jNnIJrO.exe (PID: 1440 cmdline: {path} MD5: 3722D60A637A0C27261A839A04D7D4D2)
  • jNnIJrO.exe (PID: 6612 cmdline: 'C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exe' MD5: 3722D60A637A0C27261A839A04D7D4D2)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "Username": "shyam@msjfurniturewll.com", "Password": "abc@1234!5", "Host": "mail.msjfurniturewll.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000007.00000002.924499413.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000007.00000002.924499413.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000015.00000002.926831136.0000000002CC1000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000015.00000002.926831136.0000000002CC1000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000015.00000002.924479714.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 7 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            21.2.jNnIJrO.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              21.2.jNnIJrO.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                7.2.IMAGE_0004.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  7.2.IMAGE_0004.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security

                    Sigma Overview

                    No Sigma rule has matched

                    Jbx Signature Overview

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection:

                    barindex
                    Found malware configurationShow sources
                    Source: 21.2.jNnIJrO.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "shyam@msjfurniturewll.com", "Password": "abc@1234!5", "Host": "mail.msjfurniturewll.com"}
                    Source: 21.2.jNnIJrO.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: 7.2.IMAGE_0004.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: IMAGE_0004.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: IMAGE_0004.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Source: IMAGE_0004.exe, 00000007.00000002.926571605.0000000003011000.00000004.00000001.sdmp, jNnIJrO.exe, 00000015.00000002.926831136.0000000002CC1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                    Source: jNnIJrO.exe, 00000015.00000002.926831136.0000000002CC1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                    Source: jNnIJrO.exe, 00000015.00000002.926831136.0000000002CC1000.00000004.00000001.sdmpString found in binary or memory: http://MuKFQF.com
                    Source: IMAGE_0004.exe, 00000007.00000002.926571605.0000000003011000.00000004.00000001.sdmpString found in binary or memory: http://Ta32N99jPM5hmB3Q0v.com
                    Source: IMAGE_0004.exe, 00000007.00000003.915498999.00000000011C4000.00000004.00000001.sdmpString found in binary or memory: http://Ta32N99jPM5hmB3Q0v.com1-5-21-3853321935-2125563209-4053062332-1002_Classes
                    Source: IMAGE_0004.exe, 00000007.00000002.928079977.000000000337B000.00000004.00000001.sdmpString found in binary or memory: http://mail.msjfurniturewll.com
                    Source: IMAGE_0004.exe, 00000007.00000002.928079977.000000000337B000.00000004.00000001.sdmpString found in binary or memory: http://msjfurniturewll.com
                    Source: IMAGE_0004.exe, 00000007.00000002.926571605.0000000003011000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%
                    Source: jNnIJrO.exe, 00000015.00000002.926831136.0000000002CC1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                    Source: IMAGE_0004.exe, 00000007.00000002.924499413.0000000000402000.00000040.00000001.sdmp, jNnIJrO.exe, 00000015.00000002.924479714.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                    Source: IMAGE_0004.exe, 00000007.00000002.926571605.0000000003011000.00000004.00000001.sdmp, jNnIJrO.exe, 00000015.00000002.926831136.0000000002CC1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                    Source: unknownDNS traffic detected: queries for: mail.msjfurniturewll.com
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeWindow created: window name: CLIPBRDWNDCLASS

                    System Summary:

                    barindex
                    Initial sample is a PE file and has a suspicious nameShow sources
                    Source: initial sampleStatic PE information: Filename: IMAGE_0004.exe
                    .NET source code contains very large array initializationsShow sources
                    Source: 21.2.jNnIJrO.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bB0E0C035u002dC53Du002d4DB1u002dA47Cu002dAEC67729B443u007d/C228C764u002dBDD0u002d47DEu002dB2A4u002d8F104530BEE4.csLarge array initialization: .cctor: array initializer size 11959
                    Source: IMAGE_0004.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_2_00C82050
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_2_01496120
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_2_0149ED88
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_2_01492DA0
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_2_01492490
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_2_0149BE20
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeCode function: 21_2_007D2050
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeCode function: 21_2_012346A0
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeCode function: 21_2_01234672
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeCode function: 21_2_01234690
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeCode function: 21_2_0123D300
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeCode function: 21_2_007D4CE4
                    Source: IMAGE_0004.exe, 00000000.00000000.657245795.0000000001098000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameLqaa.exe> vs IMAGE_0004.exe
                    Source: IMAGE_0004.exe, 00000007.00000002.924897767.0000000000D38000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameLqaa.exe> vs IMAGE_0004.exe
                    Source: IMAGE_0004.exe, 00000007.00000002.924499413.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameJpYQZpZGRmbGzdwlkADyMMjo.exe4 vs IMAGE_0004.exe
                    Source: IMAGE_0004.exe, 00000007.00000002.925867539.000000000139A000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs IMAGE_0004.exe
                    Source: IMAGE_0004.exeBinary or memory string: OriginalFilenameLqaa.exe> vs IMAGE_0004.exe
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeFile read: C:\Users\user\Desktop\IMAGE_0004.exeJump to behavior
                    Source: IMAGE_0004.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                    Source: unknownProcess created: C:\Users\user\Desktop\IMAGE_0004.exe 'C:\Users\user\Desktop\IMAGE_0004.exe'
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\guqslNCu' /XML 'C:\Users\user\AppData\Local\Temp\tmp4781.tmp'
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess created: C:\Users\user\Desktop\IMAGE_0004.exe {path}
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exe 'C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exe'
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exe 'C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exe'
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\guqslNCu' /XML 'C:\Users\user\AppData\Local\Temp\tmp42C9.tmp'
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess created: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exe {path}
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\guqslNCu' /XML 'C:\Users\user\AppData\Local\Temp\tmp4781.tmp'
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess created: C:\Users\user\Desktop\IMAGE_0004.exe {path}
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\guqslNCu' /XML 'C:\Users\user\AppData\Local\Temp\tmp42C9.tmp'
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess created: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exe {path}
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeFile created: C:\Users\user\AppData\Roaming\guqslNCu.exeJump to behavior
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeFile created: C:\Users\user\AppData\Local\Temp\tmp4781.tmpJump to behavior
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@13/6@2/0
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: IMAGE_0004.exe, 00000000.00000000.657135369.0000000000FE2000.00000002.00020000.sdmp, IMAGE_0004.exe, 00000007.00000002.924695261.0000000000C82000.00000002.00020000.sdmp, jNnIJrO.exe, 0000000E.00000000.779159610.0000000000482000.00000002.00020000.sdmp, jNnIJrO.exe, 00000010.00000000.796353165.0000000000362000.00000002.00020000.sdmp, jNnIJrO.exe, 00000015.00000000.847950677.00000000007D2000.00000002.00020000.sdmpBinary or memory string: INSERT INTO RolPermiso(RolPermiso_rol, RolPermiso_permiso) VALUES (;Error - Nuevo - RolPermisoDAL
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeMutant created: \Sessions\1\BaseNamedObjects\AtgSlQoHX
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6384:120:WilError_01
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6244:120:WilError_01
                    Source: 21.2.jNnIJrO.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 21.2.jNnIJrO.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                    Source: IMAGE_0004.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: IMAGE_0004.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_0142B941 push edx; retf
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_0142B941 push edx; retf
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_0142B577 push edx; retf
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_0142B577 push edx; retf
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_0142B53B push ss; retf
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_0142B53B push ss; retf
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_01425B91 push edx; retf
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_014251A8 push edx; retf
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_0141FE45 push edx; retf
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_01425251 push edx; retf
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_0142B473 push edx; retf
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_0142B473 push edx; retf
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_0142B6E2 push ss; retf
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_0142B6E2 push ss; retf
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_0142B89E push edx; retf
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_0142B89E push edx; retf
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_0142B941 push edx; retf
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_0142B941 push edx; retf
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_0142B577 push edx; retf
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_0142B577 push edx; retf
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_0142B53B push ss; retf
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_0142B53B push ss; retf
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_01425B91 push edx; retf
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_014251A8 push edx; retf
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_0141FE45 push edx; retf
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_01425251 push edx; retf
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_0142B473 push edx; retf
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_0142B473 push edx; retf
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_0142B6E2 push ss; retf
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_0142B6E2 push ss; retf
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_3_0142B89E push edx; retf
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.09187025737
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.09187025737
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.09187025737
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeFile created: C:\Users\user\AppData\Roaming\guqslNCu.exeJump to dropped file
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeFile created: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeJump to dropped file

                    Boot Survival:

                    barindex
                    Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\guqslNCu' /XML 'C:\Users\user\AppData\Local\Temp\tmp4781.tmp'
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run jNnIJrOJump to behavior
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run jNnIJrOJump to behavior

                    Hooking and other Techniques for Hiding and Protection:

                    barindex
                    Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeFile opened: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exe:Zone.Identifier read attributes | delete
                    Moves itself to temp directoryShow sources
                    Source: c:\users\user\desktop\image_0004.exeFile moved: C:\Users\user\AppData\Local\Temp\tmpG520.tmpJump to behavior
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion:

                    barindex
                    Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\IMAGE_0004.exe TID: 7084Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\Desktop\IMAGE_0004.exe TID: 5388Thread sleep time: -11990383647911201s >= -30000s
                    Source: C:\Users\user\Desktop\IMAGE_0004.exe TID: 5928Thread sleep count: 425 > 30
                    Source: C:\Users\user\Desktop\IMAGE_0004.exe TID: 5928Thread sleep count: 9436 > 30
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exe TID: 6308Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exe TID: 7156Thread sleep time: -23058430092136925s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exe TID: 7160Thread sleep count: 1139 > 30
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exe TID: 7160Thread sleep count: 8702 > 30
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeWindow / User API: threadDelayed 425
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeWindow / User API: threadDelayed 9436
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeWindow / User API: threadDelayed 1139
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeWindow / User API: threadDelayed 8702
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess information queried: ProcessInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeThread delayed: delay time: 922337203685477
                    Source: IMAGE_0004.exe, 00000007.00000002.925936758.0000000001405000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllj"HH
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess token adjusted: Debug
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess token adjusted: Debug
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess token adjusted: Debug
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess token adjusted: Debug
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeCode function: 7_2_0149B1A8 LdrInitializeThunk,
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeMemory allocated: page read and write | page guard

                    HIPS / PFW / Operating System Protection Evasion:

                    barindex
                    Injects a PE file into a foreign processesShow sources
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeMemory written: C:\Users\user\Desktop\IMAGE_0004.exe base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeMemory written: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exe base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\guqslNCu' /XML 'C:\Users\user\AppData\Local\Temp\tmp4781.tmp'
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeProcess created: C:\Users\user\Desktop\IMAGE_0004.exe {path}
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\guqslNCu' /XML 'C:\Users\user\AppData\Local\Temp\tmp42C9.tmp'
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeProcess created: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exe {path}
                    Source: IMAGE_0004.exe, 00000007.00000002.926292444.0000000001A40000.00000002.00020000.sdmp, jNnIJrO.exe, 00000015.00000002.926385408.0000000001610000.00000002.00020000.sdmpBinary or memory string: Program Manager
                    Source: IMAGE_0004.exe, 00000007.00000002.926292444.0000000001A40000.00000002.00020000.sdmp, jNnIJrO.exe, 00000015.00000002.926385408.0000000001610000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                    Source: IMAGE_0004.exe, 00000007.00000002.926292444.0000000001A40000.00000002.00020000.sdmp, jNnIJrO.exe, 00000015.00000002.926385408.0000000001610000.00000002.00020000.sdmpBinary or memory string: Progman
                    Source: IMAGE_0004.exe, 00000007.00000002.926292444.0000000001A40000.00000002.00020000.sdmp, jNnIJrO.exe, 00000015.00000002.926385408.0000000001610000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Users\user\Desktop\IMAGE_0004.exe VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Users\user\Desktop\IMAGE_0004.exe VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeQueries volume information: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeQueries volume information: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeQueries volume information: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                    Stealing of Sensitive Information:

                    barindex
                    Yara detected AgentTeslaShow sources
                    Source: Yara matchFile source: 21.2.jNnIJrO.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.IMAGE_0004.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000007.00000002.924499413.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000002.924479714.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000002.926831136.0000000002CC1000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.926571605.0000000003011000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: IMAGE_0004.exe PID: 4228, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: jNnIJrO.exe PID: 1440, type: MEMORYSTR
                    Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                    Tries to harvest and steal ftp login credentialsShow sources
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                    Tries to steal Mail credentials (via file access)Show sources
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                    Tries to harvest and steal browser information (history, passwords, etc)Show sources
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Source: C:\Users\user\Desktop\IMAGE_0004.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                    Source: Yara matchFile source: 00000015.00000002.926831136.0000000002CC1000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.926571605.0000000003011000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: IMAGE_0004.exe PID: 4228, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: jNnIJrO.exe PID: 1440, type: MEMORYSTR

                    Remote Access Functionality:

                    barindex
                    Yara detected AgentTeslaShow sources
                    Source: Yara matchFile source: 21.2.jNnIJrO.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.IMAGE_0004.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000007.00000002.924499413.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000002.924479714.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000002.926831136.0000000002CC1000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.926571605.0000000003011000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: IMAGE_0004.exe PID: 4228, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: jNnIJrO.exe PID: 1440, type: MEMORYSTR

                    Mitre Att&ck Matrix

                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid AccountsWindows Management Instrumentation211Scheduled Task/Job1Process Injection112Disable or Modify Tools1OS Credential Dumping2File and Directory Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default AccountsScheduled Task/Job1Registry Run Keys / Startup Folder1Scheduled Task/Job1Deobfuscate/Decode Files or Information1Credentials in Registry1System Information Discovery114Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)Registry Run Keys / Startup Folder1Obfuscated Files or Information2Security Account ManagerQuery Registry1SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationApplication Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing2NTDSSecurity Software Discovery111Distributed Component Object ModelClipboard Data1Scheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading11LSA SecretsProcess Discovery2SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion131Cached Domain CredentialsVirtualization/Sandbox Evasion131VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection112DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobHidden Files and Directories1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                    Behavior Graph

                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 502635 Sample: IMAGE_0004.bat Startdate: 14/10/2021 Architecture: WINDOWS Score: 100 38 msjfurniturewll.com 2->38 40 mail.msjfurniturewll.com 2->40 50 Found malware configuration 2->50 52 Yara detected AgentTesla 2->52 54 .NET source code contains very large array initializations 2->54 56 Initial sample is a PE file and has a suspicious name 2->56 8 IMAGE_0004.exe 6 2->8         started        12 jNnIJrO.exe 5 2->12         started        14 jNnIJrO.exe 2 2->14         started        signatures3 process4 file5 34 C:\Users\user\AppData\Local\...\tmp4781.tmp, XML 8->34 dropped 36 C:\Users\user\AppData\Roaming\guqslNCu.exe, PE32 8->36 dropped 58 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 8->58 60 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 8->60 62 Uses schtasks.exe or at.exe to add and modify task schedules 8->62 16 IMAGE_0004.exe 2 5 8->16         started        20 schtasks.exe 1 8->20         started        64 Injects a PE file into a foreign processes 12->64 22 schtasks.exe 1 12->22         started        24 jNnIJrO.exe 2 12->24         started        signatures6 process7 file8 30 C:\Users\user\AppData\Roaming\...\jNnIJrO.exe, PE32 16->30 dropped 32 C:\Users\user\...\jNnIJrO.exe:Zone.Identifier, ASCII 16->32 dropped 42 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 16->42 44 Moves itself to temp directory 16->44 46 Tries to steal Mail credentials (via file access) 16->46 48 3 other signatures 16->48 26 conhost.exe 20->26         started        28 conhost.exe 22->28         started        signatures9 process10

                    Screenshots

                    Thumbnails

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                    windows-stand

                    Antivirus, Machine Learning and Genetic Malware Detection

                    Initial Sample

                    No Antivirus matches

                    Dropped Files

                    No Antivirus matches

                    Unpacked PE Files

                    SourceDetectionScannerLabelLinkDownload
                    21.2.jNnIJrO.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    7.2.IMAGE_0004.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                    Domains

                    SourceDetectionScannerLabelLink
                    msjfurniturewll.com0%VirustotalBrowse

                    URLs

                    SourceDetectionScannerLabelLink
                    http://MuKFQF.com0%Avira URL Cloudsafe
                    http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                    https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    http://Ta32N99jPM5hmB3Q0v.com1-5-21-3853321935-2125563209-4053062332-1002_Classes0%Avira URL Cloudsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                    https://api.ipify.org%0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                    http://Ta32N99jPM5hmB3Q0v.com0%Avira URL Cloudsafe
                    http://mail.msjfurniturewll.com0%Avira URL Cloudsafe
                    http://msjfurniturewll.com0%Avira URL Cloudsafe

                    Domains and IPs

                    Contacted Domains

                    NameIPActiveMaliciousAntivirus DetectionReputation
                    msjfurniturewll.com
                    131.153.37.2
                    truetrueunknown
                    mail.msjfurniturewll.com
                    unknown
                    unknowntrue
                      unknown

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      http://MuKFQF.comjNnIJrO.exe, 00000015.00000002.926831136.0000000002CC1000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://127.0.0.1:HTTP/1.1IMAGE_0004.exe, 00000007.00000002.926571605.0000000003011000.00000004.00000001.sdmp, jNnIJrO.exe, 00000015.00000002.926831136.0000000002CC1000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      https://api.ipify.org%GETMozilla/5.0jNnIJrO.exe, 00000015.00000002.926831136.0000000002CC1000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      low
                      http://DynDns.comDynDNSjNnIJrO.exe, 00000015.00000002.926831136.0000000002CC1000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://Ta32N99jPM5hmB3Q0v.com1-5-21-3853321935-2125563209-4053062332-1002_ClassesIMAGE_0004.exe, 00000007.00000003.915498999.00000000011C4000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haIMAGE_0004.exe, 00000007.00000002.926571605.0000000003011000.00000004.00000001.sdmp, jNnIJrO.exe, 00000015.00000002.926831136.0000000002CC1000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://api.ipify.org%IMAGE_0004.exe, 00000007.00000002.926571605.0000000003011000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      low
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipIMAGE_0004.exe, 00000007.00000002.924499413.0000000000402000.00000040.00000001.sdmp, jNnIJrO.exe, 00000015.00000002.924479714.0000000000402000.00000040.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://Ta32N99jPM5hmB3Q0v.comIMAGE_0004.exe, 00000007.00000002.926571605.0000000003011000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://mail.msjfurniturewll.comIMAGE_0004.exe, 00000007.00000002.928079977.000000000337B000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://msjfurniturewll.comIMAGE_0004.exe, 00000007.00000002.928079977.000000000337B000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown

                      Contacted IPs

                      No contacted IP infos

                      General Information

                      Joe Sandbox Version:33.0.0 White Diamond
                      Analysis ID:502635
                      Start date:14.10.2021
                      Start time:07:47:10
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 10m 7s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Sample file name:IMAGE_0004.bat (renamed file extension from bat to exe)
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:23
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@13/6@2/0
                      EGA Information:Failed
                      HDC Information:
                      • Successful, ratio: 0% (good quality ratio 0%)
                      • Quality average: 41.5%
                      • Quality standard deviation: 41.5%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Adjust boot time
                      • Enable AMSI
                      Warnings:
                      Show All
                      • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                      • Excluded IPs from analysis (whitelisted): 95.100.218.79, 20.50.102.62, 93.184.221.240, 20.54.110.249, 40.112.88.60, 2.20.178.24, 2.20.178.33, 20.82.209.183
                      • Excluded domains from analysis (whitelisted): iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu.ec.azureedge.net, wu-shim.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, store-images.s-microsoft.com-c.edgekey.net, ctldl.windowsupdate.com, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, a1449.dscg2.akamai.net, arc.msn.com, wu.azureedge.net, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.

                      Simulations

                      Behavior and APIs

                      TimeTypeDescription
                      07:48:26API Interceptor628x Sleep call for process: IMAGE_0004.exe modified
                      07:48:53AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run jNnIJrO C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exe
                      07:49:01AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run jNnIJrO C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exe
                      07:49:30API Interceptor209x Sleep call for process: jNnIJrO.exe modified

                      Joe Sandbox View / Context

                      IPs

                      No context

                      Domains

                      No context

                      ASN

                      No context

                      JA3 Fingerprints

                      No context

                      Dropped Files

                      No context

                      Created / dropped Files

                      C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\IMAGE_0004.exe.log
                      Process:C:\Users\user\Desktop\IMAGE_0004.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1216
                      Entropy (8bit):5.355304211458859
                      Encrypted:false
                      SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                      MD5:69206D3AF7D6EFD08F4B4726998856D3
                      SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                      SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                      SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                      Malicious:false
                      Reputation:high, very likely benign file
                      Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                      C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\jNnIJrO.exe.log
                      Process:C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1216
                      Entropy (8bit):5.355304211458859
                      Encrypted:false
                      SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                      MD5:69206D3AF7D6EFD08F4B4726998856D3
                      SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                      SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                      SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                      Malicious:false
                      Reputation:high, very likely benign file
                      Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                      C:\Users\user\AppData\Local\Temp\tmp4781.tmp
                      Process:C:\Users\user\Desktop\IMAGE_0004.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1641
                      Entropy (8bit):5.177927703928814
                      Encrypted:false
                      SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGmtn:cbhK79lNQR/rydbz9I3YODOLNdq3L
                      MD5:F757E9E5D382BCB0931D6607B41D0E5E
                      SHA1:00188D116577CAD27A2CAE245D6CD29FA1AB0C32
                      SHA-256:492B7A6D99BE7C0B2C96A5D1665325FE87754CA65F11DC7B5C5274EF6B32A646
                      SHA-512:C982E87B25C50DC2E111A9B3E4D14A7B4AF8630D096A78BE9C3F7725F8F4ED25B4ECD035192B7AF801214953C3B987F1E6812839F7453E65C60EC159DBD67E74
                      Malicious:true
                      Reputation:low
                      Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                      C:\Users\user\AppData\Roaming\guqslNCu.exe
                      Process:C:\Users\user\Desktop\IMAGE_0004.exe
                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Category:dropped
                      Size (bytes):740352
                      Entropy (8bit):7.086971324796304
                      Encrypted:false
                      SSDEEP:12288:i7o5hlBgs5/TyoT+zeyjwhMSnyJsVrXU:iAngs5/eoSzLSFhU
                      MD5:3722D60A637A0C27261A839A04D7D4D2
                      SHA1:3933F5A2EA8B486FF8247E30D228E00D17F39E3F
                      SHA-256:ADD10727EC98DD291126C26B084300C9C050722305E19BA54E8BD564897DA586
                      SHA-512:4CDE1C086286D701F29C3AC0362A7E8CA15738044BDD6628D46EAABE6A285732774EC4EFB0BFB6F2C5958384186CCD69516458F9BF9CEE66DC156E5EC6D99CC4
                      Malicious:false
                      Reputation:low
                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....dfa..............P..B..........fa... ........@.. ....................................@..................................a..O.................................................................................... ............... ..H............text...lA... ...B.................. ..`.rsrc................D..............@..@.reloc...............J..............@..B................Ha......H.......X...d............o..X.............................................(....*&..(.....*.s ........s!........s"........s#........s$........*...0...........~....o%....+..*.0...........~....o&....+..*.0...........~....o'....+..*.0...........~....o(....+..*.0...........~....o)....+..*&..(*....*...0..<........~.....(+.....,!r...p.....(,...o-...s.............~.....+..*.0...........~.....+..*".......*.0...........(....r...p~....o/....+..*...0..<........~.....(+.....,!r'..p.....(,
                      C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exe
                      Process:C:\Users\user\Desktop\IMAGE_0004.exe
                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Category:dropped
                      Size (bytes):740352
                      Entropy (8bit):7.086971324796304
                      Encrypted:false
                      SSDEEP:12288:i7o5hlBgs5/TyoT+zeyjwhMSnyJsVrXU:iAngs5/eoSzLSFhU
                      MD5:3722D60A637A0C27261A839A04D7D4D2
                      SHA1:3933F5A2EA8B486FF8247E30D228E00D17F39E3F
                      SHA-256:ADD10727EC98DD291126C26B084300C9C050722305E19BA54E8BD564897DA586
                      SHA-512:4CDE1C086286D701F29C3AC0362A7E8CA15738044BDD6628D46EAABE6A285732774EC4EFB0BFB6F2C5958384186CCD69516458F9BF9CEE66DC156E5EC6D99CC4
                      Malicious:true
                      Reputation:low
                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....dfa..............P..B..........fa... ........@.. ....................................@..................................a..O.................................................................................... ............... ..H............text...lA... ...B.................. ..`.rsrc................D..............@..@.reloc...............J..............@..B................Ha......H.......X...d............o..X.............................................(....*&..(.....*.s ........s!........s"........s#........s$........*...0...........~....o%....+..*.0...........~....o&....+..*.0...........~....o'....+..*.0...........~....o(....+..*.0...........~....o)....+..*&..(*....*...0..<........~.....(+.....,!r...p.....(,...o-...s.............~.....+..*.0...........~.....+..*".......*.0...........(....r...p~....o/....+..*...0..<........~.....(+.....,!r'..p.....(,
                      C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exe:Zone.Identifier
                      Process:C:\Users\user\Desktop\IMAGE_0004.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:modified
                      Size (bytes):26
                      Entropy (8bit):3.95006375643621
                      Encrypted:false
                      SSDEEP:3:ggPYV:rPYV
                      MD5:187F488E27DB4AF347237FE461A079AD
                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                      Malicious:true
                      Preview: [ZoneTransfer]....ZoneId=0

                      Static File Info

                      General

                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Entropy (8bit):7.086971324796304
                      TrID:
                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      • Win32 Executable (generic) a (10002005/4) 49.78%
                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                      • Generic Win/DOS Executable (2004/3) 0.01%
                      • DOS Executable Generic (2002/1) 0.01%
                      File name:IMAGE_0004.exe
                      File size:740352
                      MD5:3722d60a637a0c27261a839a04d7d4d2
                      SHA1:3933f5a2ea8b486ff8247e30d228e00d17f39e3f
                      SHA256:add10727ec98dd291126c26b084300c9c050722305e19ba54e8bd564897da586
                      SHA512:4cde1c086286d701f29c3ac0362a7e8ca15738044bdd6628d46eaabe6a285732774ec4efb0bfb6f2c5958384186ccd69516458f9bf9cee66dc156e5ec6d99cc4
                      SSDEEP:12288:i7o5hlBgs5/TyoT+zeyjwhMSnyJsVrXU:iAngs5/eoSzLSFhU
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....dfa..............P..B..........fa... ........@.. ....................................@................................

                      File Icon

                      Icon Hash:00828e8e8686b000

                      Static PE Info

                      General

                      Entrypoint:0x4b6166
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Time Stamp:0x61666406 [Wed Oct 13 04:43:50 2021 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:v4.0.30319
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                      Entrypoint Preview

                      Instruction
                      jmp dword ptr [00402000h]
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al

                      Data Directories

                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0xb61140x4f.text
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xb80000x5b4.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xba0000xc.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                      Sections

                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x20000xb416c0xb4200False0.630673685808data7.09187025737IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      .rsrc0xb80000x5b40x600False0.421223958333data4.08912543399IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0xba0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                      Resources

                      NameRVASizeTypeLanguageCountry
                      RT_VERSION0xb80900x324data
                      RT_MANIFEST0xb83c40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                      Imports

                      DLLImport
                      mscoree.dll_CorExeMain

                      Version Infos

                      DescriptionData
                      Translation0x0000 0x04b0
                      LegalCopyrightCopyright 2017
                      Assembly Version1.0.0.0
                      InternalNameLqaa.exe
                      FileVersion1.0.0.0
                      CompanyName
                      LegalTrademarks
                      Comments
                      ProductNameBallistic Game
                      ProductVersion1.0.0.0
                      FileDescriptionBallistic Game
                      OriginalFilenameLqaa.exe

                      Network Behavior

                      Network Port Distribution

                      UDP Packets

                      TimestampSource PortDest PortSource IPDest IP
                      Oct 14, 2021 07:50:10.281056881 CEST5504653192.168.2.48.8.8.8
                      Oct 14, 2021 07:50:10.533468962 CEST53550468.8.8.8192.168.2.4
                      Oct 14, 2021 07:50:10.545304060 CEST4961253192.168.2.48.8.8.8
                      Oct 14, 2021 07:50:10.917526960 CEST53496128.8.8.8192.168.2.4

                      DNS Queries

                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                      Oct 14, 2021 07:50:10.281056881 CEST192.168.2.48.8.8.80xa14cStandard query (0)mail.msjfurniturewll.comA (IP address)IN (0x0001)
                      Oct 14, 2021 07:50:10.545304060 CEST192.168.2.48.8.8.80x3da5Standard query (0)mail.msjfurniturewll.comA (IP address)IN (0x0001)

                      DNS Answers

                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                      Oct 14, 2021 07:50:10.533468962 CEST8.8.8.8192.168.2.40xa14cNo error (0)mail.msjfurniturewll.commsjfurniturewll.comCNAME (Canonical name)IN (0x0001)
                      Oct 14, 2021 07:50:10.533468962 CEST8.8.8.8192.168.2.40xa14cNo error (0)msjfurniturewll.com131.153.37.2A (IP address)IN (0x0001)
                      Oct 14, 2021 07:50:10.917526960 CEST8.8.8.8192.168.2.40x3da5No error (0)mail.msjfurniturewll.commsjfurniturewll.comCNAME (Canonical name)IN (0x0001)
                      Oct 14, 2021 07:50:10.917526960 CEST8.8.8.8192.168.2.40x3da5No error (0)msjfurniturewll.com131.153.37.2A (IP address)IN (0x0001)

                      Code Manipulations

                      Statistics

                      Behavior

                      Click to jump to process

                      System Behavior

                      General

                      Start time:07:48:04
                      Start date:14/10/2021
                      Path:C:\Users\user\Desktop\IMAGE_0004.exe
                      Wow64 process (32bit):true
                      Commandline:'C:\Users\user\Desktop\IMAGE_0004.exe'
                      Imagebase:0xfe0000
                      File size:740352 bytes
                      MD5 hash:3722D60A637A0C27261A839A04D7D4D2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:.Net C# or VB.NET
                      Reputation:low

                      General

                      Start time:07:48:27
                      Start date:14/10/2021
                      Path:C:\Windows\SysWOW64\schtasks.exe
                      Wow64 process (32bit):true
                      Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\guqslNCu' /XML 'C:\Users\user\AppData\Local\Temp\tmp4781.tmp'
                      Imagebase:0x380000
                      File size:185856 bytes
                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      General

                      Start time:07:48:28
                      Start date:14/10/2021
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff724c50000
                      File size:625664 bytes
                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      General

                      Start time:07:48:28
                      Start date:14/10/2021
                      Path:C:\Users\user\Desktop\IMAGE_0004.exe
                      Wow64 process (32bit):true
                      Commandline:{path}
                      Imagebase:0xc80000
                      File size:740352 bytes
                      MD5 hash:3722D60A637A0C27261A839A04D7D4D2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:.Net C# or VB.NET
                      Yara matches:
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.924499413.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000007.00000002.924499413.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.926571605.0000000003011000.00000004.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.926571605.0000000003011000.00000004.00000001.sdmp, Author: Joe Security
                      Reputation:low

                      General

                      Start time:07:49:01
                      Start date:14/10/2021
                      Path:C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exe
                      Wow64 process (32bit):true
                      Commandline:'C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exe'
                      Imagebase:0x480000
                      File size:740352 bytes
                      MD5 hash:3722D60A637A0C27261A839A04D7D4D2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:.Net C# or VB.NET
                      Reputation:low

                      General

                      Start time:07:49:09
                      Start date:14/10/2021
                      Path:C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exe
                      Wow64 process (32bit):true
                      Commandline:'C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exe'
                      Imagebase:0x360000
                      File size:740352 bytes
                      MD5 hash:3722D60A637A0C27261A839A04D7D4D2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:.Net C# or VB.NET
                      Reputation:low

                      General

                      Start time:07:49:32
                      Start date:14/10/2021
                      Path:C:\Windows\SysWOW64\schtasks.exe
                      Wow64 process (32bit):true
                      Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\guqslNCu' /XML 'C:\Users\user\AppData\Local\Temp\tmp42C9.tmp'
                      Imagebase:0x380000
                      File size:185856 bytes
                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      General

                      Start time:07:49:33
                      Start date:14/10/2021
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff724c50000
                      File size:625664 bytes
                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      General

                      Start time:07:49:33
                      Start date:14/10/2021
                      Path:C:\Users\user\AppData\Roaming\jNnIJrO\jNnIJrO.exe
                      Wow64 process (32bit):true
                      Commandline:{path}
                      Imagebase:0x7d0000
                      File size:740352 bytes
                      MD5 hash:3722D60A637A0C27261A839A04D7D4D2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:.Net C# or VB.NET
                      Yara matches:
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000015.00000002.926831136.0000000002CC1000.00000004.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000015.00000002.926831136.0000000002CC1000.00000004.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000015.00000002.924479714.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000015.00000002.924479714.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                      Reputation:low

                      Disassembly

                      Code Analysis

                      Reset < >