Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.31446

Overview

General Information

Sample Name:SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.31446 (renamed file extension from 31446 to exe)
Analysis ID:635307
MD5:c3230d83ea024fad0e4dc18e3b5ab538
SHA1:980bbcd33a8d4f78a4e373e199f930730b73b548
SHA256:03fa6bc991b15a3d5cd507673d1cccd0b0279315e9a04924d908a9520609a1c3
Tags:exe
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected FormBook
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Injects a PE file into a foreign processes
Uses 32bit PE files
Found inlined nop instructions (likely shell or obfuscated code)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Sample file is different than original file name gathered from version info
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Checks if the current process is being debugged
Detected potential crypto function
Contains functionality to call native functions
Creates a process in suspended mode (likely to inject code)
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)

Classification

  • System is w10x64
  • cleanup
{"C2 list": ["www.therebellifestyle.net/vecn/"], "decoy": ["aaronvdhdesigns.com", "wsk-wurkch.xyz", "advioncockroach.pro", "universalisocial.com", "permitha.net", "easyfoundationbd.com", "smcpropertymanagementllc.com", "trailsidegallery.com", "veltioclinic.com", "alaskatasarim.com", "hnbfks.com", "fosterequineboardingrescue.com", "patriotvolleyballcamp.com", "linguistictrans.com", "bekindstuff.com", "personalizedcure.com", "lymjlr.com", "usedcarsalezaf.com", "kppzfg569j3a5.xyz", "impactmind.net", "jewelspage.com", "buconomy.com", "10426northjacquelinelane.com", "yyy868.com", "foreseeablesoftware.com", "vintagecraftique.com", "sexask.xyz", "deresmovie.com", "51lct.com", "limonuse.com", "recodifynow.com", "doitalleasttexas.com", "bpjaya.com", "cocolinolinens.com", "nftfibtc.com", "bitcrypto.pro", "garment-critter.com", "brudi-gastro.com", "adonistradeco.com", "xn--seorlote-e3a.com", "chanhxephanthietgiatot.online", "yong-xin.com", "ouryouku.com", "tahutempebacem.com", "vontadedecompra.com", "bluesunmeta.com", "yes43.com", "esourcemortgages.com", "jonathan-auch.com", "polkastarter.website", "thongnhattechco.com", "newhome.quest", "exainfra.biz", "hijaipur.com", "finechoiceme.com", "faithandworks.info", "cilijuxing.com", "tzp207.com", "itineraries8.com", "aimsenglishspeakingcourse.com", "alohaayoha.com", "titlependingproductions.com", "aurorasnc.com", "maidemeyhane.com"]}
SourceRuleDescriptionAuthorStrings
00000005.00000000.299395022.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000005.00000000.299395022.0000000000400000.00000040.00000400.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x8c08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x8fa2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x16345:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x15df1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x16447:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x165bf:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x99ba:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x1506c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xa732:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b987:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1ca8a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000005.00000000.299395022.0000000000400000.00000040.00000400.00020000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18809:$sqlite3step: 68 34 1C 7B E1
    • 0x1891c:$sqlite3step: 68 34 1C 7B E1
    • 0x18838:$sqlite3text: 68 38 2A 90 C5
    • 0x1895d:$sqlite3text: 68 38 2A 90 C5
    • 0x1884b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x18973:$sqlite3blob: 68 53 D8 7F 8C
    00000000.00000002.304131238.00000000029BA000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      00000005.00000000.298562849.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
        Click to see the 11 entries
        SourceRuleDescriptionAuthorStrings
        5.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          5.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x7e08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x81a2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x15545:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x14ff1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x15647:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x157bf:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x8bba:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1426c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0x9932:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1ab87:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1bc8a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          5.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.0.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
          • 0x17a09:$sqlite3step: 68 34 1C 7B E1
          • 0x17b1c:$sqlite3step: 68 34 1C 7B E1
          • 0x17a38:$sqlite3text: 68 38 2A 90 C5
          • 0x17b5d:$sqlite3text: 68 38 2A 90 C5
          • 0x17a4b:$sqlite3blob: 68 53 D8 7F 8C
          • 0x17b73:$sqlite3blob: 68 53 D8 7F 8C
          5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.8.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
            5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.8.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
            • 0x7e08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
            • 0x81a2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
            • 0x15545:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
            • 0x14ff1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
            • 0x15647:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
            • 0x157bf:$sequence_4: 5D C3 8D 50 7C 80 FA 07
            • 0x8bba:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
            • 0x1426c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
            • 0x9932:$sequence_7: 66 89 0C 02 5B 8B E5 5D
            • 0x1ab87:$sequence_8: 3C 54 74 04 3C 74 75 F4
            • 0x1bc8a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
            Click to see the 24 entries
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000005.00000000.299395022.0000000000400000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.therebellifestyle.net/vecn/"], "decoy": ["aaronvdhdesigns.com", "wsk-wurkch.xyz", "advioncockroach.pro", "universalisocial.com", "permitha.net", "easyfoundationbd.com", "smcpropertymanagementllc.com", "trailsidegallery.com", "veltioclinic.com", "alaskatasarim.com", "hnbfks.com", "fosterequineboardingrescue.com", "patriotvolleyballcamp.com", "linguistictrans.com", "bekindstuff.com", "personalizedcure.com", "lymjlr.com", "usedcarsalezaf.com", "kppzfg569j3a5.xyz", "impactmind.net", "jewelspage.com", "buconomy.com", "10426northjacquelinelane.com", "yyy868.com", "foreseeablesoftware.com", "vintagecraftique.com", "sexask.xyz", "deresmovie.com", "51lct.com", "limonuse.com", "recodifynow.com", "doitalleasttexas.com", "bpjaya.com", "cocolinolinens.com", "nftfibtc.com", "bitcrypto.pro", "garment-critter.com", "brudi-gastro.com", "adonistradeco.com", "xn--seorlote-e3a.com", "chanhxephanthietgiatot.online", "yong-xin.com", "ouryouku.com", "tahutempebacem.com", "vontadedecompra.com", "bluesunmeta.com", "yes43.com", "esourcemortgages.com", "jonathan-auch.com", "polkastarter.website", "thongnhattechco.com", "newhome.quest", "exainfra.biz", "hijaipur.com", "finechoiceme.com", "faithandworks.info", "cilijuxing.com", "tzp207.com", "itineraries8.com", "aimsenglishspeakingcourse.com", "alohaayoha.com", "titlependingproductions.com", "aurorasnc.com", "maidemeyhane.com"]}
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeVirustotal: Detection: 38%Perma Link
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeReversingLabs: Detection: 28%
            Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.379d7c0.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000000.299395022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000000.298562849.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.303027897.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.305851353.000000000379D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: www.therebellifestyle.net/vecn/Avira URL Cloud: Label: malware
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeJoe Sandbox ML: detected
            Source: 5.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
            Source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.8.unpackAvira: Label: TR/Crypt.ZPACK.Gen
            Source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.4.unpackAvira: Label: TR/Crypt.ZPACK.Gen
            Source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.6.unpackAvira: Label: TR/Crypt.ZPACK.Gen
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: wntdll.pdbUGP source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000005.00000003.300030805.000000000118F000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000005.00000003.301933802.0000000001322000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000005.00000002.303664665.00000000015DF000.00000040.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000005.00000002.303315240.00000000014C0000.00000040.00000800.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000005.00000003.300030805.000000000118F000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000005.00000003.301933802.0000000001322000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000005.00000002.303664665.00000000015DF000.00000040.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000005.00000002.303315240.00000000014C0000.00000040.00000800.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 4x nop then pop esi5_2_004174BD

            Networking

            barindex
            Source: Malware configuration extractorURLs: www.therebellifestyle.net/vecn/
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.268612806.0000000005726000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://en.wW
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.268096633.0000000005742000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.267970991.0000000005742000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://en.wikipedia
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277437344.0000000005727000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277703913.0000000005728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.307936982.0000000005720000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.300912102.0000000005720000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.307936982.0000000005720000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.284728271.000000000572A000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.300912102.0000000005720000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com5
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277437344.0000000005727000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277703913.0000000005728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com9
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277437344.0000000005727000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277703913.0000000005728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comE.TTF5
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277437344.0000000005727000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277703913.0000000005728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comFT
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277437344.0000000005727000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277703913.0000000005728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalsF
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.284728271.000000000572A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comceom
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.307936982.0000000005720000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.284728271.000000000572A000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.300912102.0000000005720000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcevas
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.307936982.0000000005720000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.284728271.000000000572A000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.300912102.0000000005720000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comm
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277437344.0000000005727000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277703913.0000000005728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.coms
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277437344.0000000005727000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277703913.0000000005728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comt
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277437344.0000000005727000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277703913.0000000005728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comueTFO
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270260913.0000000005725000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270396760.0000000005727000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270293613.0000000005728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270396760.0000000005727000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnFROM
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270172735.0000000005727000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnmpa
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270293613.0000000005728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnr
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.279882358.0000000005758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.280632699.0000000005758000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.280475650.0000000005758000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.280264825.0000000005758000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.280024534.0000000005758000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.279882358.0000000005758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/?
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.272659454.000000000572B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.272803731.000000000572B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.272659454.000000000572B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/5
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.272659454.000000000572B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/O
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.272803731.000000000572B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.272659454.000000000572B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.272803731.000000000572B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.272659454.000000000572B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/j
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.272803731.000000000572B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.272659454.000000000572B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/%9
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.272803731.000000000572B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/O
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.272803731.000000000572B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.272659454.000000000572B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/s
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.272803731.000000000572B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/x
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270475925.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.268684679.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269797077.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.271422657.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.271664452.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269126444.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270890106.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.268518529.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.268749430.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269300990.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269408976.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269518453.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270252511.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269640301.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269473100.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.271383232.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.271460841.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269212211.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.268903666.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269499714.000000000573B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270475925.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.268684679.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269797077.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.271422657.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.271664452.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269126444.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270890106.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.268518529.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.268749430.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269300990.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269408976.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269518453.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270252511.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269640301.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269473100.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.271383232.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.271460841.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269212211.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.268903666.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269499714.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270762750.000000000573B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comar
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270475925.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.268684679.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269797077.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.271422657.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.271664452.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269126444.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270890106.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.268518529.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.268749430.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269300990.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269408976.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269518453.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270252511.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269640301.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269473100.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.271383232.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.271460841.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269212211.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.268903666.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269499714.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270762750.000000000573B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comiv
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeString found in binary or memory: https://github.com
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeString found in binary or memory: https://github.com/dcoetzee/plants-vs-zombies-user-file-editor

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.379d7c0.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000000.299395022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000000.298562849.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.303027897.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.305851353.000000000379D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

            System Summary

            barindex
            Source: 5.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 5.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 5.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 5.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.38de850.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
            Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.38de850.6.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
            Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.7090000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
            Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.379d7c0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
            Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.379d7c0.7.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.379d7c0.7.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.7090000.9.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
            Source: 00000005.00000000.299395022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000005.00000000.299395022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000005.00000000.298562849.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000005.00000000.298562849.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000000.00000002.308695207.0000000007090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects zgRAT Author: ditekSHen
            Source: 00000005.00000002.303027897.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000005.00000002.303027897.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000000.00000002.305851353.000000000379D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000000.00000002.305851353.000000000379D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
            Source: 5.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 5.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 5.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 5.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.38de850.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
            Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.38de850.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
            Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.7090000.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
            Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.379d7c0.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
            Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.379d7c0.7.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.379d7c0.7.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.7090000.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
            Source: 00000005.00000000.299395022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000005.00000000.299395022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000005.00000000.298562849.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000005.00000000.298562849.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000000.00000002.308695207.0000000007090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
            Source: 00000005.00000002.303027897.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000005.00000002.303027897.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000000.00000002.305851353.000000000379D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000000.00000002.305851353.000000000379D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeBinary or memory string: OriginalFilename vs SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000000.261270393.0000000000162000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCallerFilePathAttrib.exe" vs SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308695207.0000000007090000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameIVectorView.dllN vs SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.303608210.0000000002716000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCerbera.dll" vs SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.305851353.000000000379D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIVectorView.dllN vs SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeBinary or memory string: OriginalFilename vs SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000005.00000000.295830504.0000000000A12000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCallerFilePathAttrib.exe" vs SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000005.00000002.303833448.000000000176F000.00000040.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000005.00000002.303664665.00000000015DF000.00000040.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000005.00000003.300460936.00000000012A5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000005.00000003.302217455.0000000001441000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeBinary or memory string: OriginalFilenameCallerFilePathAttrib.exe" vs SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 0_2_0253F4300_2_0253F430
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 0_2_0253D43C0_2_0253D43C
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 0_2_0253F4280_2_0253F428
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 5_2_004010305_2_00401030
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 5_2_0041D9665_2_0041D966
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 5_2_0040927B5_2_0040927B
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 5_2_0041EA375_2_0041EA37
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 5_2_004092805_2_00409280
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 5_2_0040DC205_2_0040DC20
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 5_2_0041C5065_2_0041C506
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 5_2_0041EDF45_2_0041EDF4
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 5_2_00402D8C5_2_00402D8C
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 5_2_00402D905_2_00402D90
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 5_2_0041E7C65_2_0041E7C6
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 5_2_00402FB05_2_00402FB0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 5_2_0041A310 NtCreateFile,5_2_0041A310
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 5_2_0041A3C0 NtReadFile,5_2_0041A3C0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 5_2_0041A440 NtClose,5_2_0041A440
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 5_2_0041A4F0 NtAllocateVirtualMemory,5_2_0041A4F0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 5_2_0041A30B NtCreateFile,5_2_0041A30B
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 5_2_0041A3BA NtReadFile,5_2_0041A3BA
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 5_2_0041A4EA NtAllocateVirtualMemory,5_2_0041A4EA
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeVirustotal: Detection: 38%
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeReversingLabs: Detection: 28%
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe"
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.logJump to behavior
            Source: classification engineClassification label: mal100.troj.evad.winEXE@3/1@0/0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: wntdll.pdbUGP source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000005.00000003.300030805.000000000118F000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000005.00000003.301933802.0000000001322000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000005.00000002.303664665.00000000015DF000.00000040.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000005.00000002.303315240.00000000014C0000.00000040.00000800.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000005.00000003.300030805.000000000118F000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000005.00000003.301933802.0000000001322000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000005.00000002.303664665.00000000015DF000.00000040.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000005.00000002.303315240.00000000014C0000.00000040.00000800.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 0_2_00163812 push esi; iretd 0_2_00163838
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 0_2_00167434 push 2055BCF7h; iretd 0_2_0016743F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 0_2_0253CB70 pushfd ; retf 0_2_0253CB71
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 0_2_0253CB02 push esp; retf 0_2_0253CB09
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 5_2_0041D662 push eax; ret 5_2_0041D668
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 5_2_0041D66B push eax; ret 5_2_0041D6D2
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 5_2_0041D615 push eax; ret 5_2_0041D668
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 5_2_0041D6CC push eax; ret 5_2_0041D6D2
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 5_2_00418741 push esi; iretd 5_2_00418744
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 5_2_00A13812 push esi; iretd 5_2_00A13838
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 5_2_00A17434 push 2055BCF7h; iretd 5_2_00A1743F
            Source: initial sampleStatic PE information: section name: .text entropy: 7.65529032153
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: 00000000.00000002.304131238.00000000029BA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.303073371.0000000002651000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe PID: 6296, type: MEMORYSTR
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeRDTSC instruction interceptor: First address: 0000000000408C04 second address: 0000000000408C0A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeRDTSC instruction interceptor: First address: 0000000000408F9E second address: 0000000000408FA4 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.304131238.00000000029BA000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.303073371.0000000002651000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.304131238.00000000029BA000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.303073371.0000000002651000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe TID: 6300Thread sleep time: -43731s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe TID: 6324Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 5_2_00408ED0 rdtsc 5_2_00408ED0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeThread delayed: delay time: 43731Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.303073371.0000000002651000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.303073371.0000000002651000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.303073371.0000000002651000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
            Source: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.303073371.0000000002651000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeCode function: 5_2_00408ED0 rdtsc 5_2_00408ED0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeMemory written: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.379d7c0.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000000.299395022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000000.298562849.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.303027897.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.305851353.000000000379D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.379d7c0.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000000.299395022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000000.298562849.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.303027897.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.305851353.000000000379D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management InstrumentationPath Interception111
            Process Injection
            1
            Masquerading
            OS Credential Dumping221
            Security Software Discovery
            Remote Services1
            Archive Collected Data
            Exfiltration Over Other Network Medium1
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
            Disable or Modify Tools
            LSASS Memory1
            Process Discovery
            Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
            Application Layer Protocol
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)31
            Virtualization/Sandbox Evasion
            Security Account Manager31
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)3
            Software Packing
            NTDS112
            System Information Discovery
            Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script111
            Process Injection
            LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common3
            Obfuscated Files or Information
            Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe39%VirustotalBrowse
            SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe29%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
            SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe100%Joe Sandbox ML
            No Antivirus matches
            SourceDetectionScannerLabelLinkDownload
            5.2.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
            5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.8.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
            5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.4.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
            5.0.SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe.400000.6.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.sajatypeworks.comiv0%URL Reputationsafe
            http://www.fontbureau.comFT0%Avira URL Cloudsafe
            http://www.fontbureau.comceom0%Avira URL Cloudsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.sajatypeworks.comar0%Avira URL Cloudsafe
            http://en.wW0%Avira URL Cloudsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.founder.com.cn/cnFROM0%Avira URL Cloudsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            www.therebellifestyle.net/vecn/100%Avira URL Cloudmalware
            http://www.fontbureau.comalsF0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/50%URL Reputationsafe
            http://www.fontbureau.comcevas0%Avira URL Cloudsafe
            http://www.fontbureau.comueTFO0%Avira URL Cloudsafe
            http://www.founder.com.cn/cnr0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
            http://www.fontbureau.com90%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/jp/O0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.fontbureau.com50%Avira URL Cloudsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            http://www.galapagosdesign.com/0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/O0%URL Reputationsafe
            http://www.founder.com.cn/cnmpa0%Avira URL Cloudsafe
            http://www.galapagosdesign.com/?0%Avira URL Cloudsafe
            http://en.wikipedia0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/jp/%90%Avira URL Cloudsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/x0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/s0%URL Reputationsafe
            http://www.fontbureau.comt0%URL Reputationsafe
            http://www.fontbureau.coms0%Avira URL Cloudsafe
            http://www.fontbureau.comm0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.fontbureau.comE.TTF50%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp/j0%URL Reputationsafe
            No contacted domains info
            NameMaliciousAntivirus DetectionReputation
            www.therebellifestyle.net/vecn/true
            • Avira URL Cloud: malware
            low
            NameSourceMaliciousAntivirus DetectionReputation
            http://www.fontbureau.com/designersGSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.sajatypeworks.comivSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270475925.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.268684679.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269797077.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.271422657.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.271664452.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269126444.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270890106.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.268518529.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.268749430.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269300990.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269408976.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269518453.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270252511.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269640301.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269473100.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.271383232.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.271460841.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269212211.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.268903666.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269499714.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270762750.000000000573B000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://github.com/dcoetzee/plants-vs-zombies-user-file-editorSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exefalse
                high
                http://www.fontbureau.com/designers/?SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.comFTSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277437344.0000000005727000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277703913.0000000005728000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.fontbureau.comceomSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.284728271.000000000572A000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.founder.com.cn/cn/bTheSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.sajatypeworks.comarSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270475925.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.268684679.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269797077.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.271422657.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.271664452.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269126444.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270890106.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.268518529.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.268749430.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269300990.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269408976.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269518453.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270252511.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269640301.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269473100.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.271383232.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.271460841.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269212211.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.268903666.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269499714.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270762750.000000000573B000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.fontbureau.com/designers?SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://github.comSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exefalse
                      high
                      http://en.wWSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.268612806.0000000005726000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.tiro.comSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cnFROMSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270396760.0000000005727000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.com/designersSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.307936982.0000000005720000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.300912102.0000000005720000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.goodfont.co.krSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.comalsFSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277437344.0000000005727000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277703913.0000000005728000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.sajatypeworks.comSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270475925.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.268684679.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269797077.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.271422657.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.271664452.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269126444.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270890106.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.268518529.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.268749430.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269300990.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269408976.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269518453.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270252511.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269640301.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269473100.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.271383232.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.271460841.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269212211.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.268903666.000000000573B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.269499714.000000000573B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.typography.netDSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cn/cTheSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/staff/dennis.htmSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://fontfabrik.comSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/5SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.272803731.000000000572B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.272659454.000000000572B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.comcevasSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.307936982.0000000005720000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.284728271.000000000572A000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.300912102.0000000005720000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fontbureau.comueTFOSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277437344.0000000005727000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277703913.0000000005728000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.founder.com.cn/cnrSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270293613.0000000005728000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/DPleaseSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/Y0SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.272803731.000000000572B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.272659454.000000000572B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com9SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277437344.0000000005727000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277703913.0000000005728000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/jp/OSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.272803731.000000000572B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fonts.comSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.sandoll.co.krSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com5SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.307936982.0000000005720000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.284728271.000000000572A000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.300912102.0000000005720000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.urwpp.deDPleaseSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.zhongyicts.com.cnSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.sakkal.comSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.apache.org/licenses/LICENSE-2.0SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.comSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277437344.0000000005727000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277703913.0000000005728000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.galapagosdesign.com/SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.279882358.0000000005758000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/OSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.272659454.000000000572B000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cnmpaSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270172735.0000000005727000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.galapagosdesign.com/?SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.280632699.0000000005758000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.280475650.0000000005758000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.280264825.0000000005758000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.280024534.0000000005758000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.279882358.0000000005758000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://en.wikipediaSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.268096633.0000000005742000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.267970991.0000000005742000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/jp/%9SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.272803731.000000000572B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.272659454.000000000572B000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.carterandcone.comlSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers/cabarga.htmlNSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.founder.com.cn/cnSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270260913.0000000005725000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270396760.0000000005727000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.270293613.0000000005728000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/xSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.272803731.000000000572B000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/frere-jones.htmlSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.jiyu-kobo.co.jp/sSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.272803731.000000000572B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.272659454.000000000572B000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.comtSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277437344.0000000005727000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277703913.0000000005728000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.comsSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277437344.0000000005727000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277703913.0000000005728000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.fontbureau.commSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.307936982.0000000005720000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.284728271.000000000572A000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.300912102.0000000005720000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.272659454.000000000572B000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.comE.TTF5SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277437344.0000000005727000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.277703913.0000000005728000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.fontbureau.com/designers8SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000002.308225671.0000000006A32000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.jiyu-kobo.co.jp/jSecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.272803731.000000000572B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe, 00000000.00000003.272659454.000000000572B000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    No contacted IP infos
                                    Joe Sandbox Version:34.0.0 Boulder Opal
                                    Analysis ID:635307
                                    Start date and time: 27/05/202218:52:212022-05-27 18:52:21 +02:00
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 9m 4s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Sample file name:SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.31446 (renamed file extension from 31446 to exe)
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                    Number of analysed new started processes analysed:23
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Detection:MAL
                                    Classification:mal100.troj.evad.winEXE@3/1@0/0
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HDC Information:
                                    • Successful, ratio: 34.2% (good quality ratio 32.2%)
                                    • Quality average: 69.9%
                                    • Quality standard deviation: 31.2%
                                    HCA Information:
                                    • Successful, ratio: 100%
                                    • Number of executed functions: 25
                                    • Number of non-executed functions: 4
                                    Cookbook Comments:
                                    • Adjust boot time
                                    • Enable AMSI
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                    • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    TimeTypeDescription
                                    18:53:43API Interceptor1x Sleep call for process: SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe modified
                                    No context
                                    No context
                                    No context
                                    No context
                                    No context
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1308
                                    Entropy (8bit):5.345811588615766
                                    Encrypted:false
                                    SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                    MD5:2E016B886BDB8389D2DD0867BE55F87B
                                    SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                    SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                    SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                    Malicious:true
                                    Reputation:high, very likely benign file
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):7.660625612786716
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Windows Screen Saver (13104/52) 0.07%
                                    • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                    File name:SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe
                                    File size:840704
                                    MD5:c3230d83ea024fad0e4dc18e3b5ab538
                                    SHA1:980bbcd33a8d4f78a4e373e199f930730b73b548
                                    SHA256:03fa6bc991b15a3d5cd507673d1cccd0b0279315e9a04924d908a9520609a1c3
                                    SHA512:c67c926873dcab0388e66f596da73fd7e7625f8e315a86eac48da0d788ca4eb778bd88f5c9abd0315c48912ba1a405cc56be48ff016ae4ac201a91dddb66e43a
                                    SSDEEP:12288:nWK/Ee89bHoAU9vqVCueltghYgEH0fAfCOHF1yxT//JAoG0ynApoHgecgriYRTrI:WK/EeobHo3DUhuHKAfCM1yxjJAdJ
                                    TLSH:A405CFBC71907C8EC467DE7A85785C6099213C662B17C20B91173C9E6A3DFE68E14BE3
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......b..............0..x...Z........... ........@.. ....................... ............@................................
                                    Icon Hash:4462f276dcec30e6
                                    Entrypoint:0x4c961e
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                    Time Stamp:0x6290BF0D [Fri May 27 12:07:41 2022 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:v4.0.30319
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xc95c40x57.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xca0000x57e0.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xd00000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000xc76240xc7800False0.824927308506little endian ispell hash file (?), 8-bit, no capitalization, 256 flags7.65529032153IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                    .rsrc0xca0000x57e00x5800False0.964932528409data7.89345546992IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0xd00000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountry
                                    RT_ICON0xca1300x51a3PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                    RT_GROUP_ICON0xcf2d40x14data
                                    RT_VERSION0xcf2e80x30cdata
                                    RT_MANIFEST0xcf5f40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    DescriptionData
                                    Translation0x0000 0x04b0
                                    LegalCopyright
                                    Assembly Version1.0.0.0
                                    InternalNameCallerFilePathAttrib.exe
                                    FileVersion1.0.0.0
                                    CompanyName
                                    LegalTrademarks
                                    Comments
                                    ProductName
                                    ProductVersion1.0.0.0
                                    FileDescription
                                    OriginalFilenameCallerFilePathAttrib.exe
                                    No network behavior found

                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:18:53:30
                                    Start date:27/05/2022
                                    Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe"
                                    Imagebase:0x160000
                                    File size:840704 bytes
                                    MD5 hash:C3230D83EA024FAD0E4DC18E3B5AB538
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.304131238.00000000029BA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: MALWARE_Win_zgRAT, Description: Detects zgRAT, Source: 00000000.00000002.308695207.0000000007090000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.303073371.0000000002651000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.305851353.000000000379D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.305851353.000000000379D000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.305851353.000000000379D000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:low

                                    Target ID:5
                                    Start time:18:53:46
                                    Start date:27/05/2022
                                    Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.AgentTesla.ETN.MTB.22637.exe
                                    Imagebase:0xa10000
                                    File size:840704 bytes
                                    MD5 hash:C3230D83EA024FAD0E4DC18E3B5AB538
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000000.299395022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000000.299395022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000000.299395022.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000000.298562849.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000000.298562849.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000000.298562849.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.303027897.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.303027897.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.303027897.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:low

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:10.7%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:118
                                      Total number of Limit Nodes:5
                                      execution_graph 11148 253c950 11149 253c9b6 11148->11149 11150 253ca65 11149->11150 11153 253cb0a 11149->11153 11156 253cb10 11149->11156 11154 253cb3e 11153->11154 11159 253c6e4 11153->11159 11154->11150 11157 253c6e4 DuplicateHandle 11156->11157 11158 253cb3e 11157->11158 11158->11150 11160 253cb78 DuplicateHandle 11159->11160 11161 253cc0e 11160->11161 11161->11154 11162 2534178 11163 253418f 11162->11163 11169 2534228 11163->11169 11174 2534260 11163->11174 11164 25341d5 11166 25341a0 11166->11164 11180 2533d1c 11166->11180 11170 253424a 11169->11170 11171 2534255 11170->11171 11173 2534260 CreateActCtxA 11170->11173 11184 2534320 11170->11184 11171->11166 11173->11171 11175 2534227 11174->11175 11176 253426f 11174->11176 11177 2534320 CreateActCtxA 11175->11177 11178 2534255 11175->11178 11179 2534260 CreateActCtxA 11175->11179 11177->11178 11178->11166 11179->11178 11181 2533d27 11180->11181 11202 2537560 11181->11202 11183 2537882 11183->11166 11185 253432f 11184->11185 11186 25342e7 11184->11186 11190 2534410 11185->11190 11194 2534420 11185->11194 11192 2534420 11190->11192 11191 2534524 11192->11191 11198 2534114 11192->11198 11196 2534447 11194->11196 11195 2534524 11195->11195 11196->11195 11197 2534114 CreateActCtxA 11196->11197 11197->11195 11199 25358b0 CreateActCtxA 11198->11199 11201 2535973 11199->11201 11203 253756b 11202->11203 11206 2537580 11203->11206 11205 2537a6d 11205->11183 11207 253758b 11206->11207 11210 25375b0 11207->11210 11209 2537b42 11209->11205 11211 25375bb 11210->11211 11214 25375e0 11211->11214 11213 2537c42 11213->11209 11215 25375eb 11214->11215 11217 253835e 11215->11217 11221 253a521 11215->11221 11216 253839c 11216->11213 11217->11216 11225 253c280 11217->11225 11230 253c273 11217->11230 11235 253a549 11221->11235 11239 253a558 11221->11239 11222 253a536 11222->11217 11226 253c2a1 11225->11226 11227 253c2c5 11226->11227 11271 253c838 11226->11271 11275 253c828 11226->11275 11227->11216 11231 253c2a1 11230->11231 11232 253c2c5 11231->11232 11233 253c838 3 API calls 11231->11233 11234 253c828 3 API calls 11231->11234 11232->11216 11233->11232 11234->11232 11236 253a567 11235->11236 11243 253a650 11235->11243 11251 253a640 11235->11251 11236->11222 11241 253a650 2 API calls 11239->11241 11242 253a640 2 API calls 11239->11242 11240 253a567 11240->11222 11241->11240 11242->11240 11244 253a663 11243->11244 11245 253a67b 11244->11245 11259 253a8d8 11244->11259 11263 253a8c8 11244->11263 11245->11236 11246 253a673 11246->11245 11247 253a878 GetModuleHandleW 11246->11247 11248 253a8a5 11247->11248 11248->11236 11252 253a663 11251->11252 11253 253a67b 11252->11253 11257 253a8d8 LoadLibraryExW 11252->11257 11258 253a8c8 LoadLibraryExW 11252->11258 11253->11236 11254 253a673 11254->11253 11255 253a878 GetModuleHandleW 11254->11255 11256 253a8a5 11255->11256 11256->11236 11257->11254 11258->11254 11260 253a8ec 11259->11260 11262 253a911 11260->11262 11267 253a048 11260->11267 11262->11246 11264 253a8ec 11263->11264 11265 253a048 LoadLibraryExW 11264->11265 11266 253a911 11264->11266 11265->11266 11266->11246 11268 253aab8 LoadLibraryExW 11267->11268 11270 253ab31 11268->11270 11270->11262 11272 253c845 11271->11272 11274 253c87f 11272->11274 11279 253c65c 11272->11279 11274->11227 11276 253c845 11275->11276 11277 253c87f 11276->11277 11278 253c65c 3 API calls 11276->11278 11277->11227 11278->11277 11280 253c667 11279->11280 11282 253d170 11280->11282 11283 253c744 11280->11283 11282->11282 11284 253c74f 11283->11284 11285 25375e0 3 API calls 11284->11285 11286 253d1df 11285->11286 11290 253ef68 11286->11290 11295 253ef50 11286->11295 11287 253d218 11287->11282 11292 253ef99 11290->11292 11293 253efe5 11290->11293 11291 253efa5 11291->11287 11292->11291 11294 253f3e8 LoadLibraryExW GetModuleHandleW 11292->11294 11293->11287 11294->11293 11296 253ef66 11295->11296 11297 253efa5 11296->11297 11298 253f3e8 LoadLibraryExW GetModuleHandleW 11296->11298 11297->11287 11298->11297

                                      Control-flow Graph

                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 0253A896
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.303021676.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2530000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: b8ddfda546cfbb606c1e52cace784fff861e8a417a9072afdc74956bdcbd0dde
                                      • Instruction ID: cfab9720e8d2c4140fca3e23aa6e769981c9bfe5272f15b2f3415a24ad56f8a0
                                      • Opcode Fuzzy Hash: b8ddfda546cfbb606c1e52cace784fff861e8a417a9072afdc74956bdcbd0dde
                                      • Instruction Fuzzy Hash: B9712370A00B058FDB65DF2AD19476ABBF1BF88214F00892ED48ADBA40E735E945CF95
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 55 2534114-2535971 CreateActCtxA 58 2535973-2535979 55->58 59 253597a-25359d4 55->59 58->59 66 25359e3-25359e7 59->66 67 25359d6-25359d9 59->67 68 25359e9-25359f5 66->68 69 25359f8 66->69 67->66 68->69
                                      APIs
                                      • CreateActCtxA.KERNEL32(?), ref: 02535961
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.303021676.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2530000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: e9b69deae8a24911eb425aed55eccbfef9e6cb86c16e3348887a4c10984e23fa
                                      • Instruction ID: b1d7094a5755819c2a0758dd7bf7234d2e326690b56bf23b13eb13c077cc69a1
                                      • Opcode Fuzzy Hash: e9b69deae8a24911eb425aed55eccbfef9e6cb86c16e3348887a4c10984e23fa
                                      • Instruction Fuzzy Hash: A841E371C04218CFDB25DFA9C884BDEBBB5FF48318F648169D408AB251EB756946CF90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 71 253c6e4-253cc0c DuplicateHandle 73 253cc15-253cc32 71->73 74 253cc0e-253cc14 71->74 74->73
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0253CB3E,?,?,?,?,?), ref: 0253CBFF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.303021676.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2530000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 41ca903d2234a4e21ea221100146766cc5f4b7c5000bb10150980fea79908933
                                      • Instruction ID: 98a30637fa5ce0ae00c201ddec1e288968d432f1e35f87f0175ebdd5de7e13d3
                                      • Opcode Fuzzy Hash: 41ca903d2234a4e21ea221100146766cc5f4b7c5000bb10150980fea79908933
                                      • Instruction Fuzzy Hash: 012114B5900208AFDB10CFA9D484AEEFBF4FB48324F14841AE914B3310D375A954CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 77 253cb72-253cc0c DuplicateHandle 78 253cc15-253cc32 77->78 79 253cc0e-253cc14 77->79 79->78
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0253CB3E,?,?,?,?,?), ref: 0253CBFF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.303021676.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2530000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 08de6b37fb98310182d36557df94e31e520b24ec687abad79f32a05dfc00f976
                                      • Instruction ID: 5ed5b069a2a505c5318b9fa78a55f370b5dca42bcb884ed22e4d0e3f1519a45a
                                      • Opcode Fuzzy Hash: 08de6b37fb98310182d36557df94e31e520b24ec687abad79f32a05dfc00f976
                                      • Instruction Fuzzy Hash: 5A21E0B59002089FDB10CFA9D584ADEFBF4FB48324F14841AE929B7311D374A954CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 82 253a048-253aaf8 84 253ab00-253ab2f LoadLibraryExW 82->84 85 253aafa-253aafd 82->85 86 253ab31-253ab37 84->86 87 253ab38-253ab55 84->87 85->84 86->87
                                      APIs
                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0253A911,00000800,00000000,00000000), ref: 0253AB22
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.303021676.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2530000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: 1589c69fa47246a99035abe4e0ed756484c0e4a556a4574d9e4473a196bd2194
                                      • Instruction ID: 43006990fe0f24c0496374ddd304b96fe2e0bb1c7d024f9fdce62dda0603f384
                                      • Opcode Fuzzy Hash: 1589c69fa47246a99035abe4e0ed756484c0e4a556a4574d9e4473a196bd2194
                                      • Instruction Fuzzy Hash: D31112B2D002099FDB10CF9AD448BDEFBF4FB98324F14842AE859A7600C374A945CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 90 253aab0-253aaf8 91 253ab00-253ab2f LoadLibraryExW 90->91 92 253aafa-253aafd 90->92 93 253ab31-253ab37 91->93 94 253ab38-253ab55 91->94 92->91 93->94
                                      APIs
                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0253A911,00000800,00000000,00000000), ref: 0253AB22
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.303021676.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2530000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: 59adf3dd4a128cc9d8eaf12a0c73eb3c9bbb29f5aed9ecc624513440e02b5049
                                      • Instruction ID: bc0e851c70576a75243dea86eb7b2f26cee5803aabc4f13798aaa54eaed589fd
                                      • Opcode Fuzzy Hash: 59adf3dd4a128cc9d8eaf12a0c73eb3c9bbb29f5aed9ecc624513440e02b5049
                                      • Instruction Fuzzy Hash: 941112B6D002098FDB20CF9AD584BDEFBF5BB98324F14842AD459A7700C374A546CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 97 253a830-253a870 98 253a872-253a875 97->98 99 253a878-253a8a3 GetModuleHandleW 97->99 98->99 100 253a8a5-253a8ab 99->100 101 253a8ac-253a8c0 99->101 100->101
                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 0253A896
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.303021676.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2530000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 7456e421cc8d7b524b0857a1b1fa8301c199cb002a34902a77563553bdca1a45
                                      • Instruction ID: addc20dca914656ba582d8666427d4890286c8d20616845ef7928f550895b18e
                                      • Opcode Fuzzy Hash: 7456e421cc8d7b524b0857a1b1fa8301c199cb002a34902a77563553bdca1a45
                                      • Instruction Fuzzy Hash: 8711DFB6D002498FDB10CF9AD448BDEFBF4EB88224F14842AD869B7600D375A546CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.302400760.0000000000C3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C3D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_c3d000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cdb69a130fd71a88029ac52e0372a2fd6cb426ca13bae889ea1f1265c2c0b4e1
                                      • Instruction ID: e02914e34885c6f86209929b92fd3667d05dc638440525f3d585f6578d3c5555
                                      • Opcode Fuzzy Hash: cdb69a130fd71a88029ac52e0372a2fd6cb426ca13bae889ea1f1265c2c0b4e1
                                      • Instruction Fuzzy Hash: E72134B2514240DFCB01DF10E9C0B2ABF65FB98328F24C5A9E9064B246C336D956CBA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.302530323.0000000000C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C4D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_c4d000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1e2ea1dd325ee0642656d6eecbddb29e39c872a9a060eb10986f65dffde8ab42
                                      • Instruction ID: e331274658e75619df70b400ea25da4fbda8250ee9ea54fedb1c49ed56e1d008
                                      • Opcode Fuzzy Hash: 1e2ea1dd325ee0642656d6eecbddb29e39c872a9a060eb10986f65dffde8ab42
                                      • Instruction Fuzzy Hash: E1212971504240DFDB11EF10D5C0B26BBA5FB84318F24C6ADE90A4B346C376DC46CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.302530323.0000000000C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C4D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_c4d000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 68cd6a9d0b168fa58849495bf89751543b04967b3eee5d5003a038f23f81b82c
                                      • Instruction ID: 5724715b97e3acd1f5fe53b2f354f78e1a6a7bfbba7b7302486ae655b7ddff68
                                      • Opcode Fuzzy Hash: 68cd6a9d0b168fa58849495bf89751543b04967b3eee5d5003a038f23f81b82c
                                      • Instruction Fuzzy Hash: 6821D475508240DFDB14EF24D9C4B26BB65FB84314F24C9ADE94A4B346C33AD857CB62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.302530323.0000000000C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C4D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_c4d000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c41f61667e1326b10562d18aa9bc15cdd10337eb3fd5147b662bf138e02b62eb
                                      • Instruction ID: 6b7868fb820d2003796d9c6b6a320cec93a406fa661eb376004c0747243739c8
                                      • Opcode Fuzzy Hash: c41f61667e1326b10562d18aa9bc15cdd10337eb3fd5147b662bf138e02b62eb
                                      • Instruction Fuzzy Hash: 6A217C755093808FCB02CF20D994B15BF71FB46214F28C5EAD8498B6A7C33A985ACB62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.302400760.0000000000C3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C3D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_c3d000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f69d7024cdfcefd926ead02efcbb901b97aad1906707df055ccf3b322d20e9c3
                                      • Instruction ID: 29e9d5b68447dd74a5064d548af50d0c5c6bb2ffb7b8db1aa35371b908f616ea
                                      • Opcode Fuzzy Hash: f69d7024cdfcefd926ead02efcbb901b97aad1906707df055ccf3b322d20e9c3
                                      • Instruction Fuzzy Hash: ED1108B6504280CFCF12CF10D5C4B16BF71FB84324F28C6A9D8450B656C336D966CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.302530323.0000000000C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C4D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_c4d000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e260aa7d4eec5616febf4142ed0a95566a9e8ae1fbabd20c8ce5c2b41f68a8cc
                                      • Instruction ID: 7660da7d2400f2af0436f4e8833a889536f7b65441d57e2fecea967f0a6c319c
                                      • Opcode Fuzzy Hash: e260aa7d4eec5616febf4142ed0a95566a9e8ae1fbabd20c8ce5c2b41f68a8cc
                                      • Instruction Fuzzy Hash: 2F119D75904280DFCB11DF10D5C4B15FBB1FB84324F28C6ADD84A4B656C37AD95ACB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.302400760.0000000000C3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C3D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_c3d000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bf5b1e562204a86b92eb86491af78ab43789fcddd6f480946274a0ffd99c59f3
                                      • Instruction ID: dfd88c6489974f35ae945ee625b8e779d6ccfe569664f787d466cd515f5c5c18
                                      • Opcode Fuzzy Hash: bf5b1e562204a86b92eb86491af78ab43789fcddd6f480946274a0ffd99c59f3
                                      • Instruction Fuzzy Hash: 0E012B7141C3849AE7108E22EDC4B67BBD8EF42374F18C55AED165B28AD378D840CAB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.302400760.0000000000C3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C3D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_c3d000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 139629cd5eef61d48d72a560adac5384198096ef6c67b7a718222279ccf25e57
                                      • Instruction ID: 186fa414912b953eb98cc6789edd27625a92af8913a83f7703c4e34535f88210
                                      • Opcode Fuzzy Hash: 139629cd5eef61d48d72a560adac5384198096ef6c67b7a718222279ccf25e57
                                      • Instruction Fuzzy Hash: 16F062714183849FE7108E15DCC8B62FF98EB92774F18C45AED195B28AC3799944CAB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.303021676.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2530000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c7fcab93454e38fb3a402ad79251f596d605e21239473066dff89c048ac6d887
                                      • Instruction ID: 866e15e43fa166597402d740c48365332004934129480ed95f9b3729539f3dcd
                                      • Opcode Fuzzy Hash: c7fcab93454e38fb3a402ad79251f596d605e21239473066dff89c048ac6d887
                                      • Instruction Fuzzy Hash: 951295F9412F46ABD330CF65E8981893BA1F7D5328B90420AD3611BAD1D7BC194BCFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.303021676.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2530000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2b7236423cadfeebae59431c2ac2d39f3f9410d64c89b17019367eeb92bf3149
                                      • Instruction ID: 580b65bb6a9ac57b89f28bdfface16948a6a532f455b1ad122c5ec67225ea715
                                      • Opcode Fuzzy Hash: 2b7236423cadfeebae59431c2ac2d39f3f9410d64c89b17019367eeb92bf3149
                                      • Instruction Fuzzy Hash: D2A15932E0021A8FCF0ADFB5C84459EBBF2FF84304B15956AE905AB221EB75A915CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.303021676.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2530000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d38b12e3b78fadf4c71ed49c95da755fcd32226bdd7d069ccce1a468bacd71f2
                                      • Instruction ID: 1a305a5f1284678e2ad817c3980250105d7b010a9d8d1d8a0637119669365120
                                      • Opcode Fuzzy Hash: d38b12e3b78fadf4c71ed49c95da755fcd32226bdd7d069ccce1a468bacd71f2
                                      • Instruction Fuzzy Hash: 9BC10CB9412F46ABD721CF65E8881893B71FBD5328F50421AD3612BAD0D7BC584BCFA4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Execution Graph

                                      Execution Coverage:3.7%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:3.8%
                                      Total number of Nodes:338
                                      Total number of Limit Nodes:32
                                      execution_graph 16253 41f2d0 16256 41b9d0 16253->16256 16255 41f2db 16257 41b9f6 16256->16257 16264 409160 16257->16264 16259 41ba02 16263 41ba3b 16259->16263 16270 40d770 16259->16270 16261 41ba17 16280 40ac10 16261->16280 16263->16255 16294 4090b0 16264->16294 16266 409174 16266->16259 16267 40916d 16267->16266 16301 40d570 16267->16301 16271 40d79c 16270->16271 16530 40d680 16271->16530 16274 40d7e1 16277 40d7f2 16274->16277 16279 41a440 NtClose 16274->16279 16275 40d7c9 16276 40d7d4 16275->16276 16278 41a440 NtClose 16275->16278 16276->16261 16277->16261 16278->16276 16279->16277 16281 40ac35 16280->16281 16293 40ae95 16281->16293 16534 407e10 16281->16534 16283 40ad98 16285 41bee0 RtlFreeHeap 16283->16285 16284 40ad3b 16284->16283 16287 40ade2 16284->16287 16290 40adf2 16284->16290 16284->16293 16286 40ada5 16285->16286 16286->16263 16288 41bee0 RtlFreeHeap 16287->16288 16289 40ade9 16288->16289 16289->16263 16290->16283 16291 40ae71 16290->16291 16292 41bee0 RtlFreeHeap 16291->16292 16292->16293 16293->16263 16296 4090c3 16294->16296 16295 4090d6 16295->16267 16296->16295 16305 41b310 16296->16305 16298 409113 16298->16295 16314 408ed0 16298->16314 16300 409133 16300->16267 16304 40d589 16301->16304 16302 409185 16302->16259 16303 41a440 NtClose 16303->16302 16304->16302 16304->16303 16306 41b329 16305->16306 16317 4156a0 16306->16317 16308 41b341 16309 41b34a 16308->16309 16346 41b150 16308->16346 16309->16298 16311 41b35e 16311->16309 16357 41bee0 16311->16357 16316 408eea 16314->16316 16523 407210 16314->16523 16316->16300 16318 4156b4 16317->16318 16320 4157c3 16317->16320 16318->16320 16360 41a310 16318->16360 16320->16308 16321 415807 16322 41bee0 RtlFreeHeap 16321->16322 16326 415813 16322->16326 16323 415999 16324 41a440 NtClose 16323->16324 16327 4159a0 16324->16327 16325 4159af 16418 4153e0 16325->16418 16326->16320 16326->16323 16326->16325 16330 4158a2 16326->16330 16327->16308 16329 4159c2 16329->16308 16331 415909 16330->16331 16332 4158b1 16330->16332 16331->16323 16339 41591c 16331->16339 16333 4158b6 16332->16333 16334 4158ca 16332->16334 16405 4152a0 16333->16405 16335 4158e7 16334->16335 16336 4158cf 16334->16336 16335->16327 16373 415060 16335->16373 16363 415340 16336->16363 16415 41a440 16339->16415 16340 4158c0 16340->16308 16341 4158dd 16341->16308 16343 4158ff 16343->16308 16345 415988 16345->16308 16347 41b16b 16346->16347 16348 41b17d 16347->16348 16464 41be60 16347->16464 16348->16311 16350 41b19d 16467 414cc0 16350->16467 16352 41b1c0 16352->16348 16353 414cc0 2 API calls 16352->16353 16355 41b1e2 16353->16355 16355->16348 16492 415fe0 16355->16492 16356 41b26a 16356->16311 16358 41b3b9 16357->16358 16520 41a620 16357->16520 16358->16298 16361 41a32c NtCreateFile 16360->16361 16445 41af60 16360->16445 16361->16321 16364 41535c 16363->16364 16365 415384 16364->16365 16366 415398 16364->16366 16367 41a440 NtClose 16365->16367 16368 41a440 NtClose 16366->16368 16369 41538d 16367->16369 16370 4153a1 16368->16370 16369->16341 16447 41c0f0 16370->16447 16372 4153ac 16372->16341 16374 4150ab 16373->16374 16375 4150de 16373->16375 16376 41a440 NtClose 16374->16376 16377 4150fa 16375->16377 16381 415229 16375->16381 16378 4150cf 16376->16378 16379 415131 16377->16379 16380 41511c 16377->16380 16378->16343 16383 415136 16379->16383 16384 41514c 16379->16384 16382 41a440 NtClose 16380->16382 16385 41a440 NtClose 16381->16385 16386 415125 16382->16386 16387 41a440 NtClose 16383->16387 16392 415151 16384->16392 16453 41c0b0 16384->16453 16388 415289 16385->16388 16386->16343 16389 41513f 16387->16389 16388->16343 16389->16343 16399 415163 16392->16399 16456 41a3c0 16392->16456 16393 4151b7 16394 4151d5 16393->16394 16395 4151ea 16393->16395 16397 41a440 NtClose 16394->16397 16396 41a440 NtClose 16395->16396 16398 4151f3 16396->16398 16397->16399 16400 41521f 16398->16400 16459 41bcb0 16398->16459 16399->16343 16400->16343 16402 41520a 16403 41bee0 RtlFreeHeap 16402->16403 16404 415213 16403->16404 16404->16343 16406 4152dd 16405->16406 16407 4152e4 16406->16407 16408 4152f8 16406->16408 16409 41a440 NtClose 16407->16409 16411 41a440 NtClose 16408->16411 16410 4152ed 16409->16410 16410->16340 16412 415322 16411->16412 16413 41a440 NtClose 16412->16413 16414 41532c 16413->16414 16414->16340 16416 41af60 16415->16416 16417 41a45c NtClose 16416->16417 16417->16345 16419 41541e 16418->16419 16420 415427 16419->16420 16421 41543c 16419->16421 16422 41a440 NtClose 16420->16422 16423 415460 16421->16423 16424 4154aa 16421->16424 16432 415430 16422->16432 16429 41a440 NtClose 16423->16429 16425 4154f0 16424->16425 16426 4154af 16424->16426 16428 415502 16425->16428 16434 41562a 16425->16434 16427 41a3c0 NtReadFile 16426->16427 16426->16432 16430 4154da 16427->16430 16431 415507 16428->16431 16439 415542 16428->16439 16429->16432 16433 41a440 NtClose 16430->16433 16437 41a440 NtClose 16431->16437 16432->16329 16435 4154e3 16433->16435 16434->16432 16436 41a3c0 NtReadFile 16434->16436 16435->16329 16438 415681 16436->16438 16440 415533 16437->16440 16441 41a440 NtClose 16438->16441 16439->16432 16442 41a440 NtClose 16439->16442 16440->16329 16443 41568a 16441->16443 16444 415575 16442->16444 16443->16329 16444->16329 16446 41af6f 16445->16446 16446->16361 16450 41a5e0 16447->16450 16449 41c10a 16449->16372 16451 41af60 16450->16451 16452 41a5fc RtlAllocateHeap 16451->16452 16452->16449 16454 41a5e0 RtlAllocateHeap 16453->16454 16455 41c0c8 16453->16455 16454->16455 16455->16392 16457 41af60 16456->16457 16458 41a3dc NtReadFile 16457->16458 16458->16393 16460 41bcd4 16459->16460 16461 41bcbd 16459->16461 16460->16402 16461->16460 16462 41c0b0 RtlAllocateHeap 16461->16462 16463 41bceb 16462->16463 16463->16402 16503 41a4f0 16464->16503 16466 41be8d 16466->16350 16468 414cd1 16467->16468 16470 414cd9 16467->16470 16468->16352 16469 414fac 16469->16352 16470->16469 16506 41d090 16470->16506 16472 414d2d 16473 41d090 RtlAllocateHeap 16472->16473 16477 414d38 16473->16477 16474 414d86 16476 41d090 RtlAllocateHeap 16474->16476 16478 414d9a 16476->16478 16477->16474 16511 41d130 16477->16511 16479 41d090 RtlAllocateHeap 16478->16479 16481 414e0d 16479->16481 16480 41d090 RtlAllocateHeap 16489 414e55 16480->16489 16481->16480 16484 41d0f0 RtlFreeHeap 16485 414f8e 16484->16485 16486 41d0f0 RtlFreeHeap 16485->16486 16487 414f98 16486->16487 16488 41d0f0 RtlFreeHeap 16487->16488 16490 414fa2 16488->16490 16517 41d0f0 16489->16517 16491 41d0f0 RtlFreeHeap 16490->16491 16491->16469 16493 415ff1 16492->16493 16494 4156a0 5 API calls 16493->16494 16498 416007 16494->16498 16495 416010 16495->16356 16496 416047 16497 41bee0 RtlFreeHeap 16496->16497 16499 416058 16497->16499 16498->16495 16498->16496 16500 416093 16498->16500 16499->16356 16501 41bee0 RtlFreeHeap 16500->16501 16502 416098 16501->16502 16502->16356 16504 41a50c NtAllocateVirtualMemory 16503->16504 16505 41af60 16503->16505 16504->16466 16505->16504 16507 41d0a0 16506->16507 16508 41d0a6 16506->16508 16507->16472 16509 41c0b0 RtlAllocateHeap 16508->16509 16510 41d0cc 16509->16510 16510->16472 16512 41d155 16511->16512 16513 41d18d 16511->16513 16514 41c0b0 RtlAllocateHeap 16512->16514 16513->16477 16515 41d16a 16514->16515 16516 41bee0 RtlFreeHeap 16515->16516 16516->16513 16518 414f84 16517->16518 16519 41bee0 RtlFreeHeap 16517->16519 16518->16484 16519->16518 16521 41af60 16520->16521 16522 41a63c RtlFreeHeap 16521->16522 16522->16358 16524 407220 16523->16524 16525 40721b 16523->16525 16526 41be60 NtAllocateVirtualMemory 16524->16526 16525->16316 16527 407245 16526->16527 16528 41be60 NtAllocateVirtualMemory 16527->16528 16529 4072a8 16527->16529 16528->16527 16529->16316 16531 40d750 16530->16531 16532 40d69a 16530->16532 16531->16274 16531->16275 16533 41a440 NtClose 16532->16533 16533->16531 16535 407e2e 16534->16535 16544 407ed2 16534->16544 16536 407210 NtAllocateVirtualMemory 16535->16536 16542 407e38 16536->16542 16538 407210 NtAllocateVirtualMemory 16545 407efd 16538->16545 16540 407fba 16540->16284 16542->16544 16547 407b10 16542->16547 16543 407b10 6 API calls 16543->16545 16544->16538 16544->16540 16546 407f92 16544->16546 16545->16543 16545->16546 16546->16540 16568 40da70 16546->16568 16548 407b35 16547->16548 16549 407b89 16548->16549 16550 407c0a 16548->16550 16554 407bb8 16548->16554 16549->16542 16595 40d950 16550->16595 16553 407c36 16553->16542 16554->16553 16575 40af10 16554->16575 16555 407c2c 16558 41a440 NtClose 16555->16558 16557 407bd2 16557->16553 16587 407940 16557->16587 16558->16553 16559 407c42 16561 40af10 NtClose 16559->16561 16563 407c8d 16561->16563 16562 407c00 16562->16542 16563->16553 16564 41a440 NtClose 16563->16564 16565 407ce5 16564->16565 16599 407710 16565->16599 16567 407cf9 16567->16542 16569 40da95 16568->16569 16570 407510 5 API calls 16569->16570 16573 40dab9 16570->16573 16571 407fb0 16571->16284 16572 4156a0 5 API calls 16572->16573 16573->16571 16573->16572 16574 41bee0 RtlFreeHeap 16573->16574 16574->16573 16577 40af3b 16575->16577 16576 40afe3 16576->16557 16577->16576 16578 40afcc 16577->16578 16580 40afef 16577->16580 16579 41a440 NtClose 16578->16579 16579->16576 16581 40b039 16580->16581 16583 40b059 16580->16583 16582 41a440 NtClose 16581->16582 16584 40b046 16582->16584 16585 41a440 NtClose 16583->16585 16584->16557 16586 40b075 16585->16586 16586->16557 16588 407956 16587->16588 16606 419830 16588->16606 16590 40796f 16594 407a83 16590->16594 16625 407510 16590->16625 16592 407a55 16593 407710 5 API calls 16592->16593 16592->16594 16593->16594 16594->16562 16596 40d994 16595->16596 16597 407c25 16596->16597 16598 41a440 NtClose 16596->16598 16597->16555 16597->16559 16598->16597 16600 407739 16599->16600 16601 4077d7 16600->16601 16602 41a440 NtClose 16600->16602 16601->16567 16603 40780a 16602->16603 16603->16601 16604 4156a0 5 API calls 16603->16604 16605 407928 16604->16605 16605->16567 16607 41c0b0 RtlAllocateHeap 16606->16607 16608 419847 16607->16608 16632 408760 16608->16632 16610 419862 16611 4198a0 16610->16611 16612 419889 16610->16612 16615 41be60 NtAllocateVirtualMemory 16611->16615 16613 41bee0 RtlFreeHeap 16612->16613 16614 419896 16613->16614 16614->16590 16616 4198da 16615->16616 16617 41be60 NtAllocateVirtualMemory 16616->16617 16618 4198f3 16617->16618 16619 419b80 16618->16619 16622 419b94 16618->16622 16620 41bee0 RtlFreeHeap 16619->16620 16621 419b8a 16620->16621 16621->16590 16623 41bee0 RtlFreeHeap 16622->16623 16624 419be9 16623->16624 16624->16590 16626 40760f 16625->16626 16627 407525 16625->16627 16626->16592 16627->16626 16628 4156a0 5 API calls 16627->16628 16629 407592 16628->16629 16630 41bee0 RtlFreeHeap 16629->16630 16631 4075b9 16629->16631 16630->16631 16631->16592 16633 408773 16632->16633 16635 4087dd 16633->16635 16636 40b940 16633->16636 16635->16610 16638 40b96c 16636->16638 16637 40b98c 16637->16635 16638->16637 16639 41a440 NtClose 16638->16639 16640 40b9ea 16639->16640 16640->16635

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 88 41a30b-41a361 call 41af60 NtCreateFile
                                      C-Code - Quality: 79%
                                      			E0041A30B(void* __eax, void* __ebx, intOrPtr _a4, HANDLE* _a8, long _a12, struct _EXCEPTION_RECORD _a16, struct _ERESOURCE_LITE _a20, struct _GUID _a24, long _a28, long _a32, long _a36, long _a40, void* _a44, long _a48) {
                                      				long _t24;
                                      
                                      				asm("sbb edx, [ebp-0x75]");
                                      				_t18 = _a4;
                                      				_t3 = _t18 + 0xc5c; // 0xc5c
                                      				E0041AF60(_a4,  *((intOrPtr*)(_t18 + 0x14)), _t18, _t3,  *((intOrPtr*)(_t18 + 0x14)), 0, 0x28);
                                      				_t24 = NtCreateFile(_a8, _a12, _a16, _a20, _a24, _a28, _a32, _a36, _a40, _a44, _a48); // executed
                                      				return _t24;
                                      			}




                                      0x0041a30f
                                      0x0041a313
                                      0x0041a31f
                                      0x0041a327
                                      0x0041a35d
                                      0x0041a361

                                      APIs
                                      • NtCreateFile.NTDLL(00000060,00409113,?,00415807,00409113,FFFFFFFF,?,?,FFFFFFFF,00409113,00415807,?,00409113,00000060,00000000,00000000), ref: 0041A35D
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.303027897.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_400000_SecuriteInfo.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CreateFile
                                      • String ID:
                                      • API String ID: 823142352-0
                                      • Opcode ID: e501e2685081fa9c5c3bb8fa1cb552d2650bf8777e3b94110e07166d2d08e9a5
                                      • Instruction ID: fe6a11953628d1b655cc8a3404c7384d027fa23d82b49bed980696d76be5e961
                                      • Opcode Fuzzy Hash: e501e2685081fa9c5c3bb8fa1cb552d2650bf8777e3b94110e07166d2d08e9a5
                                      • Instruction Fuzzy Hash: 3D01B2B2211108AFCB18CF99DC85EDB37A9EF8C754F118218BA0DD7241C630E855CBA4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 91 41a310-41a326 92 41a32c-41a361 NtCreateFile 91->92 93 41a327 call 41af60 91->93 93->92
                                      C-Code - Quality: 100%
                                      			E0041A310(intOrPtr _a4, HANDLE* _a8, long _a12, struct _EXCEPTION_RECORD _a16, struct _ERESOURCE_LITE _a20, struct _GUID _a24, long _a28, long _a32, long _a36, long _a40, void* _a44, long _a48) {
                                      				long _t21;
                                      
                                      				_t3 = _a4 + 0xc5c; // 0xc5c
                                      				E0041AF60(_a4,  *((intOrPtr*)(_t15 + 0x14)), _t15, _t3,  *((intOrPtr*)(_t15 + 0x14)), 0, 0x28);
                                      				_t21 = NtCreateFile(_a8, _a12, _a16, _a20, _a24, _a28, _a32, _a36, _a40, _a44, _a48); // executed
                                      				return _t21;
                                      			}




                                      0x0041a31f
                                      0x0041a327
                                      0x0041a35d
                                      0x0041a361

                                      APIs
                                      • NtCreateFile.NTDLL(00000060,00409113,?,00415807,00409113,FFFFFFFF,?,?,FFFFFFFF,00409113,00415807,?,00409113,00000060,00000000,00000000), ref: 0041A35D
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.303027897.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_400000_SecuriteInfo.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CreateFile
                                      • String ID:
                                      • API String ID: 823142352-0
                                      • Opcode ID: ede47e358c6f592494742841678bda465d8b9d6efb767baf41057bbc73943ae4
                                      • Instruction ID: 22a17d5a8ca0ee81e299f457139f331d0ae15f1ba5b0ed3d189dcc3aa1234c62
                                      • Opcode Fuzzy Hash: ede47e358c6f592494742841678bda465d8b9d6efb767baf41057bbc73943ae4
                                      • Instruction Fuzzy Hash: 9CF06DB6215208AFCB48DF89DC85EEB77ADAF8C754F158248BA0D97241D630F8518BA4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 94 41a3ba-41a3d6 95 41a3dc-41a409 NtReadFile 94->95 96 41a3d7 call 41af60 94->96 96->95
                                      APIs
                                      • NtReadFile.NTDLL(004159C2,5D9515B3,FFFFFFFF,00415681,?,?,004159C2,?,00415681,FFFFFFFF,5D9515B3,004159C2,?,00000000), ref: 0041A405
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.303027897.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_400000_SecuriteInfo.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FileRead
                                      • String ID:
                                      • API String ID: 2738559852-0
                                      • Opcode ID: 011379de7ea111671198372be9c7d4eee062c0609c1b2ca5f17600066e4491e2
                                      • Instruction ID: df4c667bb12fe57f878c45cfd20c2c5b33c899982cff28c28a4f95ea6835b506
                                      • Opcode Fuzzy Hash: 011379de7ea111671198372be9c7d4eee062c0609c1b2ca5f17600066e4491e2
                                      • Instruction Fuzzy Hash: F1F0E2B2200108ABDB14DF99DC80EEB37A9AF8C354F128259BE0DE7240D630E811CBA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 97 41a3c0-41a409 call 41af60 NtReadFile
                                      C-Code - Quality: 37%
                                      			E0041A3C0(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24, intOrPtr _a28, intOrPtr _a32, intOrPtr _a36, intOrPtr _a40) {
                                      				void* _t18;
                                      				intOrPtr* _t27;
                                      
                                      				_t13 = _a4;
                                      				_t27 = _a4 + 0xc64;
                                      				E0041AF60(_t13,  *((intOrPtr*)(_t13 + 0x14)), _t13, _t27,  *((intOrPtr*)(_t13 + 0x14)), 0, 0x2a);
                                      				_t18 =  *((intOrPtr*)( *_t27))(_a8, _a12, _a16, _a20, _a24, _a28, _a32, _a36, _a40); // executed
                                      				return _t18;
                                      			}





                                      0x0041a3c3
                                      0x0041a3cf
                                      0x0041a3d7
                                      0x0041a405
                                      0x0041a409

                                      APIs
                                      • NtReadFile.NTDLL(004159C2,5D9515B3,FFFFFFFF,00415681,?,?,004159C2,?,00415681,FFFFFFFF,5D9515B3,004159C2,?,00000000), ref: 0041A405
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.303027897.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_400000_SecuriteInfo.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FileRead
                                      • String ID:
                                      • API String ID: 2738559852-0
                                      • Opcode ID: b510bff5fdfeed8eb0fffb7cee2b24ec4e8af31a288f6594e015d3a0b80bf648
                                      • Instruction ID: 73ffa567400af51592167d85ddd4e2221f8c27920a6f65a97cb7e9eff46762f8
                                      • Opcode Fuzzy Hash: b510bff5fdfeed8eb0fffb7cee2b24ec4e8af31a288f6594e015d3a0b80bf648
                                      • Instruction Fuzzy Hash: 99F0B7B2200208AFCB14DF99DC85EEB77ADEF8C754F158249BE0D97241D630E811CBA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 100 41a4ea-41a52d call 41af60 NtAllocateVirtualMemory
                                      C-Code - Quality: 100%
                                      			E0041A4EA(void* __ebx, void* __esi, intOrPtr _a4, void* _a8, PVOID* _a12, long _a16, long* _a20, long _a24, long _a28) {
                                      				long _t14;
                                      
                                      				_t10 = _a4;
                                      				_t3 = _t10 + 0xc7c; // 0x3c7c
                                      				E0041AF60(_a4,  *((intOrPtr*)(_t10 + 0x14)), _t10, _t3,  *((intOrPtr*)(_t10 + 0x14)), 0, 0x30);
                                      				_t14 = NtAllocateVirtualMemory(_a8, _a12, _a16, _a20, _a24, _a28); // executed
                                      				return _t14;
                                      			}




                                      0x0041a4f3
                                      0x0041a4ff
                                      0x0041a507
                                      0x0041a529
                                      0x0041a52d

                                      APIs
                                      • NtAllocateVirtualMemory.NTDLL(?,00000000,?,0041B19D,?,0041B19D,?,00000000,?,00003000,00000040,00409113,00000000), ref: 0041A529
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.303027897.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_400000_SecuriteInfo.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocateMemoryVirtual
                                      • String ID:
                                      • API String ID: 2167126740-0
                                      • Opcode ID: 82aa4f387444e96894f87560f303ad4a31c31d7e483c38378b99413cbcb580bf
                                      • Instruction ID: ab210cc4a19b4089e5ed92e58fe2b32a492addc1859bc116f399d99578cb8b8d
                                      • Opcode Fuzzy Hash: 82aa4f387444e96894f87560f303ad4a31c31d7e483c38378b99413cbcb580bf
                                      • Instruction Fuzzy Hash: 3FF0F8B6200118AFDB18DF89DD81E9B77A9EF8C754F118149FA089B251C635E911CBA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 103 41a4f0-41a506 104 41a50c-41a52d NtAllocateVirtualMemory 103->104 105 41a507 call 41af60 103->105 105->104
                                      C-Code - Quality: 100%
                                      			E0041A4F0(intOrPtr _a4, void* _a8, PVOID* _a12, long _a16, long* _a20, long _a24, long _a28) {
                                      				long _t14;
                                      
                                      				_t3 = _a4 + 0xc7c; // 0x3c7c
                                      				E0041AF60(_a4,  *((intOrPtr*)(_t10 + 0x14)), _t10, _t3,  *((intOrPtr*)(_t10 + 0x14)), 0, 0x30);
                                      				_t14 = NtAllocateVirtualMemory(_a8, _a12, _a16, _a20, _a24, _a28); // executed
                                      				return _t14;
                                      			}




                                      0x0041a4ff
                                      0x0041a507
                                      0x0041a529
                                      0x0041a52d

                                      APIs
                                      • NtAllocateVirtualMemory.NTDLL(?,00000000,?,0041B19D,?,0041B19D,?,00000000,?,00003000,00000040,00409113,00000000), ref: 0041A529
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.303027897.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_400000_SecuriteInfo.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocateMemoryVirtual
                                      • String ID:
                                      • API String ID: 2167126740-0
                                      • Opcode ID: 3937d7bcd71450592b7c43b4c62eb3862b139fe450dcdc5e45fc7760e87cf521
                                      • Instruction ID: 0f6e90ac6ad316f0230f9505ffb1913ba8f116b783957ff2d7da3ee6bc7086c1
                                      • Opcode Fuzzy Hash: 3937d7bcd71450592b7c43b4c62eb3862b139fe450dcdc5e45fc7760e87cf521
                                      • Instruction Fuzzy Hash: 53F0F2B2210208ABDB14DF89DC81EAB77ADAF8C654F118109BA0897241C630E8118BA4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 112 41a440-41a469 call 41af60 NtClose
                                      C-Code - Quality: 100%
                                      			E0041A440(intOrPtr _a4, void* _a8) {
                                      				long _t8;
                                      
                                      				_t5 = _a4;
                                      				_t2 = _t5 + 0x14; // 0x56c29f0f
                                      				_t3 = _t5 + 0xc6c; // 0x409d7f
                                      				E0041AF60(_a4,  *_t2, _a4, _t3,  *_t2, 0, 0x2c);
                                      				_t8 = NtClose(_a8); // executed
                                      				return _t8;
                                      			}




                                      0x0041a443
                                      0x0041a446
                                      0x0041a44f
                                      0x0041a457
                                      0x0041a465
                                      0x0041a469

                                      APIs
                                      • NtClose.NTDLL(004159A0,?,?,004159A0,00409113,FFFFFFFF), ref: 0041A465
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.303027897.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_400000_SecuriteInfo.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Close
                                      • String ID:
                                      • API String ID: 3535843008-0
                                      • Opcode ID: 829c97b90c121aadc2fe6170b15f633a5be8987cb5c0fe9b9f6c1e719d211015
                                      • Instruction ID: 647376dfd9c4a3ead1cf8bf61973886ae708b244be9dddf4ec43f9330a142b27
                                      • Opcode Fuzzy Hash: 829c97b90c121aadc2fe6170b15f633a5be8987cb5c0fe9b9f6c1e719d211015
                                      • Instruction Fuzzy Hash: 96D01772200218ABD620EB99DC89ED77BACDF48A64F118055BA4C5B242C530FA1086E1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 323 408ed0-408ee3 324 408eea-408eef 323->324 325 408ee5 call 407210 323->325 326 408ef1-408ef6 324->326 327 408ef7-408f0b call 407420 324->327 325->324 330 408f10-408f3c call 41bf30 call 41c5a0 327->330 335 408f40-408f5c call 4159e0 call 415a40 330->335 340 408f66-408f6f 335->340 341 408f5e-408f62 335->341 343 408f71-408f86 call 407450 340->343 341->335 342 408f64 341->342 342->343 346 408f88-408f8a 343->346 347 408f8c-408f91 call 4074d0 343->347 346->330 346->347 349 408f96-408f9c 347->349 350 408fb2-408fc7 349->350 351 408f9e-408fab 349->351 351->350
                                      C-Code - Quality: 95%
                                      			E00408ED0(intOrPtr _a4) {
                                      				intOrPtr _v8;
                                      				char _v24;
                                      				char _v284;
                                      				char _v804;
                                      				char _v840;
                                      				void* __ebx;
                                      				void* _t24;
                                      				signed int _t31;
                                      				signed int _t33;
                                      				void* _t34;
                                      				signed int _t39;
                                      				void* _t50;
                                      				intOrPtr _t52;
                                      				void* _t53;
                                      				void* _t54;
                                      				void* _t55;
                                      				void* _t56;
                                      
                                      				_t52 = _a4;
                                      				_t39 = 0; // executed
                                      				_t24 = E00407210(_t52,  &_v24); // executed
                                      				_t54 = _t53 + 8;
                                      				if(_t24 != 0) {
                                      					E00407420( &_v24,  &_v840);
                                      					_t55 = _t54 + 8;
                                      					do {
                                      						E0041BF30( &_v284, 0x104);
                                      						_t47 =  &_v284;
                                      						E0041C5A0( &_v284,  &_v804);
                                      						_t56 = _t55 + 0x10;
                                      						_t50 = 0x4f;
                                      						while(1) {
                                      							_t31 = E00415A40(_t39, _t47, __eflags, E004159E0(_t52, _t50),  &_v284);
                                      							_t56 = _t56 + 0x10;
                                      							__eflags = _t31;
                                      							if(_t31 != 0) {
                                      								break;
                                      							}
                                      							_t50 = _t50 + 1;
                                      							__eflags = _t50 - 0x62;
                                      							if(_t50 <= 0x62) {
                                      								continue;
                                      							} else {
                                      							}
                                      							L8:
                                      							_t33 = E00407450( &_v24,  &_v840);
                                      							_t55 = _t56 + 8;
                                      							__eflags = _t33;
                                      							if(_t33 != 0) {
                                      								goto L9;
                                      							}
                                      							goto L10;
                                      						}
                                      						_t9 = _t52 + 0x18; // 0x5e14c483
                                      						_t10 = _t52 + 0x478;
                                      						 *_t10 =  *(_t52 + 0x478) ^  *_t9;
                                      						__eflags =  *_t10;
                                      						_t39 = 1;
                                      						goto L8;
                                      						L9:
                                      						__eflags = _t39;
                                      					} while (_t39 == 0);
                                      					L10:
                                      					_t34 = E004074D0(_t52,  &_v24); // executed
                                      					__eflags = _t39;
                                      					if(_t39 == 0) {
                                      						asm("rdtsc");
                                      						asm("rdtsc");
                                      						_v8 = _t34 - 0 + _t34;
                                      						_t16 = _t52 + 0x560;
                                      						 *_t16 =  *(_t52 + 0x560) + 0xffffffba;
                                      						__eflags =  *_t16;
                                      					}
                                      					 *((intOrPtr*)(_t52 + 0x35)) =  *((intOrPtr*)(_t52 + 0x35)) + _t39;
                                      					_t20 = _t52 + 0x35; // 0xffff43e8
                                      					_t21 = _t52 + 0x36;
                                      					 *_t21 =  *(_t52 + 0x36) +  *_t20 + 1;
                                      					__eflags =  *_t21;
                                      					return 1;
                                      				} else {
                                      					return _t24;
                                      				}
                                      			}




















                                      0x00408edb
                                      0x00408ee3
                                      0x00408ee5
                                      0x00408eea
                                      0x00408eef
                                      0x00408f02
                                      0x00408f07
                                      0x00408f10
                                      0x00408f1c
                                      0x00408f28
                                      0x00408f2f
                                      0x00408f34
                                      0x00408f37
                                      0x00408f40
                                      0x00408f52
                                      0x00408f57
                                      0x00408f5a
                                      0x00408f5c
                                      0x00000000
                                      0x00000000
                                      0x00408f5e
                                      0x00408f5f
                                      0x00408f62
                                      0x00000000
                                      0x00000000
                                      0x00408f64
                                      0x00408f71
                                      0x00408f7c
                                      0x00408f81
                                      0x00408f84
                                      0x00408f86
                                      0x00000000
                                      0x00000000
                                      0x00000000
                                      0x00408f86
                                      0x00408f66
                                      0x00408f69
                                      0x00408f69
                                      0x00408f69
                                      0x00408f6f
                                      0x00000000
                                      0x00408f88
                                      0x00408f88
                                      0x00408f88
                                      0x00408f8c
                                      0x00408f91
                                      0x00408f9a
                                      0x00408f9c
                                      0x00408f9e
                                      0x00408fa4
                                      0x00408fa8
                                      0x00408fab
                                      0x00408fab
                                      0x00408fab
                                      0x00408fab
                                      0x00408fb2
                                      0x00408fb5
                                      0x00408fba
                                      0x00408fba
                                      0x00408fba
                                      0x00408fc7
                                      0x00408ef6
                                      0x00408ef6
                                      0x00408ef6

                                      Memory Dump Source
                                      • Source File: 00000005.00000002.303027897.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_400000_SecuriteInfo.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6fc2f3020bea84d10eca2f8570a7660f6d0ce5d03219554aed66dd8ad68a97e4
                                      • Instruction ID: 911db63d92bb27313539f87812f39d7602e647c51c5309350fa93bcc7f5e98a2
                                      • Opcode Fuzzy Hash: 6fc2f3020bea84d10eca2f8570a7660f6d0ce5d03219554aed66dd8ad68a97e4
                                      • Instruction Fuzzy Hash: 8F210C72D4020957CB24D6749D42AFB73ACAB54314F44057FF989A3181FA38BB8987A6
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 106 41a5e0-41a611 call 41af60 RtlAllocateHeap
                                      C-Code - Quality: 100%
                                      			E0041A5E0(intOrPtr _a4, void* _a8, long _a12, long _a16) {
                                      				void* _t10;
                                      
                                      				E0041AF60(_a4,  *((intOrPtr*)(_a4 + 0x14)), _t7, _t7 + 0xc8c,  *((intOrPtr*)(_a4 + 0x14)), 0, 0x34);
                                      				_t10 = RtlAllocateHeap(_a8, _a12, _a16); // executed
                                      				return _t10;
                                      			}




                                      0x0041a5f7
                                      0x0041a60d
                                      0x0041a611

                                      APIs
                                      • RtlAllocateHeap.NTDLL(00415186,?,004158FF,004158FF,?,00415186,?,?,?,?,?,00000000,00409113,?), ref: 0041A60D
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.303027897.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_400000_SecuriteInfo.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocateHeap
                                      • String ID:
                                      • API String ID: 1279760036-0
                                      • Opcode ID: 8082421df8bc89d162f2638fa4c1385792dc10d17e44cb2d46fb0fb817fbd62f
                                      • Instruction ID: 5112eb7d04df1d6e50f339e712a9d98793db7acbdec2b9c88685dfce6d12f60e
                                      • Opcode Fuzzy Hash: 8082421df8bc89d162f2638fa4c1385792dc10d17e44cb2d46fb0fb817fbd62f
                                      • Instruction Fuzzy Hash: 0EE01AB12002086BDB14DF49DC45E9737ACEF88654F118155BA085B241C530F9108AB5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 109 41a620-41a651 call 41af60 RtlFreeHeap
                                      C-Code - Quality: 100%
                                      			E0041A620(intOrPtr _a4, void* _a8, long _a12, void* _a16) {
                                      				char _t10;
                                      
                                      				_t3 = _a4 + 0xc90; // 0xc90
                                      				E0041AF60(_a4,  *((intOrPtr*)(_t7 + 0x14)), _t7, _t3,  *((intOrPtr*)(_t7 + 0x14)), 0, 0x35);
                                      				_t10 = RtlFreeHeap(_a8, _a12, _a16); // executed
                                      				return _t10;
                                      			}




                                      0x0041a62f
                                      0x0041a637
                                      0x0041a64d
                                      0x0041a651

                                      APIs
                                      • RtlFreeHeap.NTDLL(00000060,00409113,?,?,00409113,00000060,00000000,00000000,?,?,00409113,?,00000000), ref: 0041A64D
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.303027897.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_400000_SecuriteInfo.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: FreeHeap
                                      • String ID:
                                      • API String ID: 3298025750-0
                                      • Opcode ID: a6e6f41d857b18798f6d11579541f16a6a166f54801e0754a839ad98261f1417
                                      • Instruction ID: e76337afa916636dc7999d0b0cc11d2e66c0cc36247d0f50dc268ede5031f4cd
                                      • Opcode Fuzzy Hash: a6e6f41d857b18798f6d11579541f16a6a166f54801e0754a839ad98261f1417
                                      • Instruction Fuzzy Hash: 14E012B1200208ABDB14EF89DC49EA737ACEF88764F118159BA085B242C630E9208AB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000005.00000002.303027897.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_400000_SecuriteInfo.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 90b69307a73422e54bead9f6c91450f429be93f55971cdc064210e7d399e7dac
                                      • Instruction ID: 38183a7a39febe23bea59b93452495d6e2d3b1ba333a76c24601fb4220c0e845
                                      • Opcode Fuzzy Hash: 90b69307a73422e54bead9f6c91450f429be93f55971cdc064210e7d399e7dac
                                      • Instruction Fuzzy Hash: 31C01236A981505DF3663E3CBD111AAFBB8A587265F142577C544E7812871282358344
                                      Uniqueness

                                      Uniqueness Score: -1.00%