Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Quote 40240333-REV2.exe

Overview

General Information

Sample name:Quote 40240333-REV2.exe
Analysis ID:1558213
MD5:560a144b63de4457304d88add688500b
SHA1:e1fdd08d768f5a0170e9ff354b9f75a5c533506f
SHA256:76ee39157442dc28e64f089260ca42ec5374ae2fccb99d0940b9717e48e6dc86
Tags:AgentTeslaexeuser-threatcat_ch
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Quote 40240333-REV2.exe (PID: 7920 cmdline: "C:\Users\user\Desktop\Quote 40240333-REV2.exe" MD5: 560A144B63DE4457304D88ADD688500B)
    • powershell.exe (PID: 8100 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 40240333-REV2.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 8124 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Quote 40240333-REV2.exe (PID: 8108 cmdline: "C:\Users\user\Desktop\Quote 40240333-REV2.exe" MD5: 560A144B63DE4457304D88ADD688500B)
    • Quote 40240333-REV2.exe (PID: 8132 cmdline: "C:\Users\user\Desktop\Quote 40240333-REV2.exe" MD5: 560A144B63DE4457304D88ADD688500B)
    • Quote 40240333-REV2.exe (PID: 8144 cmdline: "C:\Users\user\Desktop\Quote 40240333-REV2.exe" MD5: 560A144B63DE4457304D88ADD688500B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Host": "mail.mbarieservicesltd.com", "Username": "saless@mbarieservicesltd.com", "Password": "     *o9H+18Q4%;M     "}
SourceRuleDescriptionAuthorStrings
00000006.00000002.2940553325.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
    00000000.00000002.1730144520.00000000038F9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000006.00000002.2943118351.0000000002D71000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000006.00000002.2943118351.0000000002D71000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Process Memory Space: Quote 40240333-REV2.exe PID: 7920JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
            Click to see the 4 entries
            SourceRuleDescriptionAuthorStrings
            0.2.Quote 40240333-REV2.exe.3ac0fe0.2.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              0.2.Quote 40240333-REV2.exe.3aea000.1.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                6.2.Quote 40240333-REV2.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                  0.2.Quote 40240333-REV2.exe.3aea000.1.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 40240333-REV2.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 40240333-REV2.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Quote 40240333-REV2.exe", ParentImage: C:\Users\user\Desktop\Quote 40240333-REV2.exe, ParentProcessId: 7920, ParentProcessName: Quote 40240333-REV2.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 40240333-REV2.exe", ProcessId: 8100, ProcessName: powershell.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 40240333-REV2.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 40240333-REV2.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Quote 40240333-REV2.exe", ParentImage: C:\Users\user\Desktop\Quote 40240333-REV2.exe, ParentProcessId: 7920, ParentProcessName: Quote 40240333-REV2.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 40240333-REV2.exe", ProcessId: 8100, ProcessName: powershell.exe
                      Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 199.79.62.115, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\Quote 40240333-REV2.exe, Initiated: true, ProcessId: 8144, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49742
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 40240333-REV2.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 40240333-REV2.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Quote 40240333-REV2.exe", ParentImage: C:\Users\user\Desktop\Quote 40240333-REV2.exe, ParentProcessId: 7920, ParentProcessName: Quote 40240333-REV2.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 40240333-REV2.exe", ProcessId: 8100, ProcessName: powershell.exe
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "mail.mbarieservicesltd.com", "Username": "saless@mbarieservicesltd.com", "Password": " *o9H+18Q4%;M "}
                      Source: Quote 40240333-REV2.exeReversingLabs: Detection: 34%
                      Source: Quote 40240333-REV2.exeVirustotal: Detection: 30%Perma Link
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: Quote 40240333-REV2.exeJoe Sandbox ML: detected
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: /log.tmp
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <br>[
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: yyyy-MM-dd HH:mm:ss
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: ]<br>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <br>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Time:
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <br>User Name:
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <br>Computer Name:
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <br>OSFullName:
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <br>CPU:
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <br>RAM:
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <br>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: IP Address:
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <br>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <hr>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: New
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: IP Address:
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: false
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: false
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: false
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: false
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: false
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: false
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: false
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: false
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: false
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: mail.mbarieservicesltd.com
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: saless@mbarieservicesltd.com
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: *o9H+18Q4%;M
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: iinfo@mbarieservicesltd.com
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: false
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: false
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: appdata
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: KTvkzEc
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: KTvkzEc.exe
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: KTvkzEc
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Type
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <br>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <hr>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <br>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <b>[
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: ]</b> (
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: )<br>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {BACK}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {ALT+TAB}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {ALT+F4}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {TAB}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {ESC}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {Win}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {CAPSLOCK}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {KEYUP}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {KEYDOWN}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {KEYLEFT}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {KEYRIGHT}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {DEL}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {END}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {HOME}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {Insert}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {NumLock}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {PageDown}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {PageUp}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {ENTER}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {F1}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {F2}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {F3}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {F4}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {F5}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {F6}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {F7}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {F8}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {F9}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {F10}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {F11}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {F12}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: control
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {CTRL}
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: &amp;
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: &lt;
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: &gt;
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: &quot;
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <br><hr>Copied Text: <br>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <hr>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: logins
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: IE/Edge
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Windows Secure Note
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: 3CCD5499-87A8-4B10-A215-608888DD3B55
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Windows Web Password Credential
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: 154E23D0-C644-4E6F-8CE6-5069272F999F
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Windows Credential Picker Protector
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Web Credentials
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Windows Credentials
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Windows Domain Certificate Credential
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Windows Domain Password Credential
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Windows Extended Credential
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: 00000000-0000-0000-0000-000000000000
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: SchemaId
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: pResourceElement
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: pIdentityElement
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: pPackageSid
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: pAuthenticatorElement
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: IE/Edge
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: UC Browser
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: UCBrowser\
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Login Data
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: journal
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: wow_logins
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Safari for Windows
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \Common Files\Apple\Apple Application Support\plutil.exe
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \Apple Computer\Preferences\keychain.plist
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <array>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <dict>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <string>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: </string>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <string>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: </string>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <data>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: </data>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: -convert xml1 -s -o "
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \fixed_keychain.xml"
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \Microsoft\Credentials\
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \Microsoft\Credentials\
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \Microsoft\Credentials\
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \Microsoft\Credentials\
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \Microsoft\Protect\
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: credential
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: QQ Browser
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Tencent\QQBrowser\User Data
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \Default\EncryptedStorage
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Profile
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \EncryptedStorage
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: entries
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: category
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Password
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: str3
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: str2
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: blob0
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: password_value
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: IncrediMail
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: PopPassword
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: SmtpPassword
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Software\IncrediMail\Identities\
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \Accounts_New
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: PopPassword
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: SmtpPassword
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: SmtpServer
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: EmailAddress
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Eudora
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Software\Qualcomm\Eudora\CommandLine\
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: current
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Settings
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: SavePasswordText
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Settings
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: ReturnAddress
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Falkon Browser
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \falkon\profiles\
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: profiles.ini
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: startProfile=([A-z0-9\/\.\"]+)
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: profiles.ini
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \browsedata.db
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: autofill
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: ClawsMail
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \Claws-mail
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \clawsrc
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \clawsrc
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: passkey0
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: master_passphrase_salt=(.+)
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: master_passphrase_pbkdf2_rounds=(.+)
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \accountrc
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: smtp_server
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: address
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: account
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \passwordstorerc
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: {(.*),(.*)}(.*)
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Flock Browser
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: APPDATA
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \Flock\Browser\
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: signons3.txt
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: DynDns
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: ALLUSERSPROFILE
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Dyn\Updater\config.dyndns
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: username=
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: password=
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: https://account.dyn.com/
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: t6KzXhCh
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: ALLUSERSPROFILE
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Dyn\Updater\daemon.cfg
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: global
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: accounts
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: account.
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: username
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: account.
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: password
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Psi/Psi+
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: name
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: password
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Psi/Psi+
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: APPDATA
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \Psi\profiles
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: APPDATA
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \Psi+\profiles
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \accounts.xml
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \accounts.xml
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: OpenVPN
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Software\OpenVPN-GUI\configs
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Software\OpenVPN-GUI\configs
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Software\OpenVPN-GUI\configs\
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: username
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: auth-data
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: entropy
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: USERPROFILE
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \OpenVPN\config\
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: remote
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: remote
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: NordVPN
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: NordVPN
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: NordVpn.exe*
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: user.config
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: //setting[@name='Username']/value
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: //setting[@name='Password']/value
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: NordVPN
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Private Internet Access
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: %ProgramW6432%
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Private Internet Access\data
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: ProgramFiles(x86)
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \Private Internet Access\data
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \account.json
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: .*"username":"(.*?)"
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: .*"password":"(.*?)"
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Private Internet Access
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: privateinternetaccess.com
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: FileZilla
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: APPDATA
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \FileZilla\recentservers.xml
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: APPDATA
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \FileZilla\recentservers.xml
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <Server>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <Host>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <Host>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: </Host>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <Port>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: </Port>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <User>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <User>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: </User>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <Pass encoding="base64">
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <Pass encoding="base64">
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: </Pass>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <Pass>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <Pass encoding="base64">
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: </Pass>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: CoreFTP
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: SOFTWARE\FTPWare\COREFTP\Sites
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: User
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Host
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Port
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: hdfzpysvpzimorhk
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: WinSCP
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: HostName
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: UserName
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Password
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: PublicKeyFile
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: PortNumber
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: [PRIVATE KEY LOCATION: "{0}"]
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: WinSCP
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: ABCDEF
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Flash FXP
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: port
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: user
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: pass
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: quick.dat
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Sites.dat
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \FlashFXP\
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \FlashFXP\
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: yA36zA48dEhfrvghGRg57h5UlDv3
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: FTP Navigator
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: SystemDrive
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \FTP Navigator\Ftplist.txt
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Server
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Password
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: No Password
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: User
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: SmartFTP
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: APPDATA
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: SmartFTP\Client 2.0\Favorites\Quick Connect
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: WS_FTP
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: appdata
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Ipswitch\WS_FTP\Sites\ws_ftp.ini
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: HOST
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: PWD=
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: PWD=
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: FtpCommander
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: SystemDrive
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: SystemDrive
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \Program Files (x86)\FTP Commander\Ftplist.txt
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: SystemDrive
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \cftp\Ftplist.txt
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander\Ftplist.txt
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: ;Password=
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: ;User=
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: ;Server=
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: ;Port=
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: ;Port=
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: ;Password=
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: ;User=
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: ;Anonymous=
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: FTPGetter
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \FTPGetter\servers.xml
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <server>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <server_ip>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <server_ip>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: </server_ip>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <server_port>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: </server_port>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <server_user_name>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <server_user_name>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: </server_user_name>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <server_user_password>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: <server_user_password>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: </server_user_password>
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: FTPGetter
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: The Bat!
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: appdata
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \The Bat!
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \Account.CFN
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \Account.CFN
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: +-0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Becky!
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: HKEY_CURRENT_USER\Software\RimArts\B2\Settings
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: DataDir
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Folder.lst
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \Mailbox.ini
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Account
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: PassWd
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Account
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: SMTPServer
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Account
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: MailAddress
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Becky!
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Outlook
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Email
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: IMAP Password
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: POP3 Password
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: HTTP Password
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: SMTP Password
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Email
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Email
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Email
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: IMAP Password
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: POP3 Password
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: HTTP Password
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: SMTP Password
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Server
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Windows Mail App
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: COMPlus_legacyCorruptedStateExceptionsPolicy
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Software\Microsoft\ActiveSync\Partners
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Email
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Server
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: SchemaId
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: pResourceElement
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: pIdentityElement
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: pPackageSid
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: pAuthenticatorElement
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: syncpassword
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: mailoutgoing
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: FoxMail
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\FoxmailPreview
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Executable
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\Foxmail\V3.1
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: FoxmailPath
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \Storage\
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \Storage\
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \mail
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \mail
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \Accounts\Account.rec0
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \Accounts\Account.rec0
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \Account.stg
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \Account.stg
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: POP3Host
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: SMTPHost
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: IncomingServer
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Account
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: MailAddress
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Password
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: POP3Password
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Opera Mail
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: opera:
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: abcdefghijklmnopqrstuvwxyz1234567890_-.~!@#$%^&*()[{]}\|';:,<>/?+=
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: PocoMail
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: appdata
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \Pocomail\accounts.ini
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Email
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: POPPass
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: SMTPPass
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: SMTP
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: eM Client
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: eM Client\accounts.dat
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: eM Client
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Accounts
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: "Username":"
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: "Secret":"
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: 72905C47-F4FD-4CF7-A489-4E8121A155BD
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: "ProviderName":"
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: o6806642kbM7c5
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Mailbird
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: SenderIdentities
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Accounts
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \Mailbird\Store\Store.db
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Server_Host
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Accounts
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Email
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Username
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: EncryptedPassword
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Mailbird
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: RealVNC 4.x
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: SOFTWARE\Wow6432Node\RealVNC\WinVNC4
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Password
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: RealVNC 3.x
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: SOFTWARE\RealVNC\vncserver
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Password
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: RealVNC 4.x
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: SOFTWARE\RealVNC\WinVNC4
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Password
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: RealVNC 3.x
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Software\ORL\WinVNC3
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Password
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: TightVNC
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Software\TightVNC\Server
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Password
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: TightVNC
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Software\TightVNC\Server
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: PasswordViewOnly
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: TightVNC ControlPassword
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Software\TightVNC\Server
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: ControlPassword
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: TigerVNC
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Software\TigerVNC\Server
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Password
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: UltraVNC
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: ProgramFiles(x86)
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: passwd
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: UltraVNC
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: ProgramFiles(x86)
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: passwd2
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: UltraVNC
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: ProgramFiles
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: passwd
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: UltraVNC
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: ProgramFiles
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: passwd2
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: UltraVNC
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: ProgramFiles
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \UltraVNC\ultravnc.ini
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: passwd
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: UltraVNC
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: ProgramFiles
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \UltraVNC\ultravnc.ini
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: passwd2
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: UltraVNC
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: ProgramFiles(x86)
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \UltraVNC\ultravnc.ini
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: passwd
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: UltraVNC
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: ProgramFiles(x86)
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: \UltraVNC\ultravnc.ini
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: passwd2
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: JDownloader 2.0
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: JDownloader 2.0\cfg
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: org.jdownloader.settings.AccountSettings.accounts.ejs
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: JDownloader 2.0\cfg
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: jd.controlling.authentication.AuthenticationControllerSettings.list.ejs
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Paltalk
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: Software\A.V.M.\Paltalk NG\common_settings\core\users\creds\
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpackString decryptor: nickname
                      Source: Quote 40240333-REV2.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: Quote 40240333-REV2.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: global trafficTCP traffic: 192.168.2.4:49742 -> 199.79.62.115:587
                      Source: Joe Sandbox ViewIP Address: 199.79.62.115 199.79.62.115
                      Source: global trafficTCP traffic: 192.168.2.4:49742 -> 199.79.62.115:587
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficDNS traffic detected: DNS query: mail.mbarieservicesltd.com
                      Source: Quote 40240333-REV2.exe, 00000006.00000002.2943118351.0000000002DCA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.mbarieservicesltd.com
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1728971288.00000000028F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name8
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1732919995.0000000005250000.00000004.00000020.00020000.00000000.sdmp, Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeCode function: 0_2_00F3D5B40_2_00F3D5B4
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeCode function: 0_2_072BCC780_2_072BCC78
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeCode function: 0_2_072BEBF20_2_072BEBF2
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeCode function: 0_2_072B86280_2_072B8628
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeCode function: 0_2_072BA5300_2_072BA530
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeCode function: 0_2_072BA5400_2_072BA540
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeCode function: 0_2_072B04000_2_072B0400
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeCode function: 0_2_072B03F00_2_072B03F0
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeCode function: 0_2_072B8E980_2_072B8E98
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeCode function: 0_2_072BAEE10_2_072BAEE1
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeCode function: 0_2_072BAEF00_2_072BAEF0
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeCode function: 0_2_072B8A600_2_072B8A60
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeCode function: 6_2_02B541406_2_02B54140
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeCode function: 6_2_02B54D586_2_02B54D58
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeCode function: 6_2_02B5FB486_2_02B5FB48
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeCode function: 6_2_02B544886_2_02B54488
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeCode function: 6_2_065F37286_2_065F3728
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeCode function: 6_2_065F19F86_2_065F19F8
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1728971288.0000000002901000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameriched20.dllp( vs Quote 40240333-REV2.exe
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1728971288.0000000002901000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs Quote 40240333-REV2.exe
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1728971288.0000000002901000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $dq,\\StringFileInfo\\000004B0\\OriginalFilename vs Quote 40240333-REV2.exe
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1728971288.0000000002901000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs Quote 40240333-REV2.exe
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1723013353.00000000009FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Quote 40240333-REV2.exe
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1734248939.0000000007330000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Quote 40240333-REV2.exe
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1730144520.00000000038F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename7b99aba2-3c62-4861-97de-170caa2c3039.exe4 vs Quote 40240333-REV2.exe
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1730144520.00000000038F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Quote 40240333-REV2.exe
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1735839780.000000000A0F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs Quote 40240333-REV2.exe
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1733265517.00000000053A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs Quote 40240333-REV2.exe
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1728971288.00000000028F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename7b99aba2-3c62-4861-97de-170caa2c3039.exe4 vs Quote 40240333-REV2.exe
                      Source: Quote 40240333-REV2.exe, 00000006.00000002.2940553325.000000000042C000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename7b99aba2-3c62-4861-97de-170caa2c3039.exe4 vs Quote 40240333-REV2.exe
                      Source: Quote 40240333-REV2.exe, 00000006.00000002.2940886353.0000000000CF9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Quote 40240333-REV2.exe
                      Source: Quote 40240333-REV2.exeBinary or memory string: OriginalFilenameUruf.exeP vs Quote 40240333-REV2.exe
                      Source: Quote 40240333-REV2.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: Quote 40240333-REV2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpack, O.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpack, O.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpack, P.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpack, P.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.Quote 40240333-REV2.exe.3b2e600.3.raw.unpack, okV60aK4gpuFxTOK3M.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.Quote 40240333-REV2.exe.3b2e600.3.raw.unpack, MtjSgdCjepWUaljo2A.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.Quote 40240333-REV2.exe.3b2e600.3.raw.unpack, MtjSgdCjepWUaljo2A.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.Quote 40240333-REV2.exe.3b2e600.3.raw.unpack, MtjSgdCjepWUaljo2A.csSecurity API names: _0020.AddAccessRule
                      Source: 0.2.Quote 40240333-REV2.exe.7330000.5.raw.unpack, okV60aK4gpuFxTOK3M.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.Quote 40240333-REV2.exe.7330000.5.raw.unpack, MtjSgdCjepWUaljo2A.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.Quote 40240333-REV2.exe.7330000.5.raw.unpack, MtjSgdCjepWUaljo2A.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.Quote 40240333-REV2.exe.7330000.5.raw.unpack, MtjSgdCjepWUaljo2A.csSecurity API names: _0020.AddAccessRule
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@10/6@3/1
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Quote 40240333-REV2.exe.logJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8124:120:WilError_03
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_viszymfn.qth.ps1Jump to behavior
                      Source: Quote 40240333-REV2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: Quote 40240333-REV2.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: Quote 40240333-REV2.exeReversingLabs: Detection: 34%
                      Source: Quote 40240333-REV2.exeVirustotal: Detection: 30%
                      Source: unknownProcess created: C:\Users\user\Desktop\Quote 40240333-REV2.exe "C:\Users\user\Desktop\Quote 40240333-REV2.exe"
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 40240333-REV2.exe"
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess created: C:\Users\user\Desktop\Quote 40240333-REV2.exe "C:\Users\user\Desktop\Quote 40240333-REV2.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess created: C:\Users\user\Desktop\Quote 40240333-REV2.exe "C:\Users\user\Desktop\Quote 40240333-REV2.exe"
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess created: C:\Users\user\Desktop\Quote 40240333-REV2.exe "C:\Users\user\Desktop\Quote 40240333-REV2.exe"
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 40240333-REV2.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess created: C:\Users\user\Desktop\Quote 40240333-REV2.exe "C:\Users\user\Desktop\Quote 40240333-REV2.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess created: C:\Users\user\Desktop\Quote 40240333-REV2.exe "C:\Users\user\Desktop\Quote 40240333-REV2.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess created: C:\Users\user\Desktop\Quote 40240333-REV2.exe "C:\Users\user\Desktop\Quote 40240333-REV2.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: riched20.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: usp10.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: msls31.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: vaultcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: Quote 40240333-REV2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: Quote 40240333-REV2.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                      Data Obfuscation

                      barindex
                      Source: 0.2.Quote 40240333-REV2.exe.3b2e600.3.raw.unpack, MtjSgdCjepWUaljo2A.cs.Net Code: tZxvgmkQc6 System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.Quote 40240333-REV2.exe.7330000.5.raw.unpack, MtjSgdCjepWUaljo2A.cs.Net Code: tZxvgmkQc6 System.Reflection.Assembly.Load(byte[])
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeCode function: 0_2_072BCB47 push esp; ret 0_2_072BCB48
                      Source: Quote 40240333-REV2.exeStatic PE information: section name: .text entropy: 7.9695231978994645
                      Source: 0.2.Quote 40240333-REV2.exe.3b2e600.3.raw.unpack, Il70KH1AlpVN64jn1u.csHigh entropy of concatenated method names: 'sf6V1D8da6', 'eCEVMcXLr0', 'ToString', 'T1GV2E9Gv9', 'PAmVNXbNue', 'OYrV4TTqlr', 'rxbV7yOk39', 'm3nVYyDmRe', 'MfBVmGyOqG', 'pguV8DrbS2'
                      Source: 0.2.Quote 40240333-REV2.exe.3b2e600.3.raw.unpack, PSrR5vzfyM4vxyCmp2.csHigh entropy of concatenated method names: 'm1wxdf0MV9', 'JAexo2X2a1', 'n1jxUuQn8D', 'qbLxaC2DiP', 'hLIxyQFBAi', 'GjyxApH42S', 'KZxxIAfHNO', 'o7axbGRsVP', 'VfaxnKEoWA', 'YOmxGOb0nv'
                      Source: 0.2.Quote 40240333-REV2.exe.3b2e600.3.raw.unpack, Xun3SM7OM2ESEFSXK4.csHigh entropy of concatenated method names: 'lmUY9G6S8R', 'iyoYNHHJV1', 'm5hY7QrMKi', 'qDRYmtQ7dD', 'yOpY8dnRZC', 'eom7OX33b1', 'PDv7eOjBi0', 'kfx7Ejh3EK', 'foA7HKuWnc', 'vRw73TaZhP'
                      Source: 0.2.Quote 40240333-REV2.exe.3b2e600.3.raw.unpack, sP0OykUMUJvA8plM5d.csHigh entropy of concatenated method names: 'lds6akSHbZ', 'djx6yZTNpA', 'nqE6lyCVXb', 'LOv6AORrOl', 'Y7d6IHknGa', 'VCu6fwp5lV', 'FZJ6tsseVs', 'dJH6jCrPIf', 'GIT60AaUap', 'Uwa6PkhwJb'
                      Source: 0.2.Quote 40240333-REV2.exe.3b2e600.3.raw.unpack, MtjSgdCjepWUaljo2A.csHigh entropy of concatenated method names: 'hd0w9pj7R5', 'yWNw2bXni3', 'roCwN1yI0E', 'NpKw439ESn', 'JvZw7jgV2X', 'dCnwYAQbcw', 'O7BwmcpKPF', 'rwsw8QSjNF', 'voMwpLpKWP', 'HWAw1SLoyS'
                      Source: 0.2.Quote 40240333-REV2.exe.3b2e600.3.raw.unpack, KoQBxmrTX3CuwDM5nPM.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'ECqF6av7FC', 'GrgFxPjtlT', 'KNaFRUoQa6', 'cNRFFSejVN', 'jvAFq4snaG', 'coOFZb0Dmn', 'FDVFbvHoxZ'
                      Source: 0.2.Quote 40240333-REV2.exe.3b2e600.3.raw.unpack, mrkLfkde6G0Jl1OAZW.csHigh entropy of concatenated method names: 'HGymnjt2g9', 'NrpmGv2iuc', 'LuGmgWAppg', 'J5xmDwgWn8', 'b0jmhlIBgg', 'VSnmd88KIm', 'c6Qmugry7J', 'myVmoqfDLh', 'rpVmUyToCm', 'PlTmXCJ1q8'
                      Source: 0.2.Quote 40240333-REV2.exe.3b2e600.3.raw.unpack, tZ7v35E7yX1oMKH99v.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'dK053iSxDX', 'XTn5rX7at6', 'PEp5zXfYcX', 'CQ0wLN5mr6', 'AwYwK61Pjy', 'qNjw50WL0T', 'JIQwwPo1PK', 'zCsgt97divMYBpr2iih'
                      Source: 0.2.Quote 40240333-REV2.exe.3b2e600.3.raw.unpack, gCifpVeZ5lwJHLHpPB.csHigh entropy of concatenated method names: 'D4AgaAKbO', 'aIXDdFYPF', 'aM4d6O7BE', 'oEOuoyFEG', 'VmAU5utUN', 'metXh28ES', 'vCaEtKa2pnHk9fYorT', 'JVTxwsOc15sJW1hCxa', 'CluWA1Eyk', 'aDBx0hDfr'
                      Source: 0.2.Quote 40240333-REV2.exe.3b2e600.3.raw.unpack, okV60aK4gpuFxTOK3M.csHigh entropy of concatenated method names: 'cMCNsin5un', 'MGDNByNTtW', 'fZDNQTxuah', 'goiNSoC8UD', 'fxPNOR6iNA', 'xo4NeUjoM3', 'Gx5NEs3yjL', 'apuNH1sBVe', 'TTDN3FrAOW', 'FtgNrq16Mo'
                      Source: 0.2.Quote 40240333-REV2.exe.3b2e600.3.raw.unpack, tyxWFS9Fwivryyxbe2.csHigh entropy of concatenated method names: 'ISOVHC5ybH', 'j4hVrnOKC5', 'HdSWLbln4v', 'NvdWKhEmjL', 'z7XVieLjDm', 'PWwVCuRQRH', 'LAtVTgyIu4', 'DqxVso8DY3', 'vfDVBVqPDS', 'AtpVQHDs1o'
                      Source: 0.2.Quote 40240333-REV2.exe.3b2e600.3.raw.unpack, wKXWTZ5Pvclwisldhs.csHigh entropy of concatenated method names: 'WlukP5sunt', 'wGgkCQkxEH', 'wGoksXc7sJ', 'BSMkBQtalD', 'EfHkyo5VCR', 'XXMklZ9L9n', 'Ti6kAxsr2s', 'n4ykIZ4ey3', 'SyckfM99vL', 'xaIktpikoP'
                      Source: 0.2.Quote 40240333-REV2.exe.3b2e600.3.raw.unpack, DcVXb8ryLOdycXcuV9T.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'bMpxi60bwW', 'iSvxCnt9HB', 'zWPxTIsAGY', 'jU9xsCaSg8', 'lAVxB5iq10', 'J3gxQl57om', 'vtaxSqUM43'
                      Source: 0.2.Quote 40240333-REV2.exe.3b2e600.3.raw.unpack, obEIAhrerfnU3285cGB.csHigh entropy of concatenated method names: 'ToString', 'L2NRoQ5RGT', 'dcqRU6x6jN', 'sCERXFI6mv', 'BlxRahc48L', 'jUWRyJ7W7L', 'ksTRlCGuIS', 'vH7RAObdRr', 'oudm2fMBfAD3pKC0wH9', 'u8t3qQMMGomggyuDhai'
                      Source: 0.2.Quote 40240333-REV2.exe.3b2e600.3.raw.unpack, dXXKCgayT4vMbks2WF.csHigh entropy of concatenated method names: 'WJAJodVm72', 'tdqJUwXNCS', 'W5bJaSsB09', 'YAlJyybX7O', 'af5JAAFMkp', 'vIiJIOrXgM', 'WZlJtkNm2f', 'EedJjfnYTT', 'pM5JPIrfdy', 'fvIJiHcgaK'
                      Source: 0.2.Quote 40240333-REV2.exe.3b2e600.3.raw.unpack, jmfCAGHI8FrKDlfv9b.csHigh entropy of concatenated method names: 'sDR4DAK9H7', 'RWI4dMskJh', 'zCu4oHmIxT', 'dtk4UOjrC5', 'NlG4kuHBjQ', 'o8t4cTR79T', 'fxL4VkZSA0', 'o9N4W9cPMU', 'HJE46bby3S', 'Nxb4xpRGrE'
                      Source: 0.2.Quote 40240333-REV2.exe.3b2e600.3.raw.unpack, cfWA0kSlb2JTbGHnBE.csHigh entropy of concatenated method names: 'OB8x4CUFKH', 'SWhx7b5Y2a', 'yYtxYIdUgJ', 'zafxmivWMN', 'Kakx6xr6s3', 'oYGx8vr47D', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 0.2.Quote 40240333-REV2.exe.3b2e600.3.raw.unpack, banXtCtI63bcECrQ1o.csHigh entropy of concatenated method names: 'TUG7hQKYqG', 'E8D7uGIHVc', 'LJK4l0EJXP', 'fCP4AIglZd', 'Sib4IYDKSE', 'CGL4fDbfQq', 'K694tOuC29', 'LDc4jkM6TT', 'u4s40nK0DH', 'Agi4Pxtk5E'
                      Source: 0.2.Quote 40240333-REV2.exe.3b2e600.3.raw.unpack, pb0JMxjMuntwoaTYmX.csHigh entropy of concatenated method names: 'f7R6k9qhXa', 'sDw6VhlxTL', 'Y8j66LQvax', 'm766RfiM3R', 'ap66qVr8i0', 'XYe6b2o8v0', 'Dispose', 'qPSW237TWx', 'xRpWN2U45Z', 'SipW4CXjEy'
                      Source: 0.2.Quote 40240333-REV2.exe.3b2e600.3.raw.unpack, cHYuVbwyrlmJ7rW6Vo.csHigh entropy of concatenated method names: 'Dispose', 'r6iK30ko1X', 'htp5y4IchL', 'ktSFOP0scs', 'HJWKrmBZgm', 'l09KzNuRfN', 'ProcessDialogKey', 'D6P5LEA75i', 'VYw5K1C12F', 'DuD55Qq1aN'
                      Source: 0.2.Quote 40240333-REV2.exe.3b2e600.3.raw.unpack, x7Z4YsTb1oA62vRQeQ.csHigh entropy of concatenated method names: 'H7RKmYbr6i', 'SF1K8t4HoI', 'ONEK1TEmd7', 'cLKKMJQSZO', 'pmkKklmNhE', 'jsSKcBHO4G', 'QmwliKeTTImox2QSIs', 'NBbdueopawnxNi3tVt', 'ihXKKe6sjI', 'mtGKwDI6XW'
                      Source: 0.2.Quote 40240333-REV2.exe.3b2e600.3.raw.unpack, iSSAocrrO13RrmMXa4F.csHigh entropy of concatenated method names: 'LxBxrVlQ62', 'eGYxzg1f8O', 'meuRLHd6ws', 'AwiRKJBWv1', 'f5JR5kTl5H', 'mLkRwtwnQ2', 'CCdRvcNlFg', 'xxJR9dVl2c', 'jpfR2arDcx', 'JY0RNdtiVB'
                      Source: 0.2.Quote 40240333-REV2.exe.7330000.5.raw.unpack, Il70KH1AlpVN64jn1u.csHigh entropy of concatenated method names: 'sf6V1D8da6', 'eCEVMcXLr0', 'ToString', 'T1GV2E9Gv9', 'PAmVNXbNue', 'OYrV4TTqlr', 'rxbV7yOk39', 'm3nVYyDmRe', 'MfBVmGyOqG', 'pguV8DrbS2'
                      Source: 0.2.Quote 40240333-REV2.exe.7330000.5.raw.unpack, PSrR5vzfyM4vxyCmp2.csHigh entropy of concatenated method names: 'm1wxdf0MV9', 'JAexo2X2a1', 'n1jxUuQn8D', 'qbLxaC2DiP', 'hLIxyQFBAi', 'GjyxApH42S', 'KZxxIAfHNO', 'o7axbGRsVP', 'VfaxnKEoWA', 'YOmxGOb0nv'
                      Source: 0.2.Quote 40240333-REV2.exe.7330000.5.raw.unpack, Xun3SM7OM2ESEFSXK4.csHigh entropy of concatenated method names: 'lmUY9G6S8R', 'iyoYNHHJV1', 'm5hY7QrMKi', 'qDRYmtQ7dD', 'yOpY8dnRZC', 'eom7OX33b1', 'PDv7eOjBi0', 'kfx7Ejh3EK', 'foA7HKuWnc', 'vRw73TaZhP'
                      Source: 0.2.Quote 40240333-REV2.exe.7330000.5.raw.unpack, sP0OykUMUJvA8plM5d.csHigh entropy of concatenated method names: 'lds6akSHbZ', 'djx6yZTNpA', 'nqE6lyCVXb', 'LOv6AORrOl', 'Y7d6IHknGa', 'VCu6fwp5lV', 'FZJ6tsseVs', 'dJH6jCrPIf', 'GIT60AaUap', 'Uwa6PkhwJb'
                      Source: 0.2.Quote 40240333-REV2.exe.7330000.5.raw.unpack, MtjSgdCjepWUaljo2A.csHigh entropy of concatenated method names: 'hd0w9pj7R5', 'yWNw2bXni3', 'roCwN1yI0E', 'NpKw439ESn', 'JvZw7jgV2X', 'dCnwYAQbcw', 'O7BwmcpKPF', 'rwsw8QSjNF', 'voMwpLpKWP', 'HWAw1SLoyS'
                      Source: 0.2.Quote 40240333-REV2.exe.7330000.5.raw.unpack, KoQBxmrTX3CuwDM5nPM.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'ECqF6av7FC', 'GrgFxPjtlT', 'KNaFRUoQa6', 'cNRFFSejVN', 'jvAFq4snaG', 'coOFZb0Dmn', 'FDVFbvHoxZ'
                      Source: 0.2.Quote 40240333-REV2.exe.7330000.5.raw.unpack, mrkLfkde6G0Jl1OAZW.csHigh entropy of concatenated method names: 'HGymnjt2g9', 'NrpmGv2iuc', 'LuGmgWAppg', 'J5xmDwgWn8', 'b0jmhlIBgg', 'VSnmd88KIm', 'c6Qmugry7J', 'myVmoqfDLh', 'rpVmUyToCm', 'PlTmXCJ1q8'
                      Source: 0.2.Quote 40240333-REV2.exe.7330000.5.raw.unpack, tZ7v35E7yX1oMKH99v.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'dK053iSxDX', 'XTn5rX7at6', 'PEp5zXfYcX', 'CQ0wLN5mr6', 'AwYwK61Pjy', 'qNjw50WL0T', 'JIQwwPo1PK', 'zCsgt97divMYBpr2iih'
                      Source: 0.2.Quote 40240333-REV2.exe.7330000.5.raw.unpack, gCifpVeZ5lwJHLHpPB.csHigh entropy of concatenated method names: 'D4AgaAKbO', 'aIXDdFYPF', 'aM4d6O7BE', 'oEOuoyFEG', 'VmAU5utUN', 'metXh28ES', 'vCaEtKa2pnHk9fYorT', 'JVTxwsOc15sJW1hCxa', 'CluWA1Eyk', 'aDBx0hDfr'
                      Source: 0.2.Quote 40240333-REV2.exe.7330000.5.raw.unpack, okV60aK4gpuFxTOK3M.csHigh entropy of concatenated method names: 'cMCNsin5un', 'MGDNByNTtW', 'fZDNQTxuah', 'goiNSoC8UD', 'fxPNOR6iNA', 'xo4NeUjoM3', 'Gx5NEs3yjL', 'apuNH1sBVe', 'TTDN3FrAOW', 'FtgNrq16Mo'
                      Source: 0.2.Quote 40240333-REV2.exe.7330000.5.raw.unpack, tyxWFS9Fwivryyxbe2.csHigh entropy of concatenated method names: 'ISOVHC5ybH', 'j4hVrnOKC5', 'HdSWLbln4v', 'NvdWKhEmjL', 'z7XVieLjDm', 'PWwVCuRQRH', 'LAtVTgyIu4', 'DqxVso8DY3', 'vfDVBVqPDS', 'AtpVQHDs1o'
                      Source: 0.2.Quote 40240333-REV2.exe.7330000.5.raw.unpack, wKXWTZ5Pvclwisldhs.csHigh entropy of concatenated method names: 'WlukP5sunt', 'wGgkCQkxEH', 'wGoksXc7sJ', 'BSMkBQtalD', 'EfHkyo5VCR', 'XXMklZ9L9n', 'Ti6kAxsr2s', 'n4ykIZ4ey3', 'SyckfM99vL', 'xaIktpikoP'
                      Source: 0.2.Quote 40240333-REV2.exe.7330000.5.raw.unpack, DcVXb8ryLOdycXcuV9T.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'bMpxi60bwW', 'iSvxCnt9HB', 'zWPxTIsAGY', 'jU9xsCaSg8', 'lAVxB5iq10', 'J3gxQl57om', 'vtaxSqUM43'
                      Source: 0.2.Quote 40240333-REV2.exe.7330000.5.raw.unpack, obEIAhrerfnU3285cGB.csHigh entropy of concatenated method names: 'ToString', 'L2NRoQ5RGT', 'dcqRU6x6jN', 'sCERXFI6mv', 'BlxRahc48L', 'jUWRyJ7W7L', 'ksTRlCGuIS', 'vH7RAObdRr', 'oudm2fMBfAD3pKC0wH9', 'u8t3qQMMGomggyuDhai'
                      Source: 0.2.Quote 40240333-REV2.exe.7330000.5.raw.unpack, dXXKCgayT4vMbks2WF.csHigh entropy of concatenated method names: 'WJAJodVm72', 'tdqJUwXNCS', 'W5bJaSsB09', 'YAlJyybX7O', 'af5JAAFMkp', 'vIiJIOrXgM', 'WZlJtkNm2f', 'EedJjfnYTT', 'pM5JPIrfdy', 'fvIJiHcgaK'
                      Source: 0.2.Quote 40240333-REV2.exe.7330000.5.raw.unpack, jmfCAGHI8FrKDlfv9b.csHigh entropy of concatenated method names: 'sDR4DAK9H7', 'RWI4dMskJh', 'zCu4oHmIxT', 'dtk4UOjrC5', 'NlG4kuHBjQ', 'o8t4cTR79T', 'fxL4VkZSA0', 'o9N4W9cPMU', 'HJE46bby3S', 'Nxb4xpRGrE'
                      Source: 0.2.Quote 40240333-REV2.exe.7330000.5.raw.unpack, cfWA0kSlb2JTbGHnBE.csHigh entropy of concatenated method names: 'OB8x4CUFKH', 'SWhx7b5Y2a', 'yYtxYIdUgJ', 'zafxmivWMN', 'Kakx6xr6s3', 'oYGx8vr47D', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 0.2.Quote 40240333-REV2.exe.7330000.5.raw.unpack, banXtCtI63bcECrQ1o.csHigh entropy of concatenated method names: 'TUG7hQKYqG', 'E8D7uGIHVc', 'LJK4l0EJXP', 'fCP4AIglZd', 'Sib4IYDKSE', 'CGL4fDbfQq', 'K694tOuC29', 'LDc4jkM6TT', 'u4s40nK0DH', 'Agi4Pxtk5E'
                      Source: 0.2.Quote 40240333-REV2.exe.7330000.5.raw.unpack, pb0JMxjMuntwoaTYmX.csHigh entropy of concatenated method names: 'f7R6k9qhXa', 'sDw6VhlxTL', 'Y8j66LQvax', 'm766RfiM3R', 'ap66qVr8i0', 'XYe6b2o8v0', 'Dispose', 'qPSW237TWx', 'xRpWN2U45Z', 'SipW4CXjEy'
                      Source: 0.2.Quote 40240333-REV2.exe.7330000.5.raw.unpack, cHYuVbwyrlmJ7rW6Vo.csHigh entropy of concatenated method names: 'Dispose', 'r6iK30ko1X', 'htp5y4IchL', 'ktSFOP0scs', 'HJWKrmBZgm', 'l09KzNuRfN', 'ProcessDialogKey', 'D6P5LEA75i', 'VYw5K1C12F', 'DuD55Qq1aN'
                      Source: 0.2.Quote 40240333-REV2.exe.7330000.5.raw.unpack, x7Z4YsTb1oA62vRQeQ.csHigh entropy of concatenated method names: 'H7RKmYbr6i', 'SF1K8t4HoI', 'ONEK1TEmd7', 'cLKKMJQSZO', 'pmkKklmNhE', 'jsSKcBHO4G', 'QmwliKeTTImox2QSIs', 'NBbdueopawnxNi3tVt', 'ihXKKe6sjI', 'mtGKwDI6XW'
                      Source: 0.2.Quote 40240333-REV2.exe.7330000.5.raw.unpack, iSSAocrrO13RrmMXa4F.csHigh entropy of concatenated method names: 'LxBxrVlQ62', 'eGYxzg1f8O', 'meuRLHd6ws', 'AwiRKJBWv1', 'f5JR5kTl5H', 'mLkRwtwnQ2', 'CCdRvcNlFg', 'xxJR9dVl2c', 'jpfR2arDcx', 'JY0RNdtiVB'

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: Quote 40240333-REV2.exe PID: 7920, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeMemory allocated: E90000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeMemory allocated: 28F0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeMemory allocated: E90000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeMemory allocated: 7760000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeMemory allocated: 8760000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeMemory allocated: 8910000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeMemory allocated: 9910000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeMemory allocated: 2B10000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeMemory allocated: 2D70000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeMemory allocated: 2B90000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7402Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1173Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeWindow / User API: threadDelayed 2227Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeWindow / User API: threadDelayed 7541Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7940Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7516Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7368Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7500Thread sleep count: 2227 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep count: 35 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -32281802128991695s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -100000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -99873s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -99764s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -99656s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7500Thread sleep count: 7541 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -99547s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -99437s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -99328s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -99219s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -99094s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -98984s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -98875s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -98759s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -98555s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -98434s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -98328s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -98219s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -98110s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -97985s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -97860s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -97735s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -97610s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -97485s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -97360s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -97235s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -97110s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -96985s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -96860s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -96735s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -96610s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -96485s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -96360s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -96235s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -96110s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -95985s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -95860s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -95735s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -95610s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -95485s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -95360s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -95235s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -95110s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -94985s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -94860s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -94735s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -94610s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -94485s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -94359s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -94247s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -94140s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exe TID: 7540Thread sleep time: -94032s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 100000Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 99873Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 99764Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 99656Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 99547Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 99437Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 99328Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 99219Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 99094Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 98984Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 98875Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 98759Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 98555Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 98434Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 98328Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 98219Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 98110Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 97985Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 97860Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 97735Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 97610Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 97485Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 97360Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 97235Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 97110Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 96985Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 96860Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 96735Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 96610Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 96485Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 96360Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 96235Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 96110Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 95985Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 95860Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 95735Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 95610Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 95485Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 95360Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 95235Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 95110Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 94985Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 94860Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 94735Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 94610Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 94485Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 94359Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 94247Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 94140Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeThread delayed: delay time: 94032Jump to behavior
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1723461800.0000000000A32000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: Quote 40240333-REV2.exe, 00000000.00000002.1723461800.0000000000A32000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                      Source: Quote 40240333-REV2.exe, 00000006.00000002.2946051783.0000000006210000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 40240333-REV2.exe"
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 40240333-REV2.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeMemory written: C:\Users\user\Desktop\Quote 40240333-REV2.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 40240333-REV2.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess created: C:\Users\user\Desktop\Quote 40240333-REV2.exe "C:\Users\user\Desktop\Quote 40240333-REV2.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess created: C:\Users\user\Desktop\Quote 40240333-REV2.exe "C:\Users\user\Desktop\Quote 40240333-REV2.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeProcess created: C:\Users\user\Desktop\Quote 40240333-REV2.exe "C:\Users\user\Desktop\Quote 40240333-REV2.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Users\user\Desktop\Quote 40240333-REV2.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\DUBAI-LIGHT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\flat_officeFontsPreview.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Users\user\Desktop\Quote 40240333-REV2.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 00000006.00000002.2943118351.0000000002D71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Quote 40240333-REV2.exe PID: 8144, type: MEMORYSTR
                      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quote 40240333-REV2.exe.3aea000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.Quote 40240333-REV2.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quote 40240333-REV2.exe.3aea000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000006.00000002.2940553325.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1730144520.00000000038F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: C:\Users\user\Desktop\Quote 40240333-REV2.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: Yara matchFile source: 00000006.00000002.2943118351.0000000002D71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Quote 40240333-REV2.exe PID: 8144, type: MEMORYSTR
                      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 00000006.00000002.2943118351.0000000002D71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Quote 40240333-REV2.exe PID: 8144, type: MEMORYSTR
                      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quote 40240333-REV2.exe.3aea000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.Quote 40240333-REV2.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quote 40240333-REV2.exe.3aea000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Quote 40240333-REV2.exe.3ac0fe0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000006.00000002.2940553325.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1730144520.00000000038F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      111
                      Process Injection
                      1
                      Masquerading
                      2
                      OS Credential Dumping
                      111
                      Security Software Discovery
                      Remote Services1
                      Email Collection
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      11
                      Disable or Modify Tools
                      1
                      Credentials in Registry
                      1
                      Process Discovery
                      Remote Desktop Protocol11
                      Archive Collected Data
                      1
                      Non-Standard Port
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)141
                      Virtualization/Sandbox Evasion
                      Security Account Manager141
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin Shares2
                      Data from Local System
                      1
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                      Process Injection
                      NTDS1
                      Application Window Discovery
                      Distributed Component Object ModelInput Capture11
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets1
                      File and Directory Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                      Obfuscated Files or Information
                      Cached Domain Credentials24
                      System Information Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                      Software Packing
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      DLL Side-Loading
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1558213 Sample: Quote 40240333-REV2.exe Startdate: 19/11/2024 Architecture: WINDOWS Score: 100 26 mail.mbarieservicesltd.com 2->26 28 fp2e7a.wpc.phicdn.net 2->28 30 fp2e7a.wpc.2be4.phicdn.net 2->30 34 Found malware configuration 2->34 36 Multi AV Scanner detection for submitted file 2->36 38 Yara detected AgentTesla 2->38 40 8 other signatures 2->40 8 Quote 40240333-REV2.exe 4 2->8         started        signatures3 process4 file5 24 C:\Users\user\...\Quote 40240333-REV2.exe.log, ASCII 8->24 dropped 42 Adds a directory exclusion to Windows Defender 8->42 44 Injects a PE file into a foreign processes 8->44 12 Quote 40240333-REV2.exe 2 8->12         started        16 powershell.exe 23 8->16         started        18 Quote 40240333-REV2.exe 8->18         started        20 Quote 40240333-REV2.exe 8->20         started        signatures6 process7 dnsIp8 32 mail.mbarieservicesltd.com 199.79.62.115, 587 PUBLIC-DOMAIN-REGISTRYUS United States 12->32 46 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 12->46 48 Tries to steal Mail credentials (via file / registry access) 12->48 50 Tries to harvest and steal ftp login credentials 12->50 52 Tries to harvest and steal browser information (history, passwords, etc) 12->52 54 Loading BitLocker PowerShell Module 16->54 22 conhost.exe 16->22         started        signatures9 process10

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      Quote 40240333-REV2.exe34%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                      Quote 40240333-REV2.exe30%VirustotalBrowse
                      Quote 40240333-REV2.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      mail.mbarieservicesltd.com
                      199.79.62.115
                      truefalse
                        high
                        fp2e7a.wpc.phicdn.net
                        192.229.221.95
                        truefalse
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://www.apache.org/licenses/LICENSE-2.0Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.comQuote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.com/designersGQuote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.com/designers/?Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.founder.com.cn/cn/bTheQuote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.fontbureau.com/designers?Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.tiro.comQuote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.fontbureau.com/designersQuote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.goodfont.co.krQuote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name8Quote 40240333-REV2.exe, 00000000.00000002.1728971288.00000000028F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.carterandcone.comlQuote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.sajatypeworks.comQuote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.typography.netDQuote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.fontbureau.com/designers/cabarga.htmlNQuote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.founder.com.cn/cn/cTheQuote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.galapagosdesign.com/staff/dennis.htmQuote 40240333-REV2.exe, 00000000.00000002.1732919995.0000000005250000.00000004.00000020.00020000.00000000.sdmp, Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.founder.com.cn/cnQuote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.fontbureau.com/designers/frere-user.htmlQuote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.jiyu-kobo.co.jp/Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://www.galapagosdesign.com/DPleaseQuote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://www.fontbureau.com/designers8Quote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://www.fonts.comQuote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://www.sandoll.co.krQuote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://www.urwpp.deDPleaseQuote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://www.zhongyicts.com.cnQuote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://www.sakkal.comQuote 40240333-REV2.exe, 00000000.00000002.1733427590.0000000006A62000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://mail.mbarieservicesltd.comQuote 40240333-REV2.exe, 00000006.00000002.2943118351.0000000002DCA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                • No. of IPs < 25%
                                                                                • 25% < No. of IPs < 50%
                                                                                • 50% < No. of IPs < 75%
                                                                                • 75% < No. of IPs
                                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                                199.79.62.115
                                                                                mail.mbarieservicesltd.comUnited States
                                                                                394695PUBLIC-DOMAIN-REGISTRYUSfalse
                                                                                Joe Sandbox version:41.0.0 Charoite
                                                                                Analysis ID:1558213
                                                                                Start date and time:2024-11-19 07:24:06 +01:00
                                                                                Joe Sandbox product:CloudBasic
                                                                                Overall analysis duration:0h 5m 49s
                                                                                Hypervisor based Inspection enabled:false
                                                                                Report type:full
                                                                                Cookbook file name:default.jbs
                                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                Number of analysed new started processes analysed:12
                                                                                Number of new started drivers analysed:0
                                                                                Number of existing processes analysed:0
                                                                                Number of existing drivers analysed:0
                                                                                Number of injected processes analysed:0
                                                                                Technologies:
                                                                                • HCA enabled
                                                                                • EGA enabled
                                                                                • AMSI enabled
                                                                                Analysis Mode:default
                                                                                Analysis stop reason:Timeout
                                                                                Sample name:Quote 40240333-REV2.exe
                                                                                Detection:MAL
                                                                                Classification:mal100.troj.spyw.evad.winEXE@10/6@3/1
                                                                                EGA Information:
                                                                                • Successful, ratio: 100%
                                                                                HCA Information:
                                                                                • Successful, ratio: 97%
                                                                                • Number of executed functions: 38
                                                                                • Number of non-executed functions: 10
                                                                                Cookbook Comments:
                                                                                • Found application associated with file extension: .exe
                                                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, login.live.com, ocsp.edge.digicert.com, ctldl.windowsupdate.com
                                                                                • Not all processes where analyzed, report is missing behavior information
                                                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                • Report size getting too big, too many NtCreateKey calls found.
                                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                TimeTypeDescription
                                                                                01:24:59API Interceptor192x Sleep call for process: Quote 40240333-REV2.exe modified
                                                                                01:25:01API Interceptor10x Sleep call for process: powershell.exe modified
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                199.79.62.115PO ALJAT-5804-2024.exeGet hashmaliciousAgentTeslaBrowse
                                                                                  INQ#84790.exeGet hashmaliciousAgentTeslaBrowse
                                                                                    LPO24.0524.exeGet hashmaliciousAgentTeslaBrowse
                                                                                      1364. 2024.exeGet hashmaliciousAgentTeslaBrowse
                                                                                        Quote_220072.exeGet hashmaliciousAgentTeslaBrowse
                                                                                          TT Copy.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                            24-17745.exeGet hashmaliciousAgentTeslaBrowse
                                                                                              PO# 4507573387.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                                                                PO-000041522.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                  MA2402201136.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    mail.mbarieservicesltd.comPO ALJAT-5804-2024.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                    • 199.79.62.115
                                                                                                    INQ#84790.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                    • 199.79.62.115
                                                                                                    LPO24.0524.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                    • 199.79.62.115
                                                                                                    1364. 2024.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                    • 199.79.62.115
                                                                                                    Quote_220072.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                    • 199.79.62.115
                                                                                                    TT Copy.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                    • 199.79.62.115
                                                                                                    24-17745.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                    • 199.79.62.115
                                                                                                    PO# 4507573387.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                                                                    • 199.79.62.115
                                                                                                    PO-000041522.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                    • 199.79.62.115
                                                                                                    fp2e7a.wpc.phicdn.netBOMB-762.msiGet hashmaliciousAteraAgentBrowse
                                                                                                    • 192.229.221.95
                                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                                    • 192.229.221.95
                                                                                                    https://website-70396.convertflowpages.com/firstmarkinsuranceGet hashmaliciousHTMLPhisherBrowse
                                                                                                    • 192.229.221.95
                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                    • 192.229.221.95
                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                    • 192.229.221.95
                                                                                                    http://tayakay.comGet hashmaliciousUnknownBrowse
                                                                                                    • 192.229.221.95
                                                                                                    ADZP 20 Complex.exeGet hashmaliciousBabadeda, WiperBrowse
                                                                                                    • 192.229.221.95
                                                                                                    Discord_updater_rCURRENT.exeGet hashmaliciousUnknownBrowse
                                                                                                    • 192.229.221.95
                                                                                                    KKXT7bY8bG.exeGet hashmaliciousUnknownBrowse
                                                                                                    • 192.229.221.95
                                                                                                    3236484822156923570.jsGet hashmaliciousStrela DownloaderBrowse
                                                                                                    • 192.229.221.95
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    PUBLIC-DOMAIN-REGISTRYUSDOCS.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                    • 207.174.215.249
                                                                                                    Ksciarillo_Reord_Adjustment.docxGet hashmaliciousUnknownBrowse
                                                                                                    • 208.91.198.81
                                                                                                    Ksciarillo_Reord_Adjustment.docxGet hashmaliciousUnknownBrowse
                                                                                                    • 208.91.198.81
                                                                                                    NoteID [4962398] _Secure_Document_Mrettinger-46568.docxGet hashmaliciousHTMLPhisherBrowse
                                                                                                    • 208.91.198.81
                                                                                                    SOA.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                    • 207.174.215.249
                                                                                                    SFL OP990M3 PO.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                    • 208.91.198.107
                                                                                                    nuevo orden.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                    • 208.91.199.224
                                                                                                    PO ALJAT-5804-2024.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                    • 199.79.62.115
                                                                                                    INQ#84790.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                    • 199.79.62.115
                                                                                                    https://u34251876.ct.sendgrid.net/ls/click?upn=u001.ordJ57g0HVndDa8Km-2BVUUFN1eIn5tdzIxrKbgsGfF9eVdl7b-2Fab-2BrUBdfIXH9yijR5LLM7kgivkgUI3nC3VajM00UDrq4ekI2XREqo0QmHcHyDyYWomvx9-2FHEtQ3o5rBM9AHzVSsjnwFSEJqic-2BEtw-3D-3DBxNa_qINdfz5Lp8EahgxJXfgGV-2Bk7caEgTUs2gtUTKNMgBkZ9mbVIMd-2B1UUN0TqdRRGrocW81C18onNWNx5Y6KM88Rr7odKCqMhALUPuUbXGlkOo01sEKeKdphXRhykHXKfSB-2By1s-2BNAgCL9-2BbtY8LNaKNV0sXQnlv-2F9fA-2BLZtaeadaVGHb32bFHhcOwS3ltfr2dig92MY6M8DrwwYiolgI1k4Q-3D-3DGet hashmaliciousUnknownBrowse
                                                                                                    • 216.10.246.48
                                                                                                    No context
                                                                                                    No context
                                                                                                    Process:C:\Users\user\Desktop\Quote 40240333-REV2.exe
                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1216
                                                                                                    Entropy (8bit):5.34331486778365
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                                                    MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                                                    SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                                                    SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                                                    SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                                                    Malicious:true
                                                                                                    Reputation:high, very likely benign file
                                                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1172
                                                                                                    Entropy (8bit):5.354777075714867
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:3gWSKco4KmZjKbmOIKod6lss4RP8mZ9tEoUEJ0gt/NKIl9iaku:QWSU4xympgv4RUmZ9tEoUl8NDr
                                                                                                    MD5:E65E0A41A1AF021B7C85A2311F0910F4
                                                                                                    SHA1:F4DD7243918581677DE1F23B38F2D50F04A5CBF5
                                                                                                    SHA-256:7645C16FB1EAD11772AC744027B6C2BCC78816F713F5B8F27C54ACC2C42E181B
                                                                                                    SHA-512:A1EC04AAE1EC6CD668F9CD8872F7DDECB6BD6003AB2772DED58048F2947963658C0450837835F983B73808838104BEC8D9F1F94D956E1D5BEEFE24D980779D28
                                                                                                    Malicious:false
                                                                                                    Reputation:low
                                                                                                    Preview:@...e.................................,..............@..........P................1]...E...........(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.8..................1...L..U;V.<}........System.Numerics.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Reputation:high, very likely benign file
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Reputation:high, very likely benign file
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):60
                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                    Malicious:false
                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                    Entropy (8bit):7.963964840557605
                                                                                                    TrID:
                                                                                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                    • Windows Screen Saver (13104/52) 0.07%
                                                                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                    File name:Quote 40240333-REV2.exe
                                                                                                    File size:720'384 bytes
                                                                                                    MD5:560a144b63de4457304d88add688500b
                                                                                                    SHA1:e1fdd08d768f5a0170e9ff354b9f75a5c533506f
                                                                                                    SHA256:76ee39157442dc28e64f089260ca42ec5374ae2fccb99d0940b9717e48e6dc86
                                                                                                    SHA512:4a03eb701d34a2b793599868218a3886267d115652d82f3c565dc4564315979961f9146a3c15611cb861f728fbad8fde4900430ebc023ec3f3d2b80cb8a2f69a
                                                                                                    SSDEEP:12288:XGgjKo7xzZtRkvkMce/X4wWI7H8fT2tJ8PYGDWl77uh5j:XGLo7ZZtRksyeB6txTo5
                                                                                                    TLSH:38E4238EB36C5FB2C53E1BF2102212D463BEF036463AEA8E2CC591EA5D31B185B51D57
                                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....;g..............0......"........... ........@.. .......................@............@................................
                                                                                                    Icon Hash:e33425174edb3931
                                                                                                    Entrypoint:0x4af9be
                                                                                                    Entrypoint Section:.text
                                                                                                    Digitally signed:false
                                                                                                    Imagebase:0x400000
                                                                                                    Subsystem:windows gui
                                                                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                    Time Stamp:0x673BE1D7 [Tue Nov 19 00:54:47 2024 UTC]
                                                                                                    TLS Callbacks:
                                                                                                    CLR (.Net) Version:
                                                                                                    OS Version Major:4
                                                                                                    OS Version Minor:0
                                                                                                    File Version Major:4
                                                                                                    File Version Minor:0
                                                                                                    Subsystem Version Major:4
                                                                                                    Subsystem Version Minor:0
                                                                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                                    Instruction
                                                                                                    jmp dword ptr [00402000h]
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    add byte ptr [eax], al
                                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xaf96c0x4f.text
                                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xb00000x1fe8.rsrc
                                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xb20000xc.reloc
                                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                    .text0x20000xad9c40xada0007d42d849e8572c9fb148d4e7517b701False0.9663820644348452data7.9695231978994645IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                    .rsrc0xb00000x1fe80x20009f77a17c862b272795fb026e16aabe35False0.8568115234375data7.48552690185582IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                    .reloc0xb20000xc0x200781448f5165a54589ed45ab1100b1273False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                    RT_ICON0xb01000x18dfPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9715721689963877
                                                                                                    RT_GROUP_ICON0xb19f00x14data1.05
                                                                                                    RT_VERSION0xb1a140x3d4data0.39693877551020407
                                                                                                    RT_MANIFEST0xb1df80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                                    DLLImport
                                                                                                    mscoree.dll_CorExeMain
                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                    Nov 19, 2024 07:25:05.666455984 CET49742587192.168.2.4199.79.62.115
                                                                                                    Nov 19, 2024 07:25:06.666943073 CET49742587192.168.2.4199.79.62.115
                                                                                                    Nov 19, 2024 07:25:08.667089939 CET49742587192.168.2.4199.79.62.115
                                                                                                    Nov 19, 2024 07:25:12.667141914 CET49742587192.168.2.4199.79.62.115
                                                                                                    Nov 19, 2024 07:25:20.666959047 CET49742587192.168.2.4199.79.62.115
                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                    Nov 19, 2024 07:25:03.509613037 CET5198953192.168.2.41.1.1.1
                                                                                                    Nov 19, 2024 07:25:04.525876045 CET5198953192.168.2.41.1.1.1
                                                                                                    Nov 19, 2024 07:25:05.526621103 CET5198953192.168.2.41.1.1.1
                                                                                                    Nov 19, 2024 07:25:05.658159018 CET53519891.1.1.1192.168.2.4
                                                                                                    Nov 19, 2024 07:25:05.658174038 CET53519891.1.1.1192.168.2.4
                                                                                                    Nov 19, 2024 07:25:05.658181906 CET53519891.1.1.1192.168.2.4
                                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                    Nov 19, 2024 07:25:03.509613037 CET192.168.2.41.1.1.10x2351Standard query (0)mail.mbarieservicesltd.comA (IP address)IN (0x0001)false
                                                                                                    Nov 19, 2024 07:25:04.525876045 CET192.168.2.41.1.1.10x2351Standard query (0)mail.mbarieservicesltd.comA (IP address)IN (0x0001)false
                                                                                                    Nov 19, 2024 07:25:05.526621103 CET192.168.2.41.1.1.10x2351Standard query (0)mail.mbarieservicesltd.comA (IP address)IN (0x0001)false
                                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                    Nov 19, 2024 07:25:05.658159018 CET1.1.1.1192.168.2.40x2351No error (0)mail.mbarieservicesltd.com199.79.62.115A (IP address)IN (0x0001)false
                                                                                                    Nov 19, 2024 07:25:05.658174038 CET1.1.1.1192.168.2.40x2351No error (0)mail.mbarieservicesltd.com199.79.62.115A (IP address)IN (0x0001)false
                                                                                                    Nov 19, 2024 07:25:05.658181906 CET1.1.1.1192.168.2.40x2351No error (0)mail.mbarieservicesltd.com199.79.62.115A (IP address)IN (0x0001)false
                                                                                                    Nov 19, 2024 07:27:05.947524071 CET1.1.1.1192.168.2.40x41abNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                                                                    Nov 19, 2024 07:27:05.947524071 CET1.1.1.1192.168.2.40x41abNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false

                                                                                                    Click to jump to process

                                                                                                    Click to jump to process

                                                                                                    Click to dive into process behavior distribution

                                                                                                    Click to jump to process

                                                                                                    Target ID:0
                                                                                                    Start time:01:24:58
                                                                                                    Start date:19/11/2024
                                                                                                    Path:C:\Users\user\Desktop\Quote 40240333-REV2.exe
                                                                                                    Wow64 process (32bit):true
                                                                                                    Commandline:"C:\Users\user\Desktop\Quote 40240333-REV2.exe"
                                                                                                    Imagebase:0x470000
                                                                                                    File size:720'384 bytes
                                                                                                    MD5 hash:560A144B63DE4457304D88ADD688500B
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Yara matches:
                                                                                                    • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.1730144520.00000000038F9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                    Reputation:low
                                                                                                    Has exited:true

                                                                                                    Target ID:2
                                                                                                    Start time:01:25:00
                                                                                                    Start date:19/11/2024
                                                                                                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    Wow64 process (32bit):true
                                                                                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 40240333-REV2.exe"
                                                                                                    Imagebase:0x330000
                                                                                                    File size:433'152 bytes
                                                                                                    MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:high
                                                                                                    Has exited:true

                                                                                                    Target ID:3
                                                                                                    Start time:01:25:00
                                                                                                    Start date:19/11/2024
                                                                                                    Path:C:\Users\user\Desktop\Quote 40240333-REV2.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:"C:\Users\user\Desktop\Quote 40240333-REV2.exe"
                                                                                                    Imagebase:0x90000
                                                                                                    File size:720'384 bytes
                                                                                                    MD5 hash:560A144B63DE4457304D88ADD688500B
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:low
                                                                                                    Has exited:true

                                                                                                    Target ID:4
                                                                                                    Start time:01:25:00
                                                                                                    Start date:19/11/2024
                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                    Imagebase:0x7ff7699e0000
                                                                                                    File size:862'208 bytes
                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:high
                                                                                                    Has exited:true

                                                                                                    Target ID:5
                                                                                                    Start time:01:25:00
                                                                                                    Start date:19/11/2024
                                                                                                    Path:C:\Users\user\Desktop\Quote 40240333-REV2.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:"C:\Users\user\Desktop\Quote 40240333-REV2.exe"
                                                                                                    Imagebase:0x230000
                                                                                                    File size:720'384 bytes
                                                                                                    MD5 hash:560A144B63DE4457304D88ADD688500B
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:low
                                                                                                    Has exited:true

                                                                                                    Target ID:6
                                                                                                    Start time:01:25:00
                                                                                                    Start date:19/11/2024
                                                                                                    Path:C:\Users\user\Desktop\Quote 40240333-REV2.exe
                                                                                                    Wow64 process (32bit):true
                                                                                                    Commandline:"C:\Users\user\Desktop\Quote 40240333-REV2.exe"
                                                                                                    Imagebase:0x840000
                                                                                                    File size:720'384 bytes
                                                                                                    MD5 hash:560A144B63DE4457304D88ADD688500B
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Yara matches:
                                                                                                    • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000006.00000002.2940553325.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.2943118351.0000000002D71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.2943118351.0000000002D71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                    Reputation:low
                                                                                                    Has exited:false

                                                                                                    Reset < >

                                                                                                      Execution Graph

                                                                                                      Execution Coverage:10.2%
                                                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                                                      Signature Coverage:1.1%
                                                                                                      Total number of Nodes:176
                                                                                                      Total number of Limit Nodes:10
                                                                                                      execution_graph 25537 f3ce10 DuplicateHandle 25538 f3cea6 25537->25538 25539 72bdcc8 25540 72bde53 25539->25540 25542 72bdcee 25539->25542 25542->25540 25543 72b9adc 25542->25543 25544 72bdf48 PostMessageW 25543->25544 25545 72bdfb4 25544->25545 25545->25542 25546 f3bb00 25547 f3bb42 25546->25547 25548 f3bb48 GetModuleHandleW 25546->25548 25547->25548 25549 f3bb75 25548->25549 25550 72bbbdd 25554 72bc941 25550->25554 25571 72bc950 25550->25571 25551 72bbc08 25555 72bc96a 25554->25555 25588 72bd092 25555->25588 25599 72bce13 25555->25599 25604 72bd3dc 25555->25604 25609 72bd23d 25555->25609 25616 72bcc78 25555->25616 25621 72bd764 25555->25621 25626 72bcf05 25555->25626 25631 72bd126 25555->25631 25636 72bd647 25555->25636 25640 72bcf2c 25555->25640 25645 72bcd6c 25555->25645 25650 72bd58a 25555->25650 25658 72bd035 25555->25658 25670 72bcf97 25555->25670 25556 72bc98e 25556->25551 25572 72bc96a 25571->25572 25574 72bd58a 4 API calls 25572->25574 25575 72bcd6c 2 API calls 25572->25575 25576 72bcf2c 2 API calls 25572->25576 25577 72bd647 2 API calls 25572->25577 25578 72bd126 2 API calls 25572->25578 25579 72bcf05 2 API calls 25572->25579 25580 72bd764 2 API calls 25572->25580 25581 72bcc78 2 API calls 25572->25581 25582 72bd23d 4 API calls 25572->25582 25583 72bd3dc 2 API calls 25572->25583 25584 72bce13 2 API calls 25572->25584 25585 72bd092 6 API calls 25572->25585 25586 72bcf97 2 API calls 25572->25586 25587 72bd035 6 API calls 25572->25587 25573 72bc98e 25573->25551 25574->25573 25575->25573 25576->25573 25577->25573 25578->25573 25579->25573 25580->25573 25581->25573 25582->25573 25583->25573 25584->25573 25585->25573 25586->25573 25587->25573 25589 72bd0b0 25588->25589 25683 72bb320 25588->25683 25687 72bb328 25588->25687 25590 72bd755 25589->25590 25592 72bcde8 25589->25592 25691 72bb3e0 25589->25691 25695 72bb3e8 25589->25695 25590->25556 25591 72bcdfa 25591->25556 25592->25591 25675 72bae18 25592->25675 25679 72bae10 25592->25679 25600 72bce19 25599->25600 25699 72bad68 25600->25699 25703 72bad61 25600->25703 25601 72bce3f 25601->25556 25605 72bce2a 25604->25605 25606 72bce3f 25604->25606 25607 72bad68 ResumeThread 25605->25607 25608 72bad61 ResumeThread 25605->25608 25606->25556 25607->25606 25608->25606 25612 72bb3e8 WriteProcessMemory 25609->25612 25613 72bb3e0 WriteProcessMemory 25609->25613 25610 72bcde8 25611 72bcdfa 25610->25611 25614 72bae18 Wow64SetThreadContext 25610->25614 25615 72bae10 Wow64SetThreadContext 25610->25615 25611->25556 25612->25610 25613->25610 25614->25610 25615->25610 25618 72bccbb 25616->25618 25707 72bb669 25618->25707 25711 72bb670 25618->25711 25622 72bcd78 25621->25622 25624 72bb669 CreateProcessA 25622->25624 25625 72bb670 CreateProcessA 25622->25625 25623 72bcdc0 25623->25556 25624->25623 25625->25623 25627 72bcf0e 25626->25627 25629 72bb3e8 WriteProcessMemory 25627->25629 25630 72bb3e0 WriteProcessMemory 25627->25630 25628 72bd107 25628->25556 25629->25628 25630->25628 25632 72bd12b 25631->25632 25633 72bd376 25632->25633 25715 72bd9e8 25632->25715 25720 72bd9d7 25632->25720 25637 72bd671 25636->25637 25725 72bb4d8 25636->25725 25729 72bb4d1 25636->25729 25641 72bcf32 25640->25641 25643 72bb4d8 ReadProcessMemory 25641->25643 25644 72bb4d1 ReadProcessMemory 25641->25644 25642 72bd671 25643->25642 25644->25642 25646 72bcd78 25645->25646 25648 72bb669 CreateProcessA 25646->25648 25649 72bb670 CreateProcessA 25646->25649 25647 72bcdc0 25647->25556 25648->25647 25649->25647 25651 72bd454 25650->25651 25653 72bcde8 25651->25653 25656 72bb3e8 WriteProcessMemory 25651->25656 25657 72bb3e0 WriteProcessMemory 25651->25657 25652 72bcdfa 25652->25556 25653->25652 25654 72bae18 Wow64SetThreadContext 25653->25654 25655 72bae10 Wow64SetThreadContext 25653->25655 25654->25653 25655->25653 25656->25651 25657->25651 25659 72bd0a3 25658->25659 25663 72bcde8 25658->25663 25664 72bb328 VirtualAllocEx 25659->25664 25665 72bb320 VirtualAllocEx 25659->25665 25660 72bcdfa 25660->25556 25661 72bd0b0 25662 72bd755 25661->25662 25661->25663 25668 72bb3e8 WriteProcessMemory 25661->25668 25669 72bb3e0 WriteProcessMemory 25661->25669 25662->25556 25663->25660 25666 72bae18 Wow64SetThreadContext 25663->25666 25667 72bae10 Wow64SetThreadContext 25663->25667 25664->25661 25665->25661 25666->25663 25667->25663 25668->25661 25669->25661 25671 72bcf41 25670->25671 25673 72bb4d8 ReadProcessMemory 25671->25673 25674 72bb4d1 ReadProcessMemory 25671->25674 25672 72bd671 25673->25672 25674->25672 25676 72bae5d Wow64SetThreadContext 25675->25676 25678 72baea5 25676->25678 25678->25592 25680 72bae18 Wow64SetThreadContext 25679->25680 25682 72baea5 25680->25682 25682->25592 25684 72bb328 VirtualAllocEx 25683->25684 25686 72bb3a5 25684->25686 25686->25589 25688 72bb368 VirtualAllocEx 25687->25688 25690 72bb3a5 25688->25690 25690->25589 25692 72bb3e8 WriteProcessMemory 25691->25692 25694 72bb487 25692->25694 25694->25589 25696 72bb430 WriteProcessMemory 25695->25696 25698 72bb487 25696->25698 25698->25589 25700 72bada8 ResumeThread 25699->25700 25702 72badd9 25700->25702 25702->25601 25704 72bad68 ResumeThread 25703->25704 25706 72badd9 25704->25706 25706->25601 25708 72bb670 25707->25708 25708->25708 25709 72bb85e CreateProcessA 25708->25709 25710 72bb8bb 25709->25710 25710->25710 25712 72bb6f9 CreateProcessA 25711->25712 25714 72bb8bb 25712->25714 25714->25714 25716 72bd9fd 25715->25716 25718 72bae18 Wow64SetThreadContext 25716->25718 25719 72bae10 Wow64SetThreadContext 25716->25719 25717 72bda13 25717->25633 25718->25717 25719->25717 25721 72bd9fd 25720->25721 25723 72bae18 Wow64SetThreadContext 25721->25723 25724 72bae10 Wow64SetThreadContext 25721->25724 25722 72bda13 25722->25633 25723->25722 25724->25722 25726 72bb523 ReadProcessMemory 25725->25726 25728 72bb567 25726->25728 25728->25637 25730 72bb4d8 ReadProcessMemory 25729->25730 25732 72bb567 25730->25732 25732->25637 25516 f34668 25517 f3467a 25516->25517 25518 f34686 25517->25518 25520 f34778 25517->25520 25521 f3479d 25520->25521 25525 f34879 25521->25525 25529 f34888 25521->25529 25526 f34888 25525->25526 25527 f3498c 25526->25527 25533 f344c4 25526->25533 25530 f348af 25529->25530 25531 f3498c 25530->25531 25532 f344c4 CreateActCtxA 25530->25532 25532->25531 25534 f35918 CreateActCtxA 25533->25534 25536 f359db 25534->25536 25733 f3cbc8 25734 f3cc0e GetCurrentProcess 25733->25734 25736 f3cc60 GetCurrentThread 25734->25736 25737 f3cc59 25734->25737 25738 f3cc96 25736->25738 25739 f3cc9d GetCurrentProcess 25736->25739 25737->25736 25738->25739 25740 f3ccd3 GetCurrentThreadId 25739->25740 25742 f3cd2c 25740->25742
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1734164323.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_72b0000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 51d31d3ae475c62487e48884685fbc95254948db38b70e9a9fbbed0c5c99ef23
                                                                                                      • Instruction ID: a7a3ebf87a80f63710d6ad0047814531c6853ad9ef12d69a7660393e4e4ed1ae
                                                                                                      • Opcode Fuzzy Hash: 51d31d3ae475c62487e48884685fbc95254948db38b70e9a9fbbed0c5c99ef23
                                                                                                      • Instruction Fuzzy Hash: 8BE1FCB0B106069FDB25DB75C860BEEB7F6AF89380F154469E146CB392CB38E901CB51
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1734164323.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_72b0000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 03e3a1337b0c35a00e80f22a9aefb1e5a7ec9769e7ae574e5e7d60159e350715
                                                                                                      • Instruction ID: b58806476f5b7bf3ab3ac423f0830ead9f0d3c8f5bfa97822692e120ed485c25
                                                                                                      • Opcode Fuzzy Hash: 03e3a1337b0c35a00e80f22a9aefb1e5a7ec9769e7ae574e5e7d60159e350715
                                                                                                      • Instruction Fuzzy Hash: 8A711AB1D24629CFEB24DF66C8447E9BBB6BF89300F10D1EAD409A6250DB705AC5CF50

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 294 f3cbc8-f3cc57 GetCurrentProcess 298 f3cc60-f3cc94 GetCurrentThread 294->298 299 f3cc59-f3cc5f 294->299 300 f3cc96-f3cc9c 298->300 301 f3cc9d-f3ccd1 GetCurrentProcess 298->301 299->298 300->301 302 f3ccd3-f3ccd9 301->302 303 f3ccda-f3ccf2 301->303 302->303 307 f3ccfb-f3cd2a GetCurrentThreadId 303->307 308 f3cd33-f3cd95 307->308 309 f3cd2c-f3cd32 307->309 309->308
                                                                                                      APIs
                                                                                                      • GetCurrentProcess.KERNEL32 ref: 00F3CC46
                                                                                                      • GetCurrentThread.KERNEL32 ref: 00F3CC83
                                                                                                      • GetCurrentProcess.KERNEL32 ref: 00F3CCC0
                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 00F3CD19
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1726693911.0000000000F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F30000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_f30000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Current$ProcessThread
                                                                                                      • String ID:
                                                                                                      • API String ID: 2063062207-0
                                                                                                      • Opcode ID: 71020bdca8257b6fc4f3402ce3da511641c3f45bee77e473f479b3cb416bcd3e
                                                                                                      • Instruction ID: e8e48d376f64aac1300f395808dfb4167853948f6eac7b16710b8f128626ed5f
                                                                                                      • Opcode Fuzzy Hash: 71020bdca8257b6fc4f3402ce3da511641c3f45bee77e473f479b3cb416bcd3e
                                                                                                      • Instruction Fuzzy Hash: 335155B49003498FDB04DFAAD548B9EBBF1EF88314F208459E019B72A0D774A944CB65

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 467 72bb669-72bb705 470 72bb73e-72bb75e 467->470 471 72bb707-72bb711 467->471 478 72bb760-72bb76a 470->478 479 72bb797-72bb7c6 470->479 471->470 472 72bb713-72bb715 471->472 473 72bb738-72bb73b 472->473 474 72bb717-72bb721 472->474 473->470 476 72bb723 474->476 477 72bb725-72bb734 474->477 476->477 477->477 480 72bb736 477->480 478->479 481 72bb76c-72bb76e 478->481 485 72bb7c8-72bb7d2 479->485 486 72bb7ff-72bb8b9 CreateProcessA 479->486 480->473 483 72bb791-72bb794 481->483 484 72bb770-72bb77a 481->484 483->479 487 72bb77e-72bb78d 484->487 488 72bb77c 484->488 485->486 490 72bb7d4-72bb7d6 485->490 499 72bb8bb-72bb8c1 486->499 500 72bb8c2-72bb948 486->500 487->487 489 72bb78f 487->489 488->487 489->483 491 72bb7f9-72bb7fc 490->491 492 72bb7d8-72bb7e2 490->492 491->486 494 72bb7e6-72bb7f5 492->494 495 72bb7e4 492->495 494->494 497 72bb7f7 494->497 495->494 497->491 499->500 510 72bb94a-72bb94e 500->510 511 72bb958-72bb95c 500->511 510->511 512 72bb950 510->512 513 72bb95e-72bb962 511->513 514 72bb96c-72bb970 511->514 512->511 513->514 515 72bb964 513->515 516 72bb972-72bb976 514->516 517 72bb980-72bb984 514->517 515->514 516->517 518 72bb978 516->518 519 72bb996-72bb99d 517->519 520 72bb986-72bb98c 517->520 518->517 521 72bb99f-72bb9ae 519->521 522 72bb9b4 519->522 520->519 521->522 524 72bb9b5 522->524 524->524
                                                                                                      APIs
                                                                                                      • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 072BB8A6
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1734164323.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_72b0000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CreateProcess
                                                                                                      • String ID:
                                                                                                      • API String ID: 963392458-0
                                                                                                      • Opcode ID: bf36b2b2eefa08bf2f057f1502beb4bf8395a57cf47c3710427e3928b4e69a84
                                                                                                      • Instruction ID: dec029260d953d7e7b5fddded408aac36e760baf5584e2305ceb4097d951140a
                                                                                                      • Opcode Fuzzy Hash: bf36b2b2eefa08bf2f057f1502beb4bf8395a57cf47c3710427e3928b4e69a84
                                                                                                      • Instruction Fuzzy Hash: F7A18DB1D1065ADFDF20CF68C841BEDBBB2BF48350F1481A9D849A7280DB749985CF92

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 525 72bb670-72bb705 527 72bb73e-72bb75e 525->527 528 72bb707-72bb711 525->528 535 72bb760-72bb76a 527->535 536 72bb797-72bb7c6 527->536 528->527 529 72bb713-72bb715 528->529 530 72bb738-72bb73b 529->530 531 72bb717-72bb721 529->531 530->527 533 72bb723 531->533 534 72bb725-72bb734 531->534 533->534 534->534 537 72bb736 534->537 535->536 538 72bb76c-72bb76e 535->538 542 72bb7c8-72bb7d2 536->542 543 72bb7ff-72bb8b9 CreateProcessA 536->543 537->530 540 72bb791-72bb794 538->540 541 72bb770-72bb77a 538->541 540->536 544 72bb77e-72bb78d 541->544 545 72bb77c 541->545 542->543 547 72bb7d4-72bb7d6 542->547 556 72bb8bb-72bb8c1 543->556 557 72bb8c2-72bb948 543->557 544->544 546 72bb78f 544->546 545->544 546->540 548 72bb7f9-72bb7fc 547->548 549 72bb7d8-72bb7e2 547->549 548->543 551 72bb7e6-72bb7f5 549->551 552 72bb7e4 549->552 551->551 554 72bb7f7 551->554 552->551 554->548 556->557 567 72bb94a-72bb94e 557->567 568 72bb958-72bb95c 557->568 567->568 569 72bb950 567->569 570 72bb95e-72bb962 568->570 571 72bb96c-72bb970 568->571 569->568 570->571 572 72bb964 570->572 573 72bb972-72bb976 571->573 574 72bb980-72bb984 571->574 572->571 573->574 575 72bb978 573->575 576 72bb996-72bb99d 574->576 577 72bb986-72bb98c 574->577 575->574 578 72bb99f-72bb9ae 576->578 579 72bb9b4 576->579 577->576 578->579 581 72bb9b5 579->581 581->581
                                                                                                      APIs
                                                                                                      • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 072BB8A6
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1734164323.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_72b0000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CreateProcess
                                                                                                      • String ID:
                                                                                                      • API String ID: 963392458-0
                                                                                                      • Opcode ID: 8ea50dc114c6915ca143286abc32623049de5f5a67e15c927b0c4f5d03921761
                                                                                                      • Instruction ID: 5f7fe8e5928d459f42071790693d0562a92442a50ab493500d109aa186ef8aac
                                                                                                      • Opcode Fuzzy Hash: 8ea50dc114c6915ca143286abc32623049de5f5a67e15c927b0c4f5d03921761
                                                                                                      • Instruction Fuzzy Hash: 57917DB1D1065ACFDF20CF68C841BEDBBB2BF48350F148169D849A7290DB749985CF91

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 582 f3590d-f35916 583 f35918-f359d9 CreateActCtxA 582->583 585 f359e2-f35a3c 583->585 586 f359db-f359e1 583->586 593 f35a4b-f35a4f 585->593 594 f35a3e-f35a41 585->594 586->585 595 f35a51-f35a5d 593->595 596 f35a60 593->596 594->593 595->596 598 f35a61 596->598 598->598
                                                                                                      APIs
                                                                                                      • CreateActCtxA.KERNEL32(?), ref: 00F359C9
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1726693911.0000000000F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F30000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_f30000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Create
                                                                                                      • String ID:
                                                                                                      • API String ID: 2289755597-0
                                                                                                      • Opcode ID: ead7d944b9a7378b18cd1bdd3ebb3b4cb5e7cd64c4715c6f559e2ca4d4cef7bb
                                                                                                      • Instruction ID: 3a7ee97a9c56acc31f35aa3ab9314297fe8a5d391d128752ae28231ad207e029
                                                                                                      • Opcode Fuzzy Hash: ead7d944b9a7378b18cd1bdd3ebb3b4cb5e7cd64c4715c6f559e2ca4d4cef7bb
                                                                                                      • Instruction Fuzzy Hash: BF41D0B0C00719CBDB24CFA9C884B8EFBF5BF89714F20816AD409AB251DB756945DF91

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 599 f344c4-f359d9 CreateActCtxA 602 f359e2-f35a3c 599->602 603 f359db-f359e1 599->603 610 f35a4b-f35a4f 602->610 611 f35a3e-f35a41 602->611 603->602 612 f35a51-f35a5d 610->612 613 f35a60 610->613 611->610 612->613 615 f35a61 613->615 615->615
                                                                                                      APIs
                                                                                                      • CreateActCtxA.KERNEL32(?), ref: 00F359C9
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1726693911.0000000000F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F30000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_f30000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Create
                                                                                                      • String ID:
                                                                                                      • API String ID: 2289755597-0
                                                                                                      • Opcode ID: 504902dd3502a4f0119f4a10aa28eb8c4ce0f9186a5c190259e7911430af1fa0
                                                                                                      • Instruction ID: 27259f1fea827660194983b8ba9b0ca6361a6551dfe2d4c0efb9e1467f1cd749
                                                                                                      • Opcode Fuzzy Hash: 504902dd3502a4f0119f4a10aa28eb8c4ce0f9186a5c190259e7911430af1fa0
                                                                                                      • Instruction Fuzzy Hash: 1941F3B0C0071DCBDB24CFA9C884B8EBBF5BF88714F20816AD409AB251DB756945DF90

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 616 72bb3e0-72bb436 619 72bb438-72bb444 616->619 620 72bb446-72bb485 WriteProcessMemory 616->620 619->620 622 72bb48e-72bb4be 620->622 623 72bb487-72bb48d 620->623 623->622
                                                                                                      APIs
                                                                                                      • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 072BB478
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1734164323.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_72b0000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: MemoryProcessWrite
                                                                                                      • String ID:
                                                                                                      • API String ID: 3559483778-0
                                                                                                      • Opcode ID: 6302d689efb73058a401a520f9f948a48f56fbcc79476c0972ae58bf3b6db658
                                                                                                      • Instruction ID: 8fec8c36d27640f052ae3ce194c08f72eed3ccf05ec97447645d62062fdb53c1
                                                                                                      • Opcode Fuzzy Hash: 6302d689efb73058a401a520f9f948a48f56fbcc79476c0972ae58bf3b6db658
                                                                                                      • Instruction Fuzzy Hash: 062135B19003499FCB10CFAAC885BDEBFF5FF48310F14842AE958A7241D778A955CBA5

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 627 72bb3e8-72bb436 629 72bb438-72bb444 627->629 630 72bb446-72bb485 WriteProcessMemory 627->630 629->630 632 72bb48e-72bb4be 630->632 633 72bb487-72bb48d 630->633 633->632
                                                                                                      APIs
                                                                                                      • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 072BB478
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1734164323.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_72b0000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: MemoryProcessWrite
                                                                                                      • String ID:
                                                                                                      • API String ID: 3559483778-0
                                                                                                      • Opcode ID: 2f5d376ea5552f26948a5311bb97cfef6a77f92315c5fb4faccc98b0b83ed0c9
                                                                                                      • Instruction ID: dded889ef15762f43bb1364bafc90bcdc1f696ea5d12b7f6b9e72bf9c227041e
                                                                                                      • Opcode Fuzzy Hash: 2f5d376ea5552f26948a5311bb97cfef6a77f92315c5fb4faccc98b0b83ed0c9
                                                                                                      • Instruction Fuzzy Hash: 4A2136B19003499FCF10DFAAC885BDEBBF5FF48310F10842AE919A7240C778A954DBA5

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 648 72bb4d1-72bb565 ReadProcessMemory 652 72bb56e-72bb59e 648->652 653 72bb567-72bb56d 648->653 653->652
                                                                                                      APIs
                                                                                                      • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 072BB558
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1734164323.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_72b0000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: MemoryProcessRead
                                                                                                      • String ID:
                                                                                                      • API String ID: 1726664587-0
                                                                                                      • Opcode ID: dcbc8ab4a69ffbd32ddb402c165361666b871bc6f9ccfcb93b849901018715be
                                                                                                      • Instruction ID: 03518a873bd927039be6599d70aec700e8cfcd95ca1ef9ca2189ecb3c35dc32d
                                                                                                      • Opcode Fuzzy Hash: dcbc8ab4a69ffbd32ddb402c165361666b871bc6f9ccfcb93b849901018715be
                                                                                                      • Instruction Fuzzy Hash: 512136B18003499FCB10DFAAC885AEEFBF5FF48310F50842AE959A7240C774A941DBA5

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 637 72bae10-72bae63 640 72bae73-72baea3 Wow64SetThreadContext 637->640 641 72bae65-72bae71 637->641 643 72baeac-72baedc 640->643 644 72baea5-72baeab 640->644 641->640 644->643
                                                                                                      APIs
                                                                                                      • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 072BAE96
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1734164323.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_72b0000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ContextThreadWow64
                                                                                                      • String ID:
                                                                                                      • API String ID: 983334009-0
                                                                                                      • Opcode ID: fbd39018fd06679f8dff8d6b92138776e5080982cd77164ab1643570b24bc62f
                                                                                                      • Instruction ID: 37b7c20d3a2f3c41b6eaa1a16a24cc7d6226b5ed7e7cd9b520ce44e6f4fe5a67
                                                                                                      • Opcode Fuzzy Hash: fbd39018fd06679f8dff8d6b92138776e5080982cd77164ab1643570b24bc62f
                                                                                                      • Instruction Fuzzy Hash: 882166B19003498FDB10DFAAC484BEEBBF4AF88324F14842AD459A7241C778A944CBA5
                                                                                                      APIs
                                                                                                      • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 072BB558
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1734164323.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_72b0000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: MemoryProcessRead
                                                                                                      • String ID:
                                                                                                      • API String ID: 1726664587-0
                                                                                                      • Opcode ID: 8cc1e0e1b5148ad9c8f994dffa520ad9bac3023fd3ee069e231de448cd998b0e
                                                                                                      • Instruction ID: dd9e7cbcb794e68e550a7b8d88521c3c7dfbf5fe1cf922e60f65c0fc0cff1e71
                                                                                                      • Opcode Fuzzy Hash: 8cc1e0e1b5148ad9c8f994dffa520ad9bac3023fd3ee069e231de448cd998b0e
                                                                                                      • Instruction Fuzzy Hash: CC2137B1C003499FCB10DFAAC885AEEFBF5FF48320F50842AE519A7240C7789945DBA5

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 657 72bae18-72bae63 659 72bae73-72baea3 Wow64SetThreadContext 657->659 660 72bae65-72bae71 657->660 662 72baeac-72baedc 659->662 663 72baea5-72baeab 659->663 660->659 663->662
                                                                                                      APIs
                                                                                                      • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 072BAE96
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1734164323.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_72b0000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ContextThreadWow64
                                                                                                      • String ID:
                                                                                                      • API String ID: 983334009-0
                                                                                                      • Opcode ID: 22ab9cbccbf8a6bfcd4bf4b9ea64d3ca5c56e75bdb7fc7e4d73160f832fabba5
                                                                                                      • Instruction ID: 0134198f70ce377354e4dcdb3788dbb6b49bd991dfda46b42ad79b9ce4bc202b
                                                                                                      • Opcode Fuzzy Hash: 22ab9cbccbf8a6bfcd4bf4b9ea64d3ca5c56e75bdb7fc7e4d73160f832fabba5
                                                                                                      • Instruction Fuzzy Hash: C62137B1D003098FDB10DFAAC485BEEBBF5EB88320F54842AD519A7241CB789945CFA5
                                                                                                      APIs
                                                                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00F3CE97
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1726693911.0000000000F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F30000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_f30000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: DuplicateHandle
                                                                                                      • String ID:
                                                                                                      • API String ID: 3793708945-0
                                                                                                      • Opcode ID: a3f818b0deac9f02695b5b1bededf6affb9f94772be99c015748580ff4a5e87a
                                                                                                      • Instruction ID: aa2fe2239e869ddf1e8d4e691918d87a2e7f6a8a60fd60626063c58d0130787d
                                                                                                      • Opcode Fuzzy Hash: a3f818b0deac9f02695b5b1bededf6affb9f94772be99c015748580ff4a5e87a
                                                                                                      • Instruction Fuzzy Hash: 5021C4B5D002489FDB10CF9AD984ADEFBF5EB48320F14841AE918A3351D374A954DFA5
                                                                                                      APIs
                                                                                                      • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 072BB396
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1734164323.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_72b0000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AllocVirtual
                                                                                                      • String ID:
                                                                                                      • API String ID: 4275171209-0
                                                                                                      • Opcode ID: 2159821d5766308a2644edcccd6ee4ab1fc0397126a2eed760e1f235efb611d3
                                                                                                      • Instruction ID: c32ccf93ffde0b358e0e7bf9c72220f347f2217019319f54399f036ff899a33c
                                                                                                      • Opcode Fuzzy Hash: 2159821d5766308a2644edcccd6ee4ab1fc0397126a2eed760e1f235efb611d3
                                                                                                      • Instruction Fuzzy Hash: 39116AB18002499FCB10DFA9C844ADFFFF5EF48310F148819E559A7250C7759544CFA1
                                                                                                      APIs
                                                                                                      • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 072BB396
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1734164323.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_72b0000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AllocVirtual
                                                                                                      • String ID:
                                                                                                      • API String ID: 4275171209-0
                                                                                                      • Opcode ID: 033d53d7c05ecf0f0ee191e3a3df69637bc11a9bcb60f16317ead253b86a8e5b
                                                                                                      • Instruction ID: 907a9e9fdd4563e6a1a3bf86cafe371f99d54d5ae19c09215ba8f95ddfb9f048
                                                                                                      • Opcode Fuzzy Hash: 033d53d7c05ecf0f0ee191e3a3df69637bc11a9bcb60f16317ead253b86a8e5b
                                                                                                      • Instruction Fuzzy Hash: 5C1126B19002499FCB10DFAAC845ADEFFF5EB88320F248819E519A7250C775A944DFA5
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1734164323.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_72b0000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ResumeThread
                                                                                                      • String ID:
                                                                                                      • API String ID: 947044025-0
                                                                                                      • Opcode ID: e956e51140c835e725d9f6ca1407d098d5e579c32f0ce0e04fd684f9a0508794
                                                                                                      • Instruction ID: 2f5cf17734bccafbd2d6ad810febe8ad4949ed4f6e298444ec92efbd9c8ecf9d
                                                                                                      • Opcode Fuzzy Hash: e956e51140c835e725d9f6ca1407d098d5e579c32f0ce0e04fd684f9a0508794
                                                                                                      • Instruction Fuzzy Hash: 341176B180034A8FCB20DFAAC4457DEFFF5EF88320F24881AD459A7240CB74A944CB94
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1734164323.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_72b0000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ResumeThread
                                                                                                      • String ID:
                                                                                                      • API String ID: 947044025-0
                                                                                                      • Opcode ID: 17410e4334de7ef308ad44b5a4fba6b2f363e5fdd46b7ca0b4dcc93c0ed94c15
                                                                                                      • Instruction ID: b11d57f84ac2b3b0ac7f723b1977beeb7f0f8e9971677eae1caae82135d03ead
                                                                                                      • Opcode Fuzzy Hash: 17410e4334de7ef308ad44b5a4fba6b2f363e5fdd46b7ca0b4dcc93c0ed94c15
                                                                                                      • Instruction Fuzzy Hash: 6E1136B1D003498FDB20DFAAC445BDEFBF5EB88324F64881AD519A7240CB75A944CFA5
                                                                                                      APIs
                                                                                                      • PostMessageW.USER32(?,00000010,00000000,?), ref: 072BDFA5
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1734164323.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_72b0000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: MessagePost
                                                                                                      • String ID:
                                                                                                      • API String ID: 410705778-0
                                                                                                      • Opcode ID: fcd41e0c26b3e6b261556eb85673d4c3c5c6ba8e1e625f053aedb75c77f4865c
                                                                                                      • Instruction ID: 522fa683a697e4d5c9aa76358e9274131509f8298d13cbb963daabfacefe764b
                                                                                                      • Opcode Fuzzy Hash: fcd41e0c26b3e6b261556eb85673d4c3c5c6ba8e1e625f053aedb75c77f4865c
                                                                                                      • Instruction Fuzzy Hash: 651106B58043499FDB10DF99C989BDEFFF8EB48314F10845AE958A3240C375A544CFA5
                                                                                                      APIs
                                                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00F3BB66
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1726693911.0000000000F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F30000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_f30000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: HandleModule
                                                                                                      • String ID:
                                                                                                      • API String ID: 4139908857-0
                                                                                                      • Opcode ID: cba46ab5c1dfb5f7e319bf74d391deaff53f7a4976377f22b9d28276be357ffc
                                                                                                      • Instruction ID: 74a9d2176205aaccead420285267695d1b6029893eab2be89c214873bef3e00a
                                                                                                      • Opcode Fuzzy Hash: cba46ab5c1dfb5f7e319bf74d391deaff53f7a4976377f22b9d28276be357ffc
                                                                                                      • Instruction Fuzzy Hash: 0E11DFB6C003498FDB10DF9AC844A9EFBF5AB88320F10845AD519A7250C775A945CFA5
                                                                                                      APIs
                                                                                                      • PostMessageW.USER32(?,00000010,00000000,?), ref: 072BDFA5
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1734164323.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_72b0000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: MessagePost
                                                                                                      • String ID:
                                                                                                      • API String ID: 410705778-0
                                                                                                      • Opcode ID: 2e62d0b896a9e5552c8d81fd5b5fdd5dcad766fac5253aab74b4d3b4b4f4ad13
                                                                                                      • Instruction ID: 23f3ce6fdf1beed2c1602daf9e9bdb36dc508e0398cee177bb029902a97689ad
                                                                                                      • Opcode Fuzzy Hash: 2e62d0b896a9e5552c8d81fd5b5fdd5dcad766fac5253aab74b4d3b4b4f4ad13
                                                                                                      • Instruction Fuzzy Hash: D51106B59143499FDB20DF99C449BDEFBF8EB48310F108459E518A7640C3B5A944CFA1
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1720776716.000000000099D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0099D000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_99d000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 20f6679534bbdded02d12a49cbb2b2dacc3dfe90cfdd38c7926d952e2920836c
                                                                                                      • Instruction ID: 69e69fabee37a3624433f0ea999b768dca0a014f993dcec03e72a8fb451d33b5
                                                                                                      • Opcode Fuzzy Hash: 20f6679534bbdded02d12a49cbb2b2dacc3dfe90cfdd38c7926d952e2920836c
                                                                                                      • Instruction Fuzzy Hash: B2213AB1505204DFDF05DF18D9C4B26BF69FB94324F24C56DD90A0B2A6C33AE856C7A2
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1720776716.000000000099D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0099D000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_99d000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: b3d2b957ea8d21e09ffc5a0fcddd7fd9bbfe60a74b87a2ba687c01a84d3cafc4
                                                                                                      • Instruction ID: 3b3b8717242e0877044913e0411cbd562777738bc43be8a1a18c55955d66869d
                                                                                                      • Opcode Fuzzy Hash: b3d2b957ea8d21e09ffc5a0fcddd7fd9bbfe60a74b87a2ba687c01a84d3cafc4
                                                                                                      • Instruction Fuzzy Hash: D3213A71505240DFDF05DF18D9C0B26BF65FB98318F24C569E8090B25AC33AD856C7A2
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1722030057.00000000009AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009AD000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9ad000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 7f4e916f17b104cd43e1bbf3a855a4e4864c4966a5ae3677ad4584cdc9a738ee
                                                                                                      • Instruction ID: c371726e8ec85bdb5e89458fe65c8b0c8c85ae394d3d2c0004dc547de8c113dc
                                                                                                      • Opcode Fuzzy Hash: 7f4e916f17b104cd43e1bbf3a855a4e4864c4966a5ae3677ad4584cdc9a738ee
                                                                                                      • Instruction Fuzzy Hash: FD21F2B5605200DFDB14DF24D9C4B26BBA5FB99314F24C96DD80B4B796C33AD807CAA1
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1722030057.00000000009AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009AD000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9ad000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: b70241f6ca9e352d94acaa746d58fe34bccccb5befa0e90f947c33f390c9224d
                                                                                                      • Instruction ID: e838aa18aef46d3d769af590d156e1ff9fd92f567053a5e6bd9160675fae58dc
                                                                                                      • Opcode Fuzzy Hash: b70241f6ca9e352d94acaa746d58fe34bccccb5befa0e90f947c33f390c9224d
                                                                                                      • Instruction Fuzzy Hash: E921F2B5605200EFDB05DF14D9C4B26BBA5FB95314F24CA6DEC1B4B692C33AD806CBA1
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1722030057.00000000009AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009AD000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9ad000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 5d09bc15ca4a29964078dca4c00af1333d5cd0270c1b175cc6d71016bd754aa8
                                                                                                      • Instruction ID: 3886a0901d69e02e9ed251ff342a8f6331bdfd50b24a86f5b6e3c1793d2ff3a3
                                                                                                      • Opcode Fuzzy Hash: 5d09bc15ca4a29964078dca4c00af1333d5cd0270c1b175cc6d71016bd754aa8
                                                                                                      • Instruction Fuzzy Hash: 2A219375509380CFDB16CF24D994715BF71EB46314F28C5DAD84A8B697C33AD80ACBA2
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1720776716.000000000099D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0099D000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_99d000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 3d7739f24a7f613363dc0741c1dd4920fb0d2c4cd1d09143030fc2081c46ff73
                                                                                                      • Instruction ID: 16b5cea9f25e0b59acc7b2de788acd5c40c8d97d26836c72780f5ecf37ba70b4
                                                                                                      • Opcode Fuzzy Hash: 3d7739f24a7f613363dc0741c1dd4920fb0d2c4cd1d09143030fc2081c46ff73
                                                                                                      • Instruction Fuzzy Hash: 38112676504240CFDF02CF04D5C4B16BF72FB94324F24C2A9D8090B2A6C33AE85ACBA1
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1720776716.000000000099D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0099D000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_99d000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 3d7739f24a7f613363dc0741c1dd4920fb0d2c4cd1d09143030fc2081c46ff73
                                                                                                      • Instruction ID: 7875ef1e4e081cab872dc8cff896de98c03cec9e2f1f2463679762eb5760e04d
                                                                                                      • Opcode Fuzzy Hash: 3d7739f24a7f613363dc0741c1dd4920fb0d2c4cd1d09143030fc2081c46ff73
                                                                                                      • Instruction Fuzzy Hash: 6011E676504280CFDF16CF14D5C4B16BF72FB94324F24C6A9E8494B65AC336D85ACBA2
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1722030057.00000000009AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009AD000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_9ad000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 5bc96cb8dbab4a459d35c79ebbe5ba2a9dff6c5f08df11ade35b896c854f64ae
                                                                                                      • Instruction ID: 575121eaa9d6068bbe18ad0997acd2c09adbdb7189ccfb5520e46948a5ebea96
                                                                                                      • Opcode Fuzzy Hash: 5bc96cb8dbab4a459d35c79ebbe5ba2a9dff6c5f08df11ade35b896c854f64ae
                                                                                                      • Instruction Fuzzy Hash: 2F11BB75904280DFDB02CF10C5C4B15BBB2FB85324F24C6ADDC4A4B6A6C33AD80ACBA1
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1734164323.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_72b0000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 3cc3c7b2bcbe2f4a0e5ac152147cfe6582b284beb6c1df53f33f3d83b80c765d
                                                                                                      • Instruction ID: a4696cd07b01ad3576406f438d3de2a91468686bc480bd8d2b9db38c62bb318d
                                                                                                      • Opcode Fuzzy Hash: 3cc3c7b2bcbe2f4a0e5ac152147cfe6582b284beb6c1df53f33f3d83b80c765d
                                                                                                      • Instruction Fuzzy Hash: 4DE11EB4E102198FDB14DFA8C5809AEFBF6FF89344F248169E419AB355D730A941CFA0
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1734164323.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_72b0000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 6826f29e78fa82d0d9101e5c0dd5d969a2e051a6f92cc42d17577ba643dd2fcb
                                                                                                      • Instruction ID: 685216cc5936689328f219c097bf9d513e7e0e21bc30a0ace89cd6f6be3014f2
                                                                                                      • Opcode Fuzzy Hash: 6826f29e78fa82d0d9101e5c0dd5d969a2e051a6f92cc42d17577ba643dd2fcb
                                                                                                      • Instruction Fuzzy Hash: C4E10AB4E102198FDB24DFA9C5909AEFBB2FF89344F24C169E415AB355DB30A941CF60
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1734164323.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_72b0000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: e619343168da668fd161663884ea5d437c45d8be431eecb7ea37817dc07e2ba8
                                                                                                      • Instruction ID: b4829f4b7d9dd19cd1399391f63e3ed1addef64a7b1ed528aac632a72ac41dbe
                                                                                                      • Opcode Fuzzy Hash: e619343168da668fd161663884ea5d437c45d8be431eecb7ea37817dc07e2ba8
                                                                                                      • Instruction Fuzzy Hash: 39E11BB4E10219CFDB24DFA9C5809AEFBB2FF89344F248169E554AB355D730A981CF60
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1734164323.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_72b0000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 4beddcae5cc552880b08970306096caf1c89eba36289c72fba03f1d0d8f9a319
                                                                                                      • Instruction ID: ecd54f0d18e13d0f8c1525bd1d4971e86dfa6b22a84910b074dcdfaa8c3588fd
                                                                                                      • Opcode Fuzzy Hash: 4beddcae5cc552880b08970306096caf1c89eba36289c72fba03f1d0d8f9a319
                                                                                                      • Instruction Fuzzy Hash: 18E12AB4E102198FDB24DFA9C5809AEFBB2FF89344F248169E415AB355D731AD81CF60
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1734164323.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_72b0000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: fa2aed9f02e7b4de83547051d47d5ee4c1d76697209661323ec23d1d07ce9141
                                                                                                      • Instruction ID: e006bdfdee839285b1373359c0f3afdfca138d0a00fd4b1de33cb411a205a6a0
                                                                                                      • Opcode Fuzzy Hash: fa2aed9f02e7b4de83547051d47d5ee4c1d76697209661323ec23d1d07ce9141
                                                                                                      • Instruction Fuzzy Hash: 37E1FFB4E102198FDB14DFA9C5809AEFBB6FF89344F248169E419AB355D730AD41CFA0
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1734164323.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_72b0000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: e91334bd99bc6a5a804d17c15afe1eeaee62cfa21072d2cc8e96b7e4e8136169
                                                                                                      • Instruction ID: a741db365890a812f81e07d07c889784883104189c48b1d307139ea117152924
                                                                                                      • Opcode Fuzzy Hash: e91334bd99bc6a5a804d17c15afe1eeaee62cfa21072d2cc8e96b7e4e8136169
                                                                                                      • Instruction Fuzzy Hash: B0D10731D10B5A8ADB01EB64D950A99B7B1FFD5300F20D79AE10937224FB706AD9CB81
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1726693911.0000000000F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F30000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_f30000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: be596f3fbf578d10cfe9dbf84010fca45b5c3e2b43140f8d3255cb69333c62c2
                                                                                                      • Instruction ID: 77db29cf48e1e7f2c57b47522931a1d9e5706dd9f361af1780d6fa856efa699b
                                                                                                      • Opcode Fuzzy Hash: be596f3fbf578d10cfe9dbf84010fca45b5c3e2b43140f8d3255cb69333c62c2
                                                                                                      • Instruction Fuzzy Hash: 6AA1BE72E002098FCF09DFB4D8445DEB7B2FF89320F15456AE805AB262DB35E955DB90
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1734164323.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_72b0000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 18f63f645d8ff5802db927705d45d28eb4513e7f194a1c05200bce5a14af6165
                                                                                                      • Instruction ID: f33f917e5bef4643f1d83ed7567d74cbf419d9490e823246edb0ca5219b8ae7c
                                                                                                      • Opcode Fuzzy Hash: 18f63f645d8ff5802db927705d45d28eb4513e7f194a1c05200bce5a14af6165
                                                                                                      • Instruction Fuzzy Hash: 9FD1F635D10B5A8ADB11EFA4D950A99B7B1FFD5300F20D79AE10937224FB706AD9CB80
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1734164323.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_72b0000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 851baffc1e1e29bba129856197e3ed444059a36cdfa7976130128f06217a274f
                                                                                                      • Instruction ID: 5f09614482ffb24bbe8f4fb56a79465999512373ed57ca037e8f69efd0f474fa
                                                                                                      • Opcode Fuzzy Hash: 851baffc1e1e29bba129856197e3ed444059a36cdfa7976130128f06217a274f
                                                                                                      • Instruction Fuzzy Hash: 515129B0E102198FDB24CFA9C5805AEFBB2FF89340F24C169D418AB355DB309941CFA1
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.1734164323.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_72b0000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 96dac3b0134b56218aabac237a1457060f48265324a12bb61d17ef10f57d4a4c
                                                                                                      • Instruction ID: 5c03ab1bb462ed06e20822411c04ec2c655933016396ab9e5f7fed80f742a5ba
                                                                                                      • Opcode Fuzzy Hash: 96dac3b0134b56218aabac237a1457060f48265324a12bb61d17ef10f57d4a4c
                                                                                                      • Instruction Fuzzy Hash: 005106B4E106198FDB14DFA9C5809AEFBB2FF89344F24816AD418AB355D731A942CF60

                                                                                                      Execution Graph

                                                                                                      Execution Coverage:6.9%
                                                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                                                      Signature Coverage:0%
                                                                                                      Total number of Nodes:26
                                                                                                      Total number of Limit Nodes:5
                                                                                                      execution_graph 20006 2b5bed0 20007 2b5bf16 GetCurrentProcess 20006->20007 20009 2b5bf68 GetCurrentThread 20007->20009 20013 2b5bf61 20007->20013 20010 2b5bfa5 GetCurrentProcess 20009->20010 20011 2b5bf9e 20009->20011 20012 2b5bfdb 20010->20012 20011->20010 20014 2b5c003 GetCurrentThreadId 20012->20014 20013->20009 20015 2b5c034 20014->20015 20016 2b5c118 20017 2b5c119 DuplicateHandle 20016->20017 20018 2b5c1ae 20017->20018 20019 2b58fa8 20020 2b58fad 20019->20020 20021 2b58fcb 20020->20021 20023 2b590f8 20020->20023 20024 2b59102 20023->20024 20025 2b59122 20024->20025 20028 65f2dc8 20024->20028 20032 65f2db8 20024->20032 20025->20020 20030 65f2ddd 20028->20030 20029 65f3028 20029->20025 20030->20029 20031 65f3048 GlobalMemoryStatusEx 20030->20031 20031->20030 20034 65f2ddd 20032->20034 20033 65f3028 20033->20025 20034->20033 20035 65f3048 GlobalMemoryStatusEx 20034->20035 20035->20034

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 291 2b5bec0-2b5bec2 292 2b5bec4-2b5bec8 291->292 293 2b5bec9-2b5bf5f GetCurrentProcess 291->293 292->293 298 2b5bf61-2b5bf67 293->298 299 2b5bf68-2b5bf9c GetCurrentThread 293->299 298->299 300 2b5bfa5-2b5bfd9 GetCurrentProcess 299->300 301 2b5bf9e-2b5bfa4 299->301 302 2b5bfe2-2b5bffd call 2b5c09f 300->302 303 2b5bfdb-2b5bfe1 300->303 301->300 307 2b5c003-2b5c032 GetCurrentThreadId 302->307 303->302 308 2b5c034-2b5c03a 307->308 309 2b5c03b-2b5c09d 307->309 308->309
                                                                                                      APIs
                                                                                                      • GetCurrentProcess.KERNEL32 ref: 02B5BF4E
                                                                                                      • GetCurrentThread.KERNEL32 ref: 02B5BF8B
                                                                                                      • GetCurrentProcess.KERNEL32 ref: 02B5BFC8
                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 02B5C021
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2942745713.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_2b50000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Current$ProcessThread
                                                                                                      • String ID:
                                                                                                      • API String ID: 2063062207-0
                                                                                                      • Opcode ID: 73ccb3b343ce297100b65723a86b23836b1cff2661be36c6f296eb22c91fd74e
                                                                                                      • Instruction ID: fd3df2c31dba0909a530755e2e1e59e9a80e0902522c8778db9b9b30c284d3bb
                                                                                                      • Opcode Fuzzy Hash: 73ccb3b343ce297100b65723a86b23836b1cff2661be36c6f296eb22c91fd74e
                                                                                                      • Instruction Fuzzy Hash: 285175B09003498FDB15DFA9D548BAEBFF1EF48304F208499E409A73A0DB395988CF65

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 316 2b5bed0-2b5bf5f GetCurrentProcess 320 2b5bf61-2b5bf67 316->320 321 2b5bf68-2b5bf9c GetCurrentThread 316->321 320->321 322 2b5bfa5-2b5bfd9 GetCurrentProcess 321->322 323 2b5bf9e-2b5bfa4 321->323 324 2b5bfe2-2b5bffd call 2b5c09f 322->324 325 2b5bfdb-2b5bfe1 322->325 323->322 329 2b5c003-2b5c032 GetCurrentThreadId 324->329 325->324 330 2b5c034-2b5c03a 329->330 331 2b5c03b-2b5c09d 329->331 330->331
                                                                                                      APIs
                                                                                                      • GetCurrentProcess.KERNEL32 ref: 02B5BF4E
                                                                                                      • GetCurrentThread.KERNEL32 ref: 02B5BF8B
                                                                                                      • GetCurrentProcess.KERNEL32 ref: 02B5BFC8
                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 02B5C021
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2942745713.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_2b50000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Current$ProcessThread
                                                                                                      • String ID:
                                                                                                      • API String ID: 2063062207-0
                                                                                                      • Opcode ID: a3a2259cd74a3d428d7d0b8461593387aee59f655afc5a6ec73373593f9dfdbd
                                                                                                      • Instruction ID: 3d674337855e3281d78d55f002c79adf1f9465e9d1a0ce16f42748dea345f26a
                                                                                                      • Opcode Fuzzy Hash: a3a2259cd74a3d428d7d0b8461593387aee59f655afc5a6ec73373593f9dfdbd
                                                                                                      • Instruction Fuzzy Hash: 635144B09003498FDB14DFA9D548BAEBFF5EF48314F208599E409A7390DB355984CF65

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 1268 65f3d88-65f3da3 1269 65f3dcd-65f3dec call 65f25d0 1268->1269 1270 65f3da5-65f3dcc call 65f25c4 1268->1270 1276 65f3dee-65f3df1 1269->1276 1277 65f3df2-65f3e51 1269->1277 1284 65f3e57-65f3ee4 GlobalMemoryStatusEx 1277->1284 1285 65f3e53-65f3e56 1277->1285 1289 65f3eed-65f3f15 1284->1289 1290 65f3ee6-65f3eec 1284->1290 1290->1289
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2946496528.00000000065F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065F0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_65f0000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: cbbaf92a1915612c75d448693a407fde01cfc891d4a5e89f61be150101704fa5
                                                                                                      • Instruction ID: 594cf6d37bf6edc0db7e4881f2401f36aeaa52054a76d37a981c71958cbaedb8
                                                                                                      • Opcode Fuzzy Hash: cbbaf92a1915612c75d448693a407fde01cfc891d4a5e89f61be150101704fa5
                                                                                                      • Instruction Fuzzy Hash: 24413331E143999FCB00CFB9D81069EBFF5EF8A210F0585AAE544E7281DB349945CBE1

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 1293 2b5c110-2b5c112 1294 2b5c114-2b5c118 1293->1294 1295 2b5c119-2b5c1ac DuplicateHandle 1293->1295 1294->1295 1297 2b5c1b5-2b5c1d2 1295->1297 1298 2b5c1ae-2b5c1b4 1295->1298 1298->1297
                                                                                                      APIs
                                                                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02B5C19F
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2942745713.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_2b50000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: DuplicateHandle
                                                                                                      • String ID:
                                                                                                      • API String ID: 3793708945-0
                                                                                                      • Opcode ID: b36c3b904c88fd5f004fad104a276c8e2b1e127fb40284d52a78b13f4fcbe14c
                                                                                                      • Instruction ID: ab8332eea87115f7aa5dbaa991519132a8cc12aca1142bbc53ef61ee2dd557bb
                                                                                                      • Opcode Fuzzy Hash: b36c3b904c88fd5f004fad104a276c8e2b1e127fb40284d52a78b13f4fcbe14c
                                                                                                      • Instruction Fuzzy Hash: A82105B59003089FDB10CFA9D884ADEBFF5EB48310F10805AE918A7350D374A944CFA0

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 1301 2b5c118-2b5c1ac DuplicateHandle 1303 2b5c1b5-2b5c1d2 1301->1303 1304 2b5c1ae-2b5c1b4 1301->1304 1304->1303
                                                                                                      APIs
                                                                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02B5C19F
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2942745713.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_2b50000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: DuplicateHandle
                                                                                                      • String ID:
                                                                                                      • API String ID: 3793708945-0
                                                                                                      • Opcode ID: 61c7887548ba513a63d68b1c9a798d491306f253526e73a359c550d487cbbd34
                                                                                                      • Instruction ID: eb6e7c43d6083f1538959277215d8f7409091b9695a850e3d3575edf0ce10a49
                                                                                                      • Opcode Fuzzy Hash: 61c7887548ba513a63d68b1c9a798d491306f253526e73a359c550d487cbbd34
                                                                                                      • Instruction Fuzzy Hash: 9621E4B59003089FDB10CFAAD984ADEBFF5EB48310F14805AE918A7350D374A944CFA5

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 1307 65f3e70-65f3eae 1308 65f3eb6-65f3ee4 GlobalMemoryStatusEx 1307->1308 1309 65f3eed-65f3f15 1308->1309 1310 65f3ee6-65f3eec 1308->1310 1310->1309
                                                                                                      APIs
                                                                                                      • GlobalMemoryStatusEx.KERNELBASE ref: 065F3ED7
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2946496528.00000000065F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065F0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_65f0000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: GlobalMemoryStatus
                                                                                                      • String ID:
                                                                                                      • API String ID: 1890195054-0
                                                                                                      • Opcode ID: f258a4fd5f0a04c41c567ff1bbd17c41c6a07b4166214a56e5a8916e00bf04ed
                                                                                                      • Instruction ID: e194ebc17861aec52552061ad0f5aaa821c331f0a0f66c7dd98a11ebc5f63327
                                                                                                      • Opcode Fuzzy Hash: f258a4fd5f0a04c41c567ff1bbd17c41c6a07b4166214a56e5a8916e00bf04ed
                                                                                                      • Instruction Fuzzy Hash: 4E1112B1C0025A9BCB10DF9AC844ADEFBF4BF48320F11812AD918A7240D378A944CFA5
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2942237985.000000000298D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0298D000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_298d000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 6ef48c7be6a17c73036b2c0b13c87920e5979034b8cfa5d2923a5d17fabf0842
                                                                                                      • Instruction ID: 38b0b873de0c4ad4f6c2a9f94ab35be00c97a3764918bd3ccec4462b88e134cd
                                                                                                      • Opcode Fuzzy Hash: 6ef48c7be6a17c73036b2c0b13c87920e5979034b8cfa5d2923a5d17fabf0842
                                                                                                      • Instruction Fuzzy Hash: C921D375604204DFDB14EF24D984B26BBA5EB84314F28C96DD80A4B386C33AD407CA71
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2942237985.000000000298D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0298D000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_298d000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: f5b65b1588ab8f6d5fd8dcac5c33fd3c31a6017e3885ca354a492ae66306fc2f
                                                                                                      • Instruction ID: 9a432eb70aa07557f8a7a97e20776d8793ee6b1e50e82cf07c636de1f8edeb7c
                                                                                                      • Opcode Fuzzy Hash: f5b65b1588ab8f6d5fd8dcac5c33fd3c31a6017e3885ca354a492ae66306fc2f
                                                                                                      • Instruction Fuzzy Hash: 5B2181755093C08FDB12DF24D994715BF71EB46214F28C5DAD8898F6A7C33AD80ACB62
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2942158609.000000000297D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0297D000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_297d000_Quote 40240333-REV2.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 1179505cdec67904f89a283f81bd4c4ef81cbf21b33d0b9fe5a6771eaa4e6e47
                                                                                                      • Instruction ID: 10a72ebb2d50fb788222971038ff6abedb6fb5c6cd40f5dac823cfe6fdd3b193
                                                                                                      • Opcode Fuzzy Hash: 1179505cdec67904f89a283f81bd4c4ef81cbf21b33d0b9fe5a6771eaa4e6e47
                                                                                                      • Instruction Fuzzy Hash: 8BF062724043449AEB208A16DC88B66FF9CEF55739F18C55AED4C4A296C3799844CAB1