Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Quote 000002320.exe

Overview

General Information

Sample name:Quote 000002320.exe
Analysis ID:1567092
MD5:470b7a066dc2cfb8966cce007adabeb1
SHA1:63dc22eda43fb5ab4f8742e6a24df819884443f2
SHA256:aa31c3c2ad5f799d3b7d964c05c4a066921ef60aee8b3f96b4c95ba38518c692
Tags:exeuser-threatcat_ch
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Quote 000002320.exe (PID: 3568 cmdline: "C:\Users\user\Desktop\Quote 000002320.exe" MD5: 470B7A066DC2CFB8966CCE007ADABEB1)
    • powershell.exe (PID: 3876 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 000002320.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 4592 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Quote 000002320.exe (PID: 1532 cmdline: "C:\Users\user\Desktop\Quote 000002320.exe" MD5: 470B7A066DC2CFB8966CCE007ADABEB1)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Host": "mail.mbarieservicesltd.com", "Username": "saless@mbarieservicesltd.com", "Password": "     *o9H+18Q4%;M     "}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000005.00000002.3318036070.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000005.00000002.3319832314.0000000002C3A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000005.00000002.3319832314.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000005.00000002.3319832314.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            00000000.00000002.2130932470.0000000003A71000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              Click to see the 5 entries
              SourceRuleDescriptionAuthorStrings
              0.2.Quote 000002320.exe.3b11700.3.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.Quote 000002320.exe.3ae86e0.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                  5.2.Quote 000002320.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    0.2.Quote 000002320.exe.3b11700.3.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                      0.2.Quote 000002320.exe.3ae86e0.0.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security

                        System Summary

                        barindex
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 000002320.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 000002320.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Quote 000002320.exe", ParentImage: C:\Users\user\Desktop\Quote 000002320.exe, ParentProcessId: 3568, ParentProcessName: Quote 000002320.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 000002320.exe", ProcessId: 3876, ProcessName: powershell.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 000002320.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 000002320.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Quote 000002320.exe", ParentImage: C:\Users\user\Desktop\Quote 000002320.exe, ParentProcessId: 3568, ParentProcessName: Quote 000002320.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 000002320.exe", ProcessId: 3876, ProcessName: powershell.exe
                        Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 199.79.62.115, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\Quote 000002320.exe, Initiated: true, ProcessId: 1532, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49707
                        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 000002320.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 000002320.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Quote 000002320.exe", ParentImage: C:\Users\user\Desktop\Quote 000002320.exe, ParentProcessId: 3568, ParentProcessName: Quote 000002320.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 000002320.exe", ProcessId: 3876, ProcessName: powershell.exe
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-12-03T04:05:47.275046+010020301711A Network Trojan was detected192.168.2.549707199.79.62.115587TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-12-03T04:04:11.815106+010028555421A Network Trojan was detected192.168.2.549707199.79.62.115587TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-12-03T04:04:11.815106+010028552451A Network Trojan was detected192.168.2.549707199.79.62.115587TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-12-03T04:05:47.275046+010028397231Malware Command and Control Activity Detected192.168.2.549707199.79.62.115587TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-12-03T04:05:47.275046+010028400321A Network Trojan was detected192.168.2.549707199.79.62.115587TCP

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: Quote 000002320.exeAvira: detected
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "mail.mbarieservicesltd.com", "Username": "saless@mbarieservicesltd.com", "Password": " *o9H+18Q4%;M "}
                        Source: Quote 000002320.exeReversingLabs: Detection: 52%
                        Source: Quote 000002320.exeVirustotal: Detection: 30%Perma Link
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                        Source: Quote 000002320.exeJoe Sandbox ML: detected
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: /log.tmp
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <br>[
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: yyyy-MM-dd HH:mm:ss
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: ]<br>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <br>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Time:
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <br>User Name:
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <br>Computer Name:
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <br>OSFullName:
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <br>CPU:
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <br>RAM:
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <br>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: IP Address:
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <br>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <hr>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: New
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: IP Address:
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: false
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: false
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: false
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: false
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: false
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: false
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: false
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: false
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: false
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: mail.mbarieservicesltd.com
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: saless@mbarieservicesltd.com
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: *o9H+18Q4%;M
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: iinfo@mbarieservicesltd.com
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: false
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: false
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: appdata
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: KTvkzEc
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: KTvkzEc.exe
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: KTvkzEc
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Type
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <br>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <hr>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <br>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <b>[
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: ]</b> (
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: )<br>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {BACK}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {ALT+TAB}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {ALT+F4}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {TAB}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {ESC}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {Win}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {CAPSLOCK}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {KEYUP}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {KEYDOWN}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {KEYLEFT}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {KEYRIGHT}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {DEL}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {END}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {HOME}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {Insert}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {NumLock}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {PageDown}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {PageUp}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {ENTER}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {F1}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {F2}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {F3}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {F4}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {F5}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {F6}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {F7}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {F8}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {F9}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {F10}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {F11}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {F12}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: control
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {CTRL}
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: &amp;
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: &lt;
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: &gt;
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: &quot;
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <br><hr>Copied Text: <br>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <hr>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: logins
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: IE/Edge
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Windows Secure Note
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: 3CCD5499-87A8-4B10-A215-608888DD3B55
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Windows Web Password Credential
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: 154E23D0-C644-4E6F-8CE6-5069272F999F
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Windows Credential Picker Protector
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Web Credentials
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Windows Credentials
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Windows Domain Certificate Credential
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Windows Domain Password Credential
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Windows Extended Credential
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: 00000000-0000-0000-0000-000000000000
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: SchemaId
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: pResourceElement
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: pIdentityElement
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: pPackageSid
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: pAuthenticatorElement
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: IE/Edge
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: UC Browser
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: UCBrowser\
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Login Data
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: journal
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: wow_logins
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Safari for Windows
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \Common Files\Apple\Apple Application Support\plutil.exe
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \Apple Computer\Preferences\keychain.plist
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <array>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <dict>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <string>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: </string>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <string>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: </string>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <data>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: </data>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: -convert xml1 -s -o "
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \fixed_keychain.xml"
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \Microsoft\Credentials\
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \Microsoft\Credentials\
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \Microsoft\Credentials\
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \Microsoft\Credentials\
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \Microsoft\Protect\
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: credential
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: QQ Browser
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Tencent\QQBrowser\User Data
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \Default\EncryptedStorage
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Profile
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \EncryptedStorage
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: entries
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: category
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Password
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: str3
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: str2
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: blob0
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: password_value
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: IncrediMail
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: PopPassword
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: SmtpPassword
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Software\IncrediMail\Identities\
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \Accounts_New
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: PopPassword
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: SmtpPassword
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: SmtpServer
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: EmailAddress
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Eudora
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Software\Qualcomm\Eudora\CommandLine\
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: current
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Settings
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: SavePasswordText
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Settings
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: ReturnAddress
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Falkon Browser
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \falkon\profiles\
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: profiles.ini
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: startProfile=([A-z0-9\/\.\"]+)
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: profiles.ini
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \browsedata.db
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: autofill
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: ClawsMail
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \Claws-mail
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \clawsrc
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \clawsrc
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: passkey0
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: master_passphrase_salt=(.+)
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: master_passphrase_pbkdf2_rounds=(.+)
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \accountrc
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: smtp_server
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: address
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: account
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \passwordstorerc
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: {(.*),(.*)}(.*)
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Flock Browser
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: APPDATA
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \Flock\Browser\
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: signons3.txt
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: DynDns
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: ALLUSERSPROFILE
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Dyn\Updater\config.dyndns
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: username=
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: password=
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: https://account.dyn.com/
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: t6KzXhCh
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: ALLUSERSPROFILE
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Dyn\Updater\daemon.cfg
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: global
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: accounts
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: account.
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: username
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: account.
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: password
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Psi/Psi+
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: name
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: password
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Psi/Psi+
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: APPDATA
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \Psi\profiles
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: APPDATA
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \Psi+\profiles
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \accounts.xml
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \accounts.xml
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: OpenVPN
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Software\OpenVPN-GUI\configs
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Software\OpenVPN-GUI\configs
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Software\OpenVPN-GUI\configs\
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: username
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: auth-data
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: entropy
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: USERPROFILE
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \OpenVPN\config\
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: remote
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: remote
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: NordVPN
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: NordVPN
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: NordVpn.exe*
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: user.config
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: //setting[@name='Username']/value
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: //setting[@name='Password']/value
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: NordVPN
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Private Internet Access
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: %ProgramW6432%
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Private Internet Access\data
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: ProgramFiles(x86)
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \Private Internet Access\data
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \account.json
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: .*"username":"(.*?)"
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: .*"password":"(.*?)"
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Private Internet Access
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: privateinternetaccess.com
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: FileZilla
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: APPDATA
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \FileZilla\recentservers.xml
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: APPDATA
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \FileZilla\recentservers.xml
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <Server>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <Host>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <Host>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: </Host>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <Port>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: </Port>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <User>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <User>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: </User>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <Pass encoding="base64">
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <Pass encoding="base64">
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: </Pass>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <Pass>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <Pass encoding="base64">
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: </Pass>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: CoreFTP
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: SOFTWARE\FTPWare\COREFTP\Sites
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: User
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Host
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Port
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: hdfzpysvpzimorhk
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: WinSCP
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: HostName
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: UserName
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Password
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: PublicKeyFile
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: PortNumber
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: [PRIVATE KEY LOCATION: "{0}"]
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: WinSCP
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: ABCDEF
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Flash FXP
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: port
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: user
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: pass
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: quick.dat
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Sites.dat
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \FlashFXP\
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \FlashFXP\
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: yA36zA48dEhfrvghGRg57h5UlDv3
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: FTP Navigator
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: SystemDrive
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \FTP Navigator\Ftplist.txt
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Server
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Password
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: No Password
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: User
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: SmartFTP
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: APPDATA
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: SmartFTP\Client 2.0\Favorites\Quick Connect
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: WS_FTP
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: appdata
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Ipswitch\WS_FTP\Sites\ws_ftp.ini
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: HOST
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: PWD=
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: PWD=
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: FtpCommander
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: SystemDrive
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: SystemDrive
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \Program Files (x86)\FTP Commander\Ftplist.txt
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: SystemDrive
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \cftp\Ftplist.txt
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander\Ftplist.txt
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: ;Password=
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: ;User=
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: ;Server=
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: ;Port=
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: ;Port=
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: ;Password=
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: ;User=
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: ;Anonymous=
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: FTPGetter
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \FTPGetter\servers.xml
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <server>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <server_ip>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <server_ip>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: </server_ip>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <server_port>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: </server_port>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <server_user_name>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <server_user_name>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: </server_user_name>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <server_user_password>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: <server_user_password>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: </server_user_password>
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: FTPGetter
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: The Bat!
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: appdata
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \The Bat!
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \Account.CFN
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \Account.CFN
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: +-0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Becky!
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: HKEY_CURRENT_USER\Software\RimArts\B2\Settings
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: DataDir
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Folder.lst
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \Mailbox.ini
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Account
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: PassWd
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Account
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: SMTPServer
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Account
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: MailAddress
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Becky!
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Outlook
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Email
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: IMAP Password
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: POP3 Password
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: HTTP Password
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: SMTP Password
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Email
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Email
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Email
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: IMAP Password
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: POP3 Password
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: HTTP Password
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: SMTP Password
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Server
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Windows Mail App
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: COMPlus_legacyCorruptedStateExceptionsPolicy
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Software\Microsoft\ActiveSync\Partners
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Email
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Server
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: SchemaId
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: pResourceElement
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: pIdentityElement
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: pPackageSid
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: pAuthenticatorElement
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: syncpassword
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: mailoutgoing
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: FoxMail
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\FoxmailPreview
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Executable
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\Foxmail\V3.1
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: FoxmailPath
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \Storage\
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \Storage\
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \mail
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \mail
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \Accounts\Account.rec0
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \Accounts\Account.rec0
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \Account.stg
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \Account.stg
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: POP3Host
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: SMTPHost
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: IncomingServer
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Account
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: MailAddress
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Password
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: POP3Password
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Opera Mail
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: opera:
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: abcdefghijklmnopqrstuvwxyz1234567890_-.~!@#$%^&*()[{]}\|';:,<>/?+=
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: PocoMail
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: appdata
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \Pocomail\accounts.ini
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Email
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: POPPass
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: SMTPPass
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: SMTP
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: eM Client
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: eM Client\accounts.dat
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: eM Client
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Accounts
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: "Username":"
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: "Secret":"
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: 72905C47-F4FD-4CF7-A489-4E8121A155BD
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: "ProviderName":"
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: o6806642kbM7c5
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Mailbird
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: SenderIdentities
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Accounts
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \Mailbird\Store\Store.db
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Server_Host
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Accounts
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Email
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Username
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: EncryptedPassword
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Mailbird
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: RealVNC 4.x
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: SOFTWARE\Wow6432Node\RealVNC\WinVNC4
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Password
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: RealVNC 3.x
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: SOFTWARE\RealVNC\vncserver
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Password
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: RealVNC 4.x
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: SOFTWARE\RealVNC\WinVNC4
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Password
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: RealVNC 3.x
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Software\ORL\WinVNC3
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Password
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: TightVNC
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Software\TightVNC\Server
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Password
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: TightVNC
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Software\TightVNC\Server
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: PasswordViewOnly
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: TightVNC ControlPassword
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Software\TightVNC\Server
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: ControlPassword
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: TigerVNC
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Software\TigerVNC\Server
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Password
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: UltraVNC
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: ProgramFiles(x86)
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: passwd
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: UltraVNC
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: ProgramFiles(x86)
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: passwd2
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: UltraVNC
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: ProgramFiles
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: passwd
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: UltraVNC
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: ProgramFiles
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: passwd2
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: UltraVNC
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: ProgramFiles
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \UltraVNC\ultravnc.ini
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: passwd
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: UltraVNC
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: ProgramFiles
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \UltraVNC\ultravnc.ini
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: passwd2
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: UltraVNC
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: ProgramFiles(x86)
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \UltraVNC\ultravnc.ini
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: passwd
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: UltraVNC
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: ProgramFiles(x86)
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: \UltraVNC\ultravnc.ini
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: passwd2
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: JDownloader 2.0
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: JDownloader 2.0\cfg
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: org.jdownloader.settings.AccountSettings.accounts.ejs
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: JDownloader 2.0\cfg
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: jd.controlling.authentication.AuthenticationControllerSettings.list.ejs
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Paltalk
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: Software\A.V.M.\Paltalk NG\common_settings\core\users\creds\
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpackString decryptor: nickname
                        Source: Quote 000002320.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: Quote 000002320.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: Binary string: vgqb.pdbSHA256 source: Quote 000002320.exe
                        Source: Binary string: vgqb.pdb source: Quote 000002320.exe

                        Networking

                        barindex
                        Source: Network trafficSuricata IDS: 2855245 - Severity 1 - ETPRO MALWARE Agent Tesla Exfil via SMTP : 192.168.2.5:49707 -> 199.79.62.115:587
                        Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.5:49707 -> 199.79.62.115:587
                        Source: Network trafficSuricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.5:49707 -> 199.79.62.115:587
                        Source: Network trafficSuricata IDS: 2839723 - Severity 1 - ETPRO MALWARE Win32/Agent Tesla SMTP Activity : 192.168.2.5:49707 -> 199.79.62.115:587
                        Source: Network trafficSuricata IDS: 2840032 - Severity 1 - ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 : 192.168.2.5:49707 -> 199.79.62.115:587
                        Source: global trafficTCP traffic: 192.168.2.5:49707 -> 199.79.62.115:587
                        Source: Joe Sandbox ViewIP Address: 199.79.62.115 199.79.62.115
                        Source: global trafficTCP traffic: 192.168.2.5:49707 -> 199.79.62.115:587
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: global trafficDNS traffic detected: DNS query: mail.mbarieservicesltd.com
                        Source: Quote 000002320.exe, 00000005.00000002.3319832314.0000000002C3A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.mbarieservicesltd.com
                        Source: Quote 000002320.exe, 00000000.00000002.2129333318.0000000002A63000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: C:\Users\user\Desktop\Quote 000002320.exeCode function: 0_2_00C9D3A40_2_00C9D3A4
                        Source: C:\Users\user\Desktop\Quote 000002320.exeCode function: 5_2_011041405_2_01104140
                        Source: C:\Users\user\Desktop\Quote 000002320.exeCode function: 5_2_01104D585_2_01104D58
                        Source: C:\Users\user\Desktop\Quote 000002320.exeCode function: 5_2_011044885_2_01104488
                        Source: C:\Users\user\Desktop\Quote 000002320.exeCode function: 5_2_065056A85_2_065056A8
                        Source: C:\Users\user\Desktop\Quote 000002320.exeCode function: 5_2_06508CB05_2_06508CB0
                        Source: C:\Users\user\Desktop\Quote 000002320.exeCode function: 5_2_0650A5D85_2_0650A5D8
                        Source: C:\Users\user\Desktop\Quote 000002320.exeCode function: 5_2_065025E05_2_065025E0
                        Source: C:\Users\user\Desktop\Quote 000002320.exeCode function: 5_2_0650F2D05_2_0650F2D0
                        Source: C:\Users\user\Desktop\Quote 000002320.exeCode function: 5_2_0650E3105_2_0650E310
                        Source: C:\Users\user\Desktop\Quote 000002320.exeCode function: 5_2_065083E35_2_065083E3
                        Source: Quote 000002320.exe, 00000000.00000002.2130932470.0000000003A39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs Quote 000002320.exe
                        Source: Quote 000002320.exe, 00000000.00000002.2129333318.0000000002A6E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs Quote 000002320.exe
                        Source: Quote 000002320.exe, 00000000.00000000.2067456682.000000000062E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamevgqb.exe6 vs Quote 000002320.exe
                        Source: Quote 000002320.exe, 00000000.00000002.2127739079.0000000000CAE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Quote 000002320.exe
                        Source: Quote 000002320.exe, 00000000.00000002.2140262528.0000000007110000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Quote 000002320.exe
                        Source: Quote 000002320.exe, 00000000.00000002.2130932470.0000000003A71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename7b99aba2-3c62-4861-97de-170caa2c3039.exe4 vs Quote 000002320.exe
                        Source: Quote 000002320.exe, 00000000.00000002.2130932470.0000000003A71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Quote 000002320.exe
                        Source: Quote 000002320.exe, 00000000.00000002.2129333318.0000000002A63000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename7b99aba2-3c62-4861-97de-170caa2c3039.exe4 vs Quote 000002320.exe
                        Source: Quote 000002320.exe, 00000000.00000002.2136520579.00000000053B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs Quote 000002320.exe
                        Source: Quote 000002320.exe, 00000005.00000002.3318254374.0000000000CF9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Quote 000002320.exe
                        Source: Quote 000002320.exe, 00000005.00000002.3318036070.000000000042C000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename7b99aba2-3c62-4861-97de-170caa2c3039.exe4 vs Quote 000002320.exe
                        Source: Quote 000002320.exeBinary or memory string: OriginalFilenamevgqb.exe6 vs Quote 000002320.exe
                        Source: Quote 000002320.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: Quote 000002320.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpack, O.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpack, O.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpack, P.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpack, P.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Quote 000002320.exe.3c39e00.2.raw.unpack, zjW2mc2wd4X5Q0JlMg.csSecurity API names: _0020.SetAccessControl
                        Source: 0.2.Quote 000002320.exe.3c39e00.2.raw.unpack, zjW2mc2wd4X5Q0JlMg.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.Quote 000002320.exe.3c39e00.2.raw.unpack, zjW2mc2wd4X5Q0JlMg.csSecurity API names: _0020.AddAccessRule
                        Source: 0.2.Quote 000002320.exe.7110000.5.raw.unpack, zjW2mc2wd4X5Q0JlMg.csSecurity API names: _0020.SetAccessControl
                        Source: 0.2.Quote 000002320.exe.7110000.5.raw.unpack, zjW2mc2wd4X5Q0JlMg.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.Quote 000002320.exe.7110000.5.raw.unpack, zjW2mc2wd4X5Q0JlMg.csSecurity API names: _0020.AddAccessRule
                        Source: 0.2.Quote 000002320.exe.7110000.5.raw.unpack, fg1l84Dt8aS0rirRpS.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.Quote 000002320.exe.3c39e00.2.raw.unpack, fg1l84Dt8aS0rirRpS.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/6@2/1
                        Source: C:\Users\user\Desktop\Quote 000002320.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Quote 000002320.exe.logJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeMutant created: NULL
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4592:120:WilError_03
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ree3l1it.cln.ps1Jump to behavior
                        Source: Quote 000002320.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: Quote 000002320.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                        Source: C:\Users\user\Desktop\Quote 000002320.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Users\user\Desktop\Quote 000002320.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\Desktop\Quote 000002320.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: Quote 000002320.exeReversingLabs: Detection: 52%
                        Source: Quote 000002320.exeVirustotal: Detection: 30%
                        Source: unknownProcess created: C:\Users\user\Desktop\Quote 000002320.exe "C:\Users\user\Desktop\Quote 000002320.exe"
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 000002320.exe"
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess created: C:\Users\user\Desktop\Quote 000002320.exe "C:\Users\user\Desktop\Quote 000002320.exe"
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 000002320.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess created: C:\Users\user\Desktop\Quote 000002320.exe "C:\Users\user\Desktop\Quote 000002320.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: windowscodecs.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: dwrite.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: vaultcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                        Source: Quote 000002320.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                        Source: Quote 000002320.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: Quote 000002320.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                        Source: Binary string: vgqb.pdbSHA256 source: Quote 000002320.exe
                        Source: Binary string: vgqb.pdb source: Quote 000002320.exe

                        Data Obfuscation

                        barindex
                        Source: 0.2.Quote 000002320.exe.53b0000.4.raw.unpack, L2.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                        Source: 0.2.Quote 000002320.exe.3c39e00.2.raw.unpack, zjW2mc2wd4X5Q0JlMg.cs.Net Code: qpApAGTvmT System.Reflection.Assembly.Load(byte[])
                        Source: 0.2.Quote 000002320.exe.7110000.5.raw.unpack, zjW2mc2wd4X5Q0JlMg.cs.Net Code: qpApAGTvmT System.Reflection.Assembly.Load(byte[])
                        Source: 0.2.Quote 000002320.exe.3a51d60.1.raw.unpack, L2.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                        Source: Quote 000002320.exeStatic PE information: 0x9DF13C09 [Sat Dec 20 08:34:17 2053 UTC]
                        Source: C:\Users\user\Desktop\Quote 000002320.exeCode function: 0_2_00C901B5 push esp; iretd 0_2_00C901B3
                        Source: Quote 000002320.exeStatic PE information: section name: .text entropy: 7.719516513795825
                        Source: 0.2.Quote 000002320.exe.3c39e00.2.raw.unpack, wyYEYueLktGSUnsqKi.csHigh entropy of concatenated method names: 'UyBd0jUJkw', 'i1LdRbE5CJ', 'q9pdAR3kJo', 'sq4d32418D', 'Ljbdmq0wTG', 'n3ddqLdsCK', 'jgJdMnR2nD', 'atOdDnLtcj', 'txndjAgYbD', 'twYdgiXk2q'
                        Source: 0.2.Quote 000002320.exe.3c39e00.2.raw.unpack, ET5FvO9R7eOiJHvQws.csHigh entropy of concatenated method names: 'EAJPI4pYIC', 'AenPn33xeY', 'lsgPS4iK5b', 'JtiPd4TDNx', 'cLWPUHTLG0', 'aYSP2aTDxf', 'Next', 'Next', 'Next', 'NextBytes'
                        Source: 0.2.Quote 000002320.exe.3c39e00.2.raw.unpack, k1eCp6sQ4vAlQqkxpH.csHigh entropy of concatenated method names: 'SwpdWqnnuC', 'UgTdIeHAty', 'T2jdSNbCAE', 'CaYS96lOdf', 'YliSzTFddx', 'jDBdVFm3ad', 'Xx6dQeF3BX', 'B0IdFKKVnb', 'hgHdcoUXSP', 'JY0dp16Ksx'
                        Source: 0.2.Quote 000002320.exe.3c39e00.2.raw.unpack, tp1srKzZM2w5lxlFk9.csHigh entropy of concatenated method names: 'stTPqr68q1', 'DoqPDZSm1Y', 'N9CPjs7cRL', 'n6VP8DERn1', 'ywYPtTC5Gs', 'FxfPkaE2T8', 'dxxP4QH2DF', 'ojrPiXVl9Z', 'I84P0lxUHq', 'IBIPRu6dkJ'
                        Source: 0.2.Quote 000002320.exe.3c39e00.2.raw.unpack, NeLjxfQV8NQOGsXdwtG.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'itTPZJareO', 'AfjPxohQ4i', 'lEGPvCCUte', 'luEPHFK1yr', 'L68PwraKcE', 'RacPr2fKtc', 'HccPBhiFvK'
                        Source: 0.2.Quote 000002320.exe.3c39e00.2.raw.unpack, s5NATsvcw6Ghxtigyc.csHigh entropy of concatenated method names: 'v13ND1hZIi', 'zhfNj4t9ce', 'svrN86EE1a', 'dDwNt9e8QL', 'x7yNkOteDU', 'ij6N4wbVww', 'SDsNspLpnU', 'CIPNbakrYI', 'RUvNojDc2P', 'Ld7NZDtGDE'
                        Source: 0.2.Quote 000002320.exe.3c39e00.2.raw.unpack, ohaJxbQpd37dEOU240Y.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'pTcOUKwybO', 'xGmOP1yycF', 'RU7OKi0fK8', 'YeBOOGqBx3', 'sBSO5BrGvG', 'dMVOhjwGPW', 'vu0Oigs9dL'
                        Source: 0.2.Quote 000002320.exe.3c39e00.2.raw.unpack, EIGr2YQcBbaLcCDI4Pn.csHigh entropy of concatenated method names: 'hNyK9eYXPU', 'uUeKzgXGZ1', 'AtsOVsNq1h', 'gHQZ9qKB2aqXZrWqOP2', 'nv1cDhKYpnls5bATJem', 'E1Qr50KJx67EwR4RBVc', 'IfCHNSKzfKsjy1bBjIG', 'MxRPQML60y1shwKjY8W'
                        Source: 0.2.Quote 000002320.exe.3c39e00.2.raw.unpack, o7610k888gbF0k8FhA.csHigh entropy of concatenated method names: 'XPASyiWrI7', 'uI5SXZtQ2V', 'JOiSnKq20w', 'SdgSdR7ASs', 'd5dS2VbVTW', 'eQin78JhAj', 'L7AnLS0HEc', 'HmAn15LUnf', 'QMxnuEtYsh', 'W0Qnlydtvv'
                        Source: 0.2.Quote 000002320.exe.3c39e00.2.raw.unpack, tGb3ut1lr9s2NNFSFV.csHigh entropy of concatenated method names: 'RNAUCkewU5', 'mMMUac3WpO', 'egtUUMMNPE', 'XXkUK8sD93', 's40U5Cub9d', 'L8oUi1QAXV', 'Dispose', 'xbhJWlO6hX', 'VCGJXTki5X', 'tcxJIIh6mi'
                        Source: 0.2.Quote 000002320.exe.3c39e00.2.raw.unpack, vvGronFEbJ8ZcDwUww.csHigh entropy of concatenated method names: 'FelADmqhM', 'R4l3V3TxZ', 'NN7qbBNyU', 'zD2Mx4ErF', 'R05jIK9Ti', 'v7Qg3Obkv', 'xJTmi2t49nBK5hounm', 'tpNBdUUyNvYKKlr8EU', 'VV6J9YSX6', 'UZePZhFri'
                        Source: 0.2.Quote 000002320.exe.3c39e00.2.raw.unpack, cPMKLBgG70QN58dlbu.csHigh entropy of concatenated method names: 'qeOnm2vXt9', 'evFnMRBt7F', 'h1RIGrcL4X', 'WwHIktHvNy', 'oHkI4mI8Co', 't55IEhy1nQ', 'ELfIskiHTc', 'c8vIbbUngd', 'StvIe0OgIw', 'RXZIo6f9ox'
                        Source: 0.2.Quote 000002320.exe.3c39e00.2.raw.unpack, zjW2mc2wd4X5Q0JlMg.csHigh entropy of concatenated method names: 'RaTcyemlk9', 'pedcWBprKt', 'pwgcXHni9w', 'nfBcIKPDT4', 'nKUcnUGH07', 'aNscS5erkU', 'UNWcdfOUMM', 'bYtc2lT3dy', 'rBtc6OperV', 'Rdncf1WqFt'
                        Source: 0.2.Quote 000002320.exe.3c39e00.2.raw.unpack, vxExZkHQGMjDyWcjjh.csHigh entropy of concatenated method names: 'NfQCoBD7mT', 'FZWCx6f24N', 'zSNCHTouXd', 'U4jCw6o3st', 'QHhCtFjDox', 'gEECGMKcme', 'wKMCkYA0QZ', 'YxwC4ASyZH', 'cBrCEyRml7', 'dlRCsQj9kO'
                        Source: 0.2.Quote 000002320.exe.3c39e00.2.raw.unpack, rLeoCkXdtJriNOHWq4.csHigh entropy of concatenated method names: 'Dispose', 'Ys2QlNNFSF', 'pqqFtHOPeT', 'QClOaLrV31', 'aXfQ9onTwn', 'feqQzrmw5l', 'ProcessDialogKey', 'bLWFVExiPX', 'xocFQ7XupD', 'hEJFFgT5Fv'
                        Source: 0.2.Quote 000002320.exe.3c39e00.2.raw.unpack, OYJeoLjT9UonEBoCxf.csHigh entropy of concatenated method names: 'RYFI3rYHxy', 'pFCIqIsrPA', 'sUsIDobAaW', 'JDHIj53kLN', 'h0xICfu0I6', 'RvjIYLKyRP', 'Bj7IaS0F9L', 'ScqIJDglDB', 'RPcIUuLZAQ', 'UdIIPPJ97K'
                        Source: 0.2.Quote 000002320.exe.3c39e00.2.raw.unpack, fExiPXlioc7XupDIEJ.csHigh entropy of concatenated method names: 'Yc1U8yLu9w', 'blVUt4WBgs', 'KNcUGa3Bmd', 'CvGUkkIc2R', 'OHPU435Z4B', 'aEiUEEpKBX', 'L0uUsllK3U', 'LqZUbnyRTr', 'HlCUerJfGd', 'xfwUoKInKx'
                        Source: 0.2.Quote 000002320.exe.3c39e00.2.raw.unpack, L1qJYPphBfglWDsLDg.csHigh entropy of concatenated method names: 'OqWQdg1l84', 'H8aQ2S0rir', 'UT9QfUonEB', 'NCxQTfFPMK', 'GdlQCbuC76', 'W0kQY88gbF', 'oB4rexWgH36bEE859i', 'XPErlG0riXoDo0tarP', 'McvQQ1D7Gq', 'FdJQcVZXXQ'
                        Source: 0.2.Quote 000002320.exe.3c39e00.2.raw.unpack, fg1l84Dt8aS0rirRpS.csHigh entropy of concatenated method names: 'woDXHWNOOm', 'LQSXwWdhQm', 'FCuXrIiYGO', 'h5cXBJXlfc', 'lXIX7gyeVQ', 'xHJXLfCAnI', 'AIYX1khAs9', 'wOrXu6dTt3', 'c7AXlZXiSC', 'jmMX92I5g1'
                        Source: 0.2.Quote 000002320.exe.3c39e00.2.raw.unpack, XSivjlQQJMExAh89T0t.csHigh entropy of concatenated method names: 'E13P9bZxha', 'miIPzZLiBv', 'sXYKVFENF7', 'IxfKQWsN6J', 'pCmKFo30yW', 'VJFKc4LxMh', 'k9JKpieT32', 'C5DKyhfftG', 'C3pKWt9m9h', 'J1bKXHQxEh'
                        Source: 0.2.Quote 000002320.exe.3c39e00.2.raw.unpack, hS6JBLrhyMWqXrD6d6.csHigh entropy of concatenated method names: 'ToString', 'ESmYZuXak2', 'lQDYtaQxmJ', 'Ee7YGvGXHh', 'CbxYkPUrVd', 'XMSY4V6Rwl', 'UCFYEGTPKM', 'z7IYsVehPU', 'I1QYbJxmuT', 'QI3YeXueNk'
                        Source: 0.2.Quote 000002320.exe.7110000.5.raw.unpack, wyYEYueLktGSUnsqKi.csHigh entropy of concatenated method names: 'UyBd0jUJkw', 'i1LdRbE5CJ', 'q9pdAR3kJo', 'sq4d32418D', 'Ljbdmq0wTG', 'n3ddqLdsCK', 'jgJdMnR2nD', 'atOdDnLtcj', 'txndjAgYbD', 'twYdgiXk2q'
                        Source: 0.2.Quote 000002320.exe.7110000.5.raw.unpack, ET5FvO9R7eOiJHvQws.csHigh entropy of concatenated method names: 'EAJPI4pYIC', 'AenPn33xeY', 'lsgPS4iK5b', 'JtiPd4TDNx', 'cLWPUHTLG0', 'aYSP2aTDxf', 'Next', 'Next', 'Next', 'NextBytes'
                        Source: 0.2.Quote 000002320.exe.7110000.5.raw.unpack, k1eCp6sQ4vAlQqkxpH.csHigh entropy of concatenated method names: 'SwpdWqnnuC', 'UgTdIeHAty', 'T2jdSNbCAE', 'CaYS96lOdf', 'YliSzTFddx', 'jDBdVFm3ad', 'Xx6dQeF3BX', 'B0IdFKKVnb', 'hgHdcoUXSP', 'JY0dp16Ksx'
                        Source: 0.2.Quote 000002320.exe.7110000.5.raw.unpack, tp1srKzZM2w5lxlFk9.csHigh entropy of concatenated method names: 'stTPqr68q1', 'DoqPDZSm1Y', 'N9CPjs7cRL', 'n6VP8DERn1', 'ywYPtTC5Gs', 'FxfPkaE2T8', 'dxxP4QH2DF', 'ojrPiXVl9Z', 'I84P0lxUHq', 'IBIPRu6dkJ'
                        Source: 0.2.Quote 000002320.exe.7110000.5.raw.unpack, NeLjxfQV8NQOGsXdwtG.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'itTPZJareO', 'AfjPxohQ4i', 'lEGPvCCUte', 'luEPHFK1yr', 'L68PwraKcE', 'RacPr2fKtc', 'HccPBhiFvK'
                        Source: 0.2.Quote 000002320.exe.7110000.5.raw.unpack, s5NATsvcw6Ghxtigyc.csHigh entropy of concatenated method names: 'v13ND1hZIi', 'zhfNj4t9ce', 'svrN86EE1a', 'dDwNt9e8QL', 'x7yNkOteDU', 'ij6N4wbVww', 'SDsNspLpnU', 'CIPNbakrYI', 'RUvNojDc2P', 'Ld7NZDtGDE'
                        Source: 0.2.Quote 000002320.exe.7110000.5.raw.unpack, ohaJxbQpd37dEOU240Y.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'pTcOUKwybO', 'xGmOP1yycF', 'RU7OKi0fK8', 'YeBOOGqBx3', 'sBSO5BrGvG', 'dMVOhjwGPW', 'vu0Oigs9dL'
                        Source: 0.2.Quote 000002320.exe.7110000.5.raw.unpack, EIGr2YQcBbaLcCDI4Pn.csHigh entropy of concatenated method names: 'hNyK9eYXPU', 'uUeKzgXGZ1', 'AtsOVsNq1h', 'gHQZ9qKB2aqXZrWqOP2', 'nv1cDhKYpnls5bATJem', 'E1Qr50KJx67EwR4RBVc', 'IfCHNSKzfKsjy1bBjIG', 'MxRPQML60y1shwKjY8W'
                        Source: 0.2.Quote 000002320.exe.7110000.5.raw.unpack, o7610k888gbF0k8FhA.csHigh entropy of concatenated method names: 'XPASyiWrI7', 'uI5SXZtQ2V', 'JOiSnKq20w', 'SdgSdR7ASs', 'd5dS2VbVTW', 'eQin78JhAj', 'L7AnLS0HEc', 'HmAn15LUnf', 'QMxnuEtYsh', 'W0Qnlydtvv'
                        Source: 0.2.Quote 000002320.exe.7110000.5.raw.unpack, tGb3ut1lr9s2NNFSFV.csHigh entropy of concatenated method names: 'RNAUCkewU5', 'mMMUac3WpO', 'egtUUMMNPE', 'XXkUK8sD93', 's40U5Cub9d', 'L8oUi1QAXV', 'Dispose', 'xbhJWlO6hX', 'VCGJXTki5X', 'tcxJIIh6mi'
                        Source: 0.2.Quote 000002320.exe.7110000.5.raw.unpack, vvGronFEbJ8ZcDwUww.csHigh entropy of concatenated method names: 'FelADmqhM', 'R4l3V3TxZ', 'NN7qbBNyU', 'zD2Mx4ErF', 'R05jIK9Ti', 'v7Qg3Obkv', 'xJTmi2t49nBK5hounm', 'tpNBdUUyNvYKKlr8EU', 'VV6J9YSX6', 'UZePZhFri'
                        Source: 0.2.Quote 000002320.exe.7110000.5.raw.unpack, cPMKLBgG70QN58dlbu.csHigh entropy of concatenated method names: 'qeOnm2vXt9', 'evFnMRBt7F', 'h1RIGrcL4X', 'WwHIktHvNy', 'oHkI4mI8Co', 't55IEhy1nQ', 'ELfIskiHTc', 'c8vIbbUngd', 'StvIe0OgIw', 'RXZIo6f9ox'
                        Source: 0.2.Quote 000002320.exe.7110000.5.raw.unpack, zjW2mc2wd4X5Q0JlMg.csHigh entropy of concatenated method names: 'RaTcyemlk9', 'pedcWBprKt', 'pwgcXHni9w', 'nfBcIKPDT4', 'nKUcnUGH07', 'aNscS5erkU', 'UNWcdfOUMM', 'bYtc2lT3dy', 'rBtc6OperV', 'Rdncf1WqFt'
                        Source: 0.2.Quote 000002320.exe.7110000.5.raw.unpack, vxExZkHQGMjDyWcjjh.csHigh entropy of concatenated method names: 'NfQCoBD7mT', 'FZWCx6f24N', 'zSNCHTouXd', 'U4jCw6o3st', 'QHhCtFjDox', 'gEECGMKcme', 'wKMCkYA0QZ', 'YxwC4ASyZH', 'cBrCEyRml7', 'dlRCsQj9kO'
                        Source: 0.2.Quote 000002320.exe.7110000.5.raw.unpack, rLeoCkXdtJriNOHWq4.csHigh entropy of concatenated method names: 'Dispose', 'Ys2QlNNFSF', 'pqqFtHOPeT', 'QClOaLrV31', 'aXfQ9onTwn', 'feqQzrmw5l', 'ProcessDialogKey', 'bLWFVExiPX', 'xocFQ7XupD', 'hEJFFgT5Fv'
                        Source: 0.2.Quote 000002320.exe.7110000.5.raw.unpack, OYJeoLjT9UonEBoCxf.csHigh entropy of concatenated method names: 'RYFI3rYHxy', 'pFCIqIsrPA', 'sUsIDobAaW', 'JDHIj53kLN', 'h0xICfu0I6', 'RvjIYLKyRP', 'Bj7IaS0F9L', 'ScqIJDglDB', 'RPcIUuLZAQ', 'UdIIPPJ97K'
                        Source: 0.2.Quote 000002320.exe.7110000.5.raw.unpack, fExiPXlioc7XupDIEJ.csHigh entropy of concatenated method names: 'Yc1U8yLu9w', 'blVUt4WBgs', 'KNcUGa3Bmd', 'CvGUkkIc2R', 'OHPU435Z4B', 'aEiUEEpKBX', 'L0uUsllK3U', 'LqZUbnyRTr', 'HlCUerJfGd', 'xfwUoKInKx'
                        Source: 0.2.Quote 000002320.exe.7110000.5.raw.unpack, L1qJYPphBfglWDsLDg.csHigh entropy of concatenated method names: 'OqWQdg1l84', 'H8aQ2S0rir', 'UT9QfUonEB', 'NCxQTfFPMK', 'GdlQCbuC76', 'W0kQY88gbF', 'oB4rexWgH36bEE859i', 'XPErlG0riXoDo0tarP', 'McvQQ1D7Gq', 'FdJQcVZXXQ'
                        Source: 0.2.Quote 000002320.exe.7110000.5.raw.unpack, fg1l84Dt8aS0rirRpS.csHigh entropy of concatenated method names: 'woDXHWNOOm', 'LQSXwWdhQm', 'FCuXrIiYGO', 'h5cXBJXlfc', 'lXIX7gyeVQ', 'xHJXLfCAnI', 'AIYX1khAs9', 'wOrXu6dTt3', 'c7AXlZXiSC', 'jmMX92I5g1'
                        Source: 0.2.Quote 000002320.exe.7110000.5.raw.unpack, XSivjlQQJMExAh89T0t.csHigh entropy of concatenated method names: 'E13P9bZxha', 'miIPzZLiBv', 'sXYKVFENF7', 'IxfKQWsN6J', 'pCmKFo30yW', 'VJFKc4LxMh', 'k9JKpieT32', 'C5DKyhfftG', 'C3pKWt9m9h', 'J1bKXHQxEh'
                        Source: 0.2.Quote 000002320.exe.7110000.5.raw.unpack, hS6JBLrhyMWqXrD6d6.csHigh entropy of concatenated method names: 'ToString', 'ESmYZuXak2', 'lQDYtaQxmJ', 'Ee7YGvGXHh', 'CbxYkPUrVd', 'XMSY4V6Rwl', 'UCFYEGTPKM', 'z7IYsVehPU', 'I1QYbJxmuT', 'QI3YeXueNk'

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                        Malware Analysis System Evasion

                        barindex
                        Source: Yara matchFile source: Process Memory Space: Quote 000002320.exe PID: 3568, type: MEMORYSTR
                        Source: C:\Users\user\Desktop\Quote 000002320.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                        Source: C:\Users\user\Desktop\Quote 000002320.exeMemory allocated: C90000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeMemory allocated: 2A30000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeMemory allocated: 10D0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeMemory allocated: 7860000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeMemory allocated: 6E80000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeMemory allocated: 8860000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeMemory allocated: 9860000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeMemory allocated: 1100000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeMemory allocated: 2BE0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeMemory allocated: 4BE0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6472Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1092Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeWindow / User API: threadDelayed 2170Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeWindow / User API: threadDelayed 7665Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 5832Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6196Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6468Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 2608Thread sleep count: 2170 > 30Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -23980767295822402s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -100000s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -99887s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 2608Thread sleep count: 7665 > 30Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -99778s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -99669s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -99328s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -99219s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -99109s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -98997s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -98888s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -98781s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -98672s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -98562s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -98453s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -98344s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -98219s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -98109s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -98000s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -97891s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -97781s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -97672s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -97562s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -97452s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -97344s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -97219s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -97108s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -97000s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -96891s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -96781s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -96672s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -96562s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -96453s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -96344s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -96234s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -96125s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -96015s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -95906s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -95797s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -95687s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -95578s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -95469s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -95359s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -95250s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -95141s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -95031s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -94922s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -94812s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -94703s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -94594s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -94484s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exe TID: 940Thread sleep time: -94375s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                        Source: C:\Users\user\Desktop\Quote 000002320.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Users\user\Desktop\Quote 000002320.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 100000Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 99887Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 99778Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 99669Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 99328Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 99219Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 99109Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 98997Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 98888Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 98781Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 98672Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 98562Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 98453Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 98344Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 98219Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 98109Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 98000Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 97891Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 97781Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 97672Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 97562Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 97452Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 97344Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 97219Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 97108Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 97000Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 96891Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 96781Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 96672Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 96562Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 96453Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 96344Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 96234Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 96125Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 96015Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 95906Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 95797Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 95687Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 95578Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 95469Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 95359Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 95250Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 95141Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 95031Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 94922Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 94812Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 94703Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 94594Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 94484Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeThread delayed: delay time: 94375Jump to behavior
                        Source: Quote 000002320.exe, 00000005.00000002.3318770826.0000000000EF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllne
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeMemory allocated: page read and write | page guardJump to behavior

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 000002320.exe"
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 000002320.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 000002320.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeProcess created: C:\Users\user\Desktop\Quote 000002320.exe "C:\Users\user\Desktop\Quote 000002320.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeQueries volume information: C:\Users\user\Desktop\Quote 000002320.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeQueries volume information: C:\Users\user\Desktop\Quote 000002320.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: 0.2.Quote 000002320.exe.3b11700.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Quote 000002320.exe.3ae86e0.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 5.2.Quote 000002320.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Quote 000002320.exe.3ae86e0.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000005.00000002.3318036070.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2130932470.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 00000005.00000002.3319832314.0000000002C3A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.3319832314.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Quote 000002320.exe PID: 1532, type: MEMORYSTR
                        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                        Source: C:\Users\user\Desktop\Quote 000002320.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                        Source: C:\Users\user\Desktop\Quote 000002320.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                        Source: Yara matchFile source: 00000005.00000002.3319832314.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Quote 000002320.exe PID: 1532, type: MEMORYSTR
                        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: 0.2.Quote 000002320.exe.3b11700.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Quote 000002320.exe.3ae86e0.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 5.2.Quote 000002320.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Quote 000002320.exe.3b11700.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Quote 000002320.exe.3ae86e0.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000005.00000002.3318036070.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2130932470.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 00000005.00000002.3319832314.0000000002C3A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.3319832314.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Quote 000002320.exe PID: 1532, type: MEMORYSTR
                        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                        Windows Management Instrumentation
                        1
                        DLL Side-Loading
                        11
                        Process Injection
                        1
                        Masquerading
                        2
                        OS Credential Dumping
                        111
                        Security Software Discovery
                        Remote Services1
                        Email Collection
                        1
                        Encrypted Channel
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                        DLL Side-Loading
                        11
                        Disable or Modify Tools
                        1
                        Credentials in Registry
                        1
                        Process Discovery
                        Remote Desktop Protocol11
                        Archive Collected Data
                        1
                        Non-Standard Port
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)141
                        Virtualization/Sandbox Evasion
                        Security Account Manager141
                        Virtualization/Sandbox Evasion
                        SMB/Windows Admin Shares2
                        Data from Local System
                        1
                        Non-Application Layer Protocol
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                        Process Injection
                        NTDS1
                        Application Window Discovery
                        Distributed Component Object ModelInput Capture11
                        Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                        Deobfuscate/Decode Files or Information
                        LSA Secrets1
                        File and Directory Discovery
                        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                        Obfuscated Files or Information
                        Cached Domain Credentials24
                        System Information Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                        Software Packing
                        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                        Timestomp
                        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                        DLL Side-Loading
                        /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        Quote 000002320.exe53%ReversingLabsByteCode-MSIL.Trojan.Remcos
                        Quote 000002320.exe31%VirustotalBrowse
                        Quote 000002320.exe100%AviraHEUR/AGEN.1309499
                        Quote 000002320.exe100%Joe Sandbox ML
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        mail.mbarieservicesltd.com
                        199.79.62.115
                        truefalse
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameQuote 000002320.exe, 00000000.00000002.2129333318.0000000002A63000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://mail.mbarieservicesltd.comQuote 000002320.exe, 00000005.00000002.3319832314.0000000002C3A000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              199.79.62.115
                              mail.mbarieservicesltd.comUnited States
                              394695PUBLIC-DOMAIN-REGISTRYUSfalse
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1567092
                              Start date and time:2024-12-03 04:03:06 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 5m 15s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:8
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:Quote 000002320.exe
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@6/6@2/1
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 21
                              • Number of non-executed functions: 1
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                              • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtCreateKey calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              TimeTypeDescription
                              22:04:03API Interceptor51x Sleep call for process: Quote 000002320.exe modified
                              22:04:05API Interceptor12x Sleep call for process: powershell.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              199.79.62.115LPO-2024-357.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                Quote5000AFC.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                  Quote1000AFC.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                    Quote 40240333-REV2.exeGet hashmaliciousAgentTeslaBrowse
                                      PO ALJAT-5804-2024.exeGet hashmaliciousAgentTeslaBrowse
                                        INQ#84790.exeGet hashmaliciousAgentTeslaBrowse
                                          LPO24.0524.exeGet hashmaliciousAgentTeslaBrowse
                                            1364. 2024.exeGet hashmaliciousAgentTeslaBrowse
                                              Quote_220072.exeGet hashmaliciousAgentTeslaBrowse
                                                TT Copy.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  mail.mbarieservicesltd.comLPO-2024-357.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 199.79.62.115
                                                  Quote5000AFC.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                  • 199.79.62.115
                                                  Quote1000AFC.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                  • 199.79.62.115
                                                  Quote 40240333-REV2.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 199.79.62.115
                                                  PO ALJAT-5804-2024.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 199.79.62.115
                                                  INQ#84790.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 199.79.62.115
                                                  LPO24.0524.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 199.79.62.115
                                                  1364. 2024.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 199.79.62.115
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  PUBLIC-DOMAIN-REGISTRYUSnew booking 9086432659087.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 162.251.80.30
                                                  rAttached_updat.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                  • 103.76.231.42
                                                  LPO-2024-357.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 199.79.62.115
                                                  RFQ.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 162.251.80.30
                                                  Quote5000AFC.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                  • 199.79.62.115
                                                  Quote1000AFC.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                  • 199.79.62.115
                                                  shipping doc -GY298035826.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 162.251.80.30
                                                  New Purchase Order Document for PO1136908 000 SE.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 208.91.199.225
                                                  Pigroots.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                  • 199.79.63.24
                                                  Shave.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                  • 199.79.63.24
                                                  No context
                                                  No context
                                                  Process:C:\Users\user\Desktop\Quote 000002320.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1216
                                                  Entropy (8bit):5.34331486778365
                                                  Encrypted:false
                                                  SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                  MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                  SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                  SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                  SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                  Malicious:true
                                                  Reputation:high, very likely benign file
                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1172
                                                  Entropy (8bit):5.357042452875322
                                                  Encrypted:false
                                                  SSDEEP:24:3CytZWSKco4KmZjKbm51s4RPT6moUebIKo+mZ9t7J0gt/NKIl9r+q:yyjWSU4xymI4RfoUeW+mZ9tK8ND3
                                                  MD5:827C68C8F65D2B0800E6791B34AB6D2E
                                                  SHA1:151BC96F9C26C53E02D2E0DA64995A462D0C3B4E
                                                  SHA-256:6B22A727792EC2ACE1BC27BF00BECBBD842902F2FD0FC813CF45A21A986377D5
                                                  SHA-512:67E9E89C531B2CDF47FCBBA3F036EA66427631A8EBF287A26DD35AFB114AF6E2D945304CBF72B94358245FEED658F9BA6E19B29879AE6488D8DC7A143DCC146D
                                                  Malicious:false
                                                  Reputation:moderate, very likely benign file
                                                  Preview:@...e.................................^..............@..........P................1]...E...........(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Reputation:high, very likely benign file
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Entropy (8bit):7.710943732483661
                                                  TrID:
                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                  • Win32 Executable (generic) a (10002005/4) 49.75%
                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                  • Windows Screen Saver (13104/52) 0.07%
                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                  File name:Quote 000002320.exe
                                                  File size:633'856 bytes
                                                  MD5:470b7a066dc2cfb8966cce007adabeb1
                                                  SHA1:63dc22eda43fb5ab4f8742e6a24df819884443f2
                                                  SHA256:aa31c3c2ad5f799d3b7d964c05c4a066921ef60aee8b3f96b4c95ba38518c692
                                                  SHA512:ea795823bda76abcb26b4bd97286d08ae3159e1820fa43b1a7751700db7ab07e595f7c4daf8582cdd74189bf05b880bc8f54b998d6e3f9f91103a54c296ebb82
                                                  SSDEEP:12288:Xifyk5jYvMNr4OIgr+BQ3LaARcBmi/QhTz4R83m5Rm5usx+Xtsu:Pk5jYENr40oy+gcBmuQpEROxX
                                                  TLSH:44D4F1987255DA12C69597B80FB2F2B41BBC2D9EAA02D3125FDD7CEBB835F100C84253
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<................0.............j.... ........@.. ....................... ............@................................
                                                  Icon Hash:00928e8e8686b000
                                                  Entrypoint:0x49c16a
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                  Time Stamp:0x9DF13C09 [Sat Dec 20 08:34:17 2053 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                  Instruction
                                                  jmp dword ptr [00402000h]
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x9c1160x4f.text
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x9e0000x5a4.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xa00000xc.reloc
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x9a4b40x70.text
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x20000x9a1700x9a2008684ebd6797c40f38dc572d06d624a93False0.9037883972019465data7.719516513795825IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rsrc0x9e0000x5a40x60067a1c24ecba9328fc4e71beb737ac58aFalse0.4212239583333333data4.065218070523879IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .reloc0xa00000xc0x2006e4f6f3f5d6519824b3fb55ba3ad2585False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  RT_VERSION0x9e0900x314data0.4352791878172589
                                                  RT_MANIFEST0x9e3b40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                  DLLImport
                                                  mscoree.dll_CorExeMain
                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                  2024-12-03T04:04:11.815106+01002855245ETPRO MALWARE Agent Tesla Exfil via SMTP1192.168.2.549707199.79.62.115587TCP
                                                  2024-12-03T04:04:11.815106+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.549707199.79.62.115587TCP
                                                  2024-12-03T04:05:47.275046+01002030171ET MALWARE AgentTesla Exfil Via SMTP1192.168.2.549707199.79.62.115587TCP
                                                  2024-12-03T04:05:47.275046+01002839723ETPRO MALWARE Win32/Agent Tesla SMTP Activity1192.168.2.549707199.79.62.115587TCP
                                                  2024-12-03T04:05:47.275046+01002840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M21192.168.2.549707199.79.62.115587TCP
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Dec 3, 2024 04:04:08.009821892 CET49707587192.168.2.5199.79.62.115
                                                  Dec 3, 2024 04:04:08.132038116 CET58749707199.79.62.115192.168.2.5
                                                  Dec 3, 2024 04:04:08.132114887 CET49707587192.168.2.5199.79.62.115
                                                  Dec 3, 2024 04:04:09.369307041 CET58749707199.79.62.115192.168.2.5
                                                  Dec 3, 2024 04:04:09.370872021 CET49707587192.168.2.5199.79.62.115
                                                  Dec 3, 2024 04:04:09.490839958 CET58749707199.79.62.115192.168.2.5
                                                  Dec 3, 2024 04:04:09.756510019 CET58749707199.79.62.115192.168.2.5
                                                  Dec 3, 2024 04:04:09.760754108 CET49707587192.168.2.5199.79.62.115
                                                  Dec 3, 2024 04:04:09.880700111 CET58749707199.79.62.115192.168.2.5
                                                  Dec 3, 2024 04:04:10.146965981 CET58749707199.79.62.115192.168.2.5
                                                  Dec 3, 2024 04:04:10.147876978 CET49707587192.168.2.5199.79.62.115
                                                  Dec 3, 2024 04:04:10.267853022 CET58749707199.79.62.115192.168.2.5
                                                  Dec 3, 2024 04:04:10.648940086 CET58749707199.79.62.115192.168.2.5
                                                  Dec 3, 2024 04:04:10.649153948 CET49707587192.168.2.5199.79.62.115
                                                  Dec 3, 2024 04:04:10.769112110 CET58749707199.79.62.115192.168.2.5
                                                  Dec 3, 2024 04:04:11.035226107 CET58749707199.79.62.115192.168.2.5
                                                  Dec 3, 2024 04:04:11.035399914 CET49707587192.168.2.5199.79.62.115
                                                  Dec 3, 2024 04:04:11.155361891 CET58749707199.79.62.115192.168.2.5
                                                  Dec 3, 2024 04:04:11.427822113 CET58749707199.79.62.115192.168.2.5
                                                  Dec 3, 2024 04:04:11.427989960 CET49707587192.168.2.5199.79.62.115
                                                  Dec 3, 2024 04:04:11.547913074 CET58749707199.79.62.115192.168.2.5
                                                  Dec 3, 2024 04:04:11.814501047 CET58749707199.79.62.115192.168.2.5
                                                  Dec 3, 2024 04:04:11.815105915 CET49707587192.168.2.5199.79.62.115
                                                  Dec 3, 2024 04:04:11.815105915 CET49707587192.168.2.5199.79.62.115
                                                  Dec 3, 2024 04:04:11.815138102 CET49707587192.168.2.5199.79.62.115
                                                  Dec 3, 2024 04:04:11.815138102 CET49707587192.168.2.5199.79.62.115
                                                  Dec 3, 2024 04:04:11.935121059 CET58749707199.79.62.115192.168.2.5
                                                  Dec 3, 2024 04:04:11.935133934 CET58749707199.79.62.115192.168.2.5
                                                  Dec 3, 2024 04:04:11.935142040 CET58749707199.79.62.115192.168.2.5
                                                  Dec 3, 2024 04:04:11.935144901 CET58749707199.79.62.115192.168.2.5
                                                  Dec 3, 2024 04:04:12.308120966 CET58749707199.79.62.115192.168.2.5
                                                  Dec 3, 2024 04:04:12.361977100 CET49707587192.168.2.5199.79.62.115
                                                  Dec 3, 2024 04:05:46.687242031 CET49707587192.168.2.5199.79.62.115
                                                  Dec 3, 2024 04:05:46.807306051 CET58749707199.79.62.115192.168.2.5
                                                  Dec 3, 2024 04:05:47.274903059 CET58749707199.79.62.115192.168.2.5
                                                  Dec 3, 2024 04:05:47.275046110 CET49707587192.168.2.5199.79.62.115
                                                  Dec 3, 2024 04:05:47.275336981 CET58749707199.79.62.115192.168.2.5
                                                  Dec 3, 2024 04:05:47.275393963 CET49707587192.168.2.5199.79.62.115
                                                  Dec 3, 2024 04:05:47.395055056 CET58749707199.79.62.115192.168.2.5
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Dec 3, 2024 04:04:06.665827036 CET6148953192.168.2.51.1.1.1
                                                  Dec 3, 2024 04:04:07.687336922 CET6148953192.168.2.51.1.1.1
                                                  Dec 3, 2024 04:04:08.001444101 CET53614891.1.1.1192.168.2.5
                                                  Dec 3, 2024 04:04:08.001492977 CET53614891.1.1.1192.168.2.5
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Dec 3, 2024 04:04:06.665827036 CET192.168.2.51.1.1.10x9983Standard query (0)mail.mbarieservicesltd.comA (IP address)IN (0x0001)false
                                                  Dec 3, 2024 04:04:07.687336922 CET192.168.2.51.1.1.10x9983Standard query (0)mail.mbarieservicesltd.comA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Dec 3, 2024 04:04:08.001444101 CET1.1.1.1192.168.2.50x9983No error (0)mail.mbarieservicesltd.com199.79.62.115A (IP address)IN (0x0001)false
                                                  Dec 3, 2024 04:04:08.001492977 CET1.1.1.1192.168.2.50x9983No error (0)mail.mbarieservicesltd.com199.79.62.115A (IP address)IN (0x0001)false
                                                  TimestampSource PortDest PortSource IPDest IPCommands
                                                  Dec 3, 2024 04:04:09.369307041 CET58749707199.79.62.115192.168.2.5220-md-54.webhostbox.net ESMTP Exim 4.96.2 #2 Tue, 03 Dec 2024 08:34:09 +0530
                                                  220-We do not authorize the use of this system to transport unsolicited,
                                                  220 and/or bulk e-mail.
                                                  Dec 3, 2024 04:04:09.370872021 CET49707587192.168.2.5199.79.62.115EHLO 928100
                                                  Dec 3, 2024 04:04:09.756510019 CET58749707199.79.62.115192.168.2.5250-md-54.webhostbox.net Hello 928100 [8.46.123.228]
                                                  250-SIZE 52428800
                                                  250-8BITMIME
                                                  250-PIPELINING
                                                  250-PIPECONNECT
                                                  250-AUTH PLAIN LOGIN
                                                  250-STARTTLS
                                                  250 HELP
                                                  Dec 3, 2024 04:04:09.760754108 CET49707587192.168.2.5199.79.62.115AUTH login c2FsZXNzQG1iYXJpZXNlcnZpY2VzbHRkLmNvbQ==
                                                  Dec 3, 2024 04:04:10.146965981 CET58749707199.79.62.115192.168.2.5334 UGFzc3dvcmQ6
                                                  Dec 3, 2024 04:04:10.648940086 CET58749707199.79.62.115192.168.2.5235 Authentication succeeded
                                                  Dec 3, 2024 04:04:10.649153948 CET49707587192.168.2.5199.79.62.115MAIL FROM:<saless@mbarieservicesltd.com>
                                                  Dec 3, 2024 04:04:11.035226107 CET58749707199.79.62.115192.168.2.5250 OK
                                                  Dec 3, 2024 04:04:11.035399914 CET49707587192.168.2.5199.79.62.115RCPT TO:<iinfo@mbarieservicesltd.com>
                                                  Dec 3, 2024 04:04:11.427822113 CET58749707199.79.62.115192.168.2.5250 Accepted
                                                  Dec 3, 2024 04:04:11.427989960 CET49707587192.168.2.5199.79.62.115DATA
                                                  Dec 3, 2024 04:04:11.814501047 CET58749707199.79.62.115192.168.2.5354 Enter message, ending with "." on a line by itself
                                                  Dec 3, 2024 04:04:11.815138102 CET49707587192.168.2.5199.79.62.115.
                                                  Dec 3, 2024 04:04:12.308120966 CET58749707199.79.62.115192.168.2.5250 OK id=1tIJCt-000Alv-1x
                                                  Dec 3, 2024 04:05:46.687242031 CET49707587192.168.2.5199.79.62.115QUIT
                                                  Dec 3, 2024 04:05:47.274903059 CET58749707199.79.62.115192.168.2.5221 md-54.webhostbox.net closing connection

                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:22:03:58
                                                  Start date:02/12/2024
                                                  Path:C:\Users\user\Desktop\Quote 000002320.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\Quote 000002320.exe"
                                                  Imagebase:0x590000
                                                  File size:633'856 bytes
                                                  MD5 hash:470B7A066DC2CFB8966CCE007ADABEB1
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.2130932470.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:3
                                                  Start time:22:04:04
                                                  Start date:02/12/2024
                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote 000002320.exe"
                                                  Imagebase:0x320000
                                                  File size:433'152 bytes
                                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:4
                                                  Start time:22:04:04
                                                  Start date:02/12/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff6d64d0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:5
                                                  Start time:22:04:04
                                                  Start date:02/12/2024
                                                  Path:C:\Users\user\Desktop\Quote 000002320.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\Quote 000002320.exe"
                                                  Imagebase:0x830000
                                                  File size:633'856 bytes
                                                  MD5 hash:470B7A066DC2CFB8966CCE007ADABEB1
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000005.00000002.3318036070.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.3319832314.0000000002C3A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.3319832314.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.3319832314.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:low
                                                  Has exited:false

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:9.2%
                                                    Dynamic/Decrypted Code Coverage:100%
                                                    Signature Coverage:0%
                                                    Total number of Nodes:38
                                                    Total number of Limit Nodes:7
                                                    execution_graph 14734 c94668 14735 c9467a 14734->14735 14736 c94686 14735->14736 14738 c94778 14735->14738 14739 c9479d 14738->14739 14743 c94888 14739->14743 14747 c94878 14739->14747 14744 c948af 14743->14744 14746 c9498c 14744->14746 14751 c944b4 14744->14751 14749 c94888 14747->14749 14748 c9498c 14748->14748 14749->14748 14750 c944b4 CreateActCtxA 14749->14750 14750->14748 14752 c95918 CreateActCtxA 14751->14752 14754 c959db 14752->14754 14754->14754 14755 c9d478 14756 c9d4be GetCurrentProcess 14755->14756 14758 c9d509 14756->14758 14759 c9d510 GetCurrentThread 14756->14759 14758->14759 14760 c9d54d GetCurrentProcess 14759->14760 14761 c9d546 14759->14761 14762 c9d583 14760->14762 14761->14760 14763 c9d5ab GetCurrentThreadId 14762->14763 14764 c9d5dc 14763->14764 14765 c9d6c0 DuplicateHandle 14766 c9d756 14765->14766 14767 c9acf0 14768 c9acff 14767->14768 14771 c9add8 14767->14771 14776 c9ade8 14767->14776 14772 c9ae1c 14771->14772 14773 c9adf9 14771->14773 14772->14768 14773->14772 14774 c9b020 GetModuleHandleW 14773->14774 14775 c9b04d 14774->14775 14775->14768 14777 c9ae1c 14776->14777 14778 c9adf9 14776->14778 14777->14768 14778->14777 14779 c9b020 GetModuleHandleW 14778->14779 14780 c9b04d 14779->14780 14780->14768

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 294 c9d468-c9d507 GetCurrentProcess 298 c9d509-c9d50f 294->298 299 c9d510-c9d544 GetCurrentThread 294->299 298->299 300 c9d54d-c9d581 GetCurrentProcess 299->300 301 c9d546-c9d54c 299->301 303 c9d58a-c9d5a5 call c9d647 300->303 304 c9d583-c9d589 300->304 301->300 306 c9d5ab-c9d5da GetCurrentThreadId 303->306 304->303 308 c9d5dc-c9d5e2 306->308 309 c9d5e3-c9d645 306->309 308->309
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32 ref: 00C9D4F6
                                                    • GetCurrentThread.KERNEL32 ref: 00C9D533
                                                    • GetCurrentProcess.KERNEL32 ref: 00C9D570
                                                    • GetCurrentThreadId.KERNEL32 ref: 00C9D5C9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2127718112.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c90000_Quote 000002320.jbxd
                                                    Similarity
                                                    • API ID: Current$ProcessThread
                                                    • String ID:
                                                    • API String ID: 2063062207-0
                                                    • Opcode ID: c9108bb5adaf7d08d02cefd66cf282eb9e5c7e023b1a1dd344c7d957f5938fed
                                                    • Instruction ID: 3a3283d2cb0ab5652369d3ffc0d63c95854429e3081e6c3a3f3cae7c0bc3a6d9
                                                    • Opcode Fuzzy Hash: c9108bb5adaf7d08d02cefd66cf282eb9e5c7e023b1a1dd344c7d957f5938fed
                                                    • Instruction Fuzzy Hash: C05155B09012498FDB14DFA9D548BAEBBF1FF49304F20805AE459B7360D7799984CF61

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 316 c9d478-c9d507 GetCurrentProcess 320 c9d509-c9d50f 316->320 321 c9d510-c9d544 GetCurrentThread 316->321 320->321 322 c9d54d-c9d581 GetCurrentProcess 321->322 323 c9d546-c9d54c 321->323 325 c9d58a-c9d5a5 call c9d647 322->325 326 c9d583-c9d589 322->326 323->322 328 c9d5ab-c9d5da GetCurrentThreadId 325->328 326->325 330 c9d5dc-c9d5e2 328->330 331 c9d5e3-c9d645 328->331 330->331
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32 ref: 00C9D4F6
                                                    • GetCurrentThread.KERNEL32 ref: 00C9D533
                                                    • GetCurrentProcess.KERNEL32 ref: 00C9D570
                                                    • GetCurrentThreadId.KERNEL32 ref: 00C9D5C9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2127718112.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c90000_Quote 000002320.jbxd
                                                    Similarity
                                                    • API ID: Current$ProcessThread
                                                    • String ID:
                                                    • API String ID: 2063062207-0
                                                    • Opcode ID: ea929129e71e8843f48111d2a62540294f56603967b4e55aee3a88c824765aa8
                                                    • Instruction ID: 79fbaaf783ee9227b01339246f8bfff68ede2d1ea82ab45b32e5ee852e08ec1e
                                                    • Opcode Fuzzy Hash: ea929129e71e8843f48111d2a62540294f56603967b4e55aee3a88c824765aa8
                                                    • Instruction Fuzzy Hash: E15164B09002098FDB14DFAAD548BAEBBF1FF49304F20805AE419B7360D739A944CF65

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 360 c9ade8-c9adf7 361 c9adf9-c9ae06 call c99414 360->361 362 c9ae23-c9ae27 360->362 367 c9ae08 361->367 368 c9ae1c 361->368 363 c9ae29-c9ae33 362->363 364 c9ae3b-c9ae7c 362->364 363->364 371 c9ae89-c9ae97 364->371 372 c9ae7e-c9ae86 364->372 415 c9ae0e call c9b080 367->415 416 c9ae0e call c9b070 367->416 368->362 374 c9ae99-c9ae9e 371->374 375 c9aebb-c9aebd 371->375 372->371 373 c9ae14-c9ae16 373->368 378 c9af58-c9b018 373->378 376 c9aea9 374->376 377 c9aea0-c9aea7 call c9a150 374->377 379 c9aec0-c9aec7 375->379 381 c9aeab-c9aeb9 376->381 377->381 410 c9b01a-c9b01d 378->410 411 c9b020-c9b04b GetModuleHandleW 378->411 382 c9aec9-c9aed1 379->382 383 c9aed4-c9aedb 379->383 381->379 382->383 385 c9aee8-c9aef1 call c9a160 383->385 386 c9aedd-c9aee5 383->386 391 c9aefe-c9af03 385->391 392 c9aef3-c9aefb 385->392 386->385 393 c9af21-c9af2e 391->393 394 c9af05-c9af0c 391->394 392->391 401 c9af51-c9af57 393->401 402 c9af30-c9af4e 393->402 394->393 396 c9af0e-c9af1e call c9a170 call c9a180 394->396 396->393 402->401 410->411 412 c9b04d-c9b053 411->412 413 c9b054-c9b068 411->413 412->413 415->373 416->373
                                                    APIs
                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 00C9B03E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2127718112.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c90000_Quote 000002320.jbxd
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID:
                                                    • API String ID: 4139908857-0
                                                    • Opcode ID: f4a8ccf501d0a28151bb372c29b04c4531f412c7fb7b8d60542aa7d6e4031e75
                                                    • Instruction ID: 6eccae0195581b1e865048b84a0dc1d504fb06cb2cff93cdb0299de123673728
                                                    • Opcode Fuzzy Hash: f4a8ccf501d0a28151bb372c29b04c4531f412c7fb7b8d60542aa7d6e4031e75
                                                    • Instruction Fuzzy Hash: CE714770A00B058FDB24DF69D54976ABBF1FF88300F00892DE49AD7A50DB35E955CB91

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 417 c944b4-c959d9 CreateActCtxA 420 c959db-c959e1 417->420 421 c959e2-c95a3c 417->421 420->421 428 c95a4b-c95a4f 421->428 429 c95a3e-c95a41 421->429 430 c95a51-c95a5d 428->430 431 c95a60 428->431 429->428 430->431 433 c95a61 431->433 433->433
                                                    APIs
                                                    • CreateActCtxA.KERNEL32(?), ref: 00C959C9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2127718112.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c90000_Quote 000002320.jbxd
                                                    Similarity
                                                    • API ID: Create
                                                    • String ID:
                                                    • API String ID: 2289755597-0
                                                    • Opcode ID: ce97047097fd2737e59db21c9cf3f9d529e9583f5e8229083eb8ce69890625ac
                                                    • Instruction ID: ba001d69fb6dc8904f4c01eb72d3d5eb8c84d8ef7b91cc0474a03c9dbe11bf35
                                                    • Opcode Fuzzy Hash: ce97047097fd2737e59db21c9cf3f9d529e9583f5e8229083eb8ce69890625ac
                                                    • Instruction Fuzzy Hash: F341E2B0C0071DCBDF25DFAAC888B9DBBB5BF48304F20816AD419AB255DB756946CF90

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 434 c9590c-c959d9 CreateActCtxA 436 c959db-c959e1 434->436 437 c959e2-c95a3c 434->437 436->437 444 c95a4b-c95a4f 437->444 445 c95a3e-c95a41 437->445 446 c95a51-c95a5d 444->446 447 c95a60 444->447 445->444 446->447 449 c95a61 447->449 449->449
                                                    APIs
                                                    • CreateActCtxA.KERNEL32(?), ref: 00C959C9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2127718112.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c90000_Quote 000002320.jbxd
                                                    Similarity
                                                    • API ID: Create
                                                    • String ID:
                                                    • API String ID: 2289755597-0
                                                    • Opcode ID: 8f2fa2fdddaf7b98c8b9db47cd84ef0fa37a6550f385c2384e6645d95c457ade
                                                    • Instruction ID: ece00c95a2596180a5cec36233770c29014c754148e23976f6b44cd3d3b03db6
                                                    • Opcode Fuzzy Hash: 8f2fa2fdddaf7b98c8b9db47cd84ef0fa37a6550f385c2384e6645d95c457ade
                                                    • Instruction Fuzzy Hash: 504112B0C00719CADF25DFA9C888BDDBBF1BF49304F20816AD458AB251DB756946CF90

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 450 c9d6b9-c9d754 DuplicateHandle 451 c9d75d-c9d77a 450->451 452 c9d756-c9d75c 450->452 452->451
                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00C9D747
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2127718112.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c90000_Quote 000002320.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: 1a4de3d336c96b9847b94a227c15d677e76101bd41a3c1c82e1509ff1113d7e8
                                                    • Instruction ID: f6cb5aad2d9cd78deb68e2d0db72147ea1d14c2cfb4584bb6cc17951d178afc2
                                                    • Opcode Fuzzy Hash: 1a4de3d336c96b9847b94a227c15d677e76101bd41a3c1c82e1509ff1113d7e8
                                                    • Instruction Fuzzy Hash: D821E4B5D002089FDB10CFAAD584AEEBBF5FB48320F14841AE959B3310C378AA40CF60

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 455 c9d6c0-c9d754 DuplicateHandle 456 c9d75d-c9d77a 455->456 457 c9d756-c9d75c 455->457 457->456
                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00C9D747
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2127718112.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c90000_Quote 000002320.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: 29e8de46f205f86c384716d669d2ee1385184608c2a2d6d37e4e546f43b5a592
                                                    • Instruction ID: db4b799990559ab5d9c8bc93b303e0de448ce0a0918a22f6d58a0aab4356456f
                                                    • Opcode Fuzzy Hash: 29e8de46f205f86c384716d669d2ee1385184608c2a2d6d37e4e546f43b5a592
                                                    • Instruction Fuzzy Hash: E521C4B59002489FDB10CFAAD584ADEBBF9FB48310F14841AE919A3350D379A944CFA5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 460 c9afd8-c9b018 461 c9b01a-c9b01d 460->461 462 c9b020-c9b04b GetModuleHandleW 460->462 461->462 463 c9b04d-c9b053 462->463 464 c9b054-c9b068 462->464 463->464
                                                    APIs
                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 00C9B03E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2127718112.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c90000_Quote 000002320.jbxd
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID:
                                                    • API String ID: 4139908857-0
                                                    • Opcode ID: affe99c4eb69888bbc44d41e0e4be10c8c05f1b78f9ffe8be1dfc9889309ac72
                                                    • Instruction ID: 7f46b211dd177399e949d690ac44b7ec4169fb08325fe302e552bbf508497deb
                                                    • Opcode Fuzzy Hash: affe99c4eb69888bbc44d41e0e4be10c8c05f1b78f9ffe8be1dfc9889309ac72
                                                    • Instruction Fuzzy Hash: D5110FB5C006498FCB20DF9AD548ADEFBF4AB88320F10841AD929A7200D379A945CFA1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2127511440.0000000000C0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C0D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c0d000_Quote 000002320.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 98a87068245386fae4e2bb4c0e013442232d7da518997ed99221d2d753ae54d1
                                                    • Instruction ID: 85421013890fb85b0aeceb4a38cda07bd05c30c66eb437a8b3574dd5c0b5a16a
                                                    • Opcode Fuzzy Hash: 98a87068245386fae4e2bb4c0e013442232d7da518997ed99221d2d753ae54d1
                                                    • Instruction Fuzzy Hash: 6621D471504304EFDB05DFA4D9C0F26BBA5FB88314F24C5ADE94A4B296C33ADC56CA61
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2127511440.0000000000C0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C0D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c0d000_Quote 000002320.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c06f6c7e52561cb2333127bd944d2848eec42a09acf173e3e87e99b38894a53e
                                                    • Instruction ID: 5d8e900608165dad3345ec10f8fdd03322a453156fa2cf1cda3a54aecd36c31f
                                                    • Opcode Fuzzy Hash: c06f6c7e52561cb2333127bd944d2848eec42a09acf173e3e87e99b38894a53e
                                                    • Instruction Fuzzy Hash: 9821F271604204DFDB14DF64D9C4B26BF65FB88318F20C569E94E4B296C33AD807CA62
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2127511440.0000000000C0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C0D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c0d000_Quote 000002320.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f0028d64b531fb07ca309249f38f736991a93255ad22b7021131c998acde144d
                                                    • Instruction ID: c9b8c99d4cd92ca024b25718e8c8362aed1df287e466bfc2e0f06244aa29965d
                                                    • Opcode Fuzzy Hash: f0028d64b531fb07ca309249f38f736991a93255ad22b7021131c998acde144d
                                                    • Instruction Fuzzy Hash: 962192755093C08FCB02CF24D994715BF71EB46314F28C5EAD8498F6A7C33A980ACB62
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2127511440.0000000000C0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C0D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c0d000_Quote 000002320.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                    • Instruction ID: cda3728cba7fa8753e71b2263333a0cfe360e852214b0bad4db9858a59055e43
                                                    • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                    • Instruction Fuzzy Hash: 5711BB75504280DFCB02CF54C5C4B15BBA1FB84314F24C6A9D84A4B696C33AD94ACB62
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2127718112.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_c90000_Quote 000002320.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b82712e1ccbbd57a7181ef6d1adba41ba7c91707dc11dbd9e0a7c1165ecbe003
                                                    • Instruction ID: ce1d8a239aa6b3a001fba06368950933e896a6afc581c3d7794db1f1808a7d0c
                                                    • Opcode Fuzzy Hash: b82712e1ccbbd57a7181ef6d1adba41ba7c91707dc11dbd9e0a7c1165ecbe003
                                                    • Instruction Fuzzy Hash: 0BA15B32A002098FCF15DFA4C84859EBBB6FF85300B25857EE911EB266DB71E956DB40

                                                    Execution Graph

                                                    Execution Coverage:7.2%
                                                    Dynamic/Decrypted Code Coverage:100%
                                                    Signature Coverage:0%
                                                    Total number of Nodes:73
                                                    Total number of Limit Nodes:7
                                                    execution_graph 28914 110aed0 28915 110aed5 DuplicateHandle 28914->28915 28916 110af66 28915->28916 28947 ead01c 28948 ead034 28947->28948 28949 ead08e 28948->28949 28952 6500ad8 28948->28952 28961 6500ac9 28948->28961 28955 6500b05 28952->28955 28953 6500b39 28986 6500634 28953->28986 28955->28953 28956 6500b29 28955->28956 28970 6500d2c 28956->28970 28976 6500c60 28956->28976 28981 6500c50 28956->28981 28957 6500b37 28962 6500ad8 28961->28962 28963 6500b39 28962->28963 28965 6500b29 28962->28965 28964 6500634 CallWindowProcW 28963->28964 28966 6500b37 28964->28966 28967 6500c50 CallWindowProcW 28965->28967 28968 6500c60 CallWindowProcW 28965->28968 28969 6500d2c CallWindowProcW 28965->28969 28967->28966 28968->28966 28969->28966 28971 6500cea 28970->28971 28972 6500d3a 28970->28972 28990 6500d18 28971->28990 28993 6500d09 28971->28993 28973 6500d00 28973->28957 28978 6500c74 28976->28978 28977 6500d00 28977->28957 28979 6500d18 CallWindowProcW 28978->28979 28980 6500d09 CallWindowProcW 28978->28980 28979->28977 28980->28977 28982 6500c74 28981->28982 28984 6500d18 CallWindowProcW 28982->28984 28985 6500d09 CallWindowProcW 28982->28985 28983 6500d00 28983->28957 28984->28983 28985->28983 28987 650063f 28986->28987 28988 6501f9a CallWindowProcW 28987->28988 28989 6501f49 28987->28989 28988->28989 28989->28957 28991 6500d29 28990->28991 28997 6501eda 28990->28997 28991->28973 28994 6500d18 28993->28994 28995 6500d29 28994->28995 28996 6501eda CallWindowProcW 28994->28996 28995->28973 28996->28995 28998 6501ee0 28997->28998 28999 6500634 CallWindowProcW 28998->28999 29000 6501eea 28999->29000 29000->28991 28917 110be98 28918 110bec6 28917->28918 28921 110bb3c 28918->28921 28920 110bee6 28922 110bb47 28921->28922 28923 110cfcf 28922->28923 28926 6505658 28922->28926 28930 65056a8 28922->28930 28923->28920 28928 650565d 28926->28928 28927 650575a 28927->28923 28928->28927 28929 6505b70 WaitMessage 28928->28929 28929->28928 28932 650570d 28930->28932 28931 6505b70 WaitMessage 28931->28932 28932->28931 28933 650575a 28932->28933 28933->28923 28934 6504b98 28935 6504ea0 28934->28935 28936 6504bc0 28934->28936 28937 6504bc9 28936->28937 28940 65040d4 28936->28940 28939 6504bec 28942 65040df 28940->28942 28941 6504ee3 28941->28939 28942->28941 28944 65040f0 28942->28944 28945 6504f18 OleInitialize 28944->28945 28946 6504f7c 28945->28946 28946->28941

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1880 65056a8-650570b 1881 650573a-6505758 1880->1881 1882 650570d-6505737 1880->1882 1887 6505761-6505798 1881->1887 1888 650575a-650575c 1881->1888 1882->1881 1892 6505bc9 1887->1892 1893 650579e-65057b2 1887->1893 1890 6505c1a-6505c2f 1888->1890 1896 6505bce-6505be4 1892->1896 1894 65057e1-6505800 1893->1894 1895 65057b4-65057de 1893->1895 1902 6505802-6505808 1894->1902 1903 6505818-650581a 1894->1903 1895->1894 1896->1890 1907 650580a 1902->1907 1908 650580c-650580e 1902->1908 1904 6505839-6505842 1903->1904 1905 650581c-6505834 1903->1905 1909 650584a-6505851 1904->1909 1905->1896 1907->1903 1908->1903 1910 6505853-6505859 1909->1910 1911 650585b-6505862 1909->1911 1912 650586f-650588c call 6505298 1910->1912 1913 6505864-650586a 1911->1913 1914 650586c 1911->1914 1917 65059e1-65059e5 1912->1917 1918 6505892-6505899 1912->1918 1913->1912 1914->1912 1919 6505bb4-6505bc7 1917->1919 1920 65059eb-65059ef 1917->1920 1918->1892 1921 650589f-65058dc 1918->1921 1919->1896 1922 65059f1-6505a04 1920->1922 1923 6505a09-6505a12 1920->1923 1929 65058e2-65058e7 1921->1929 1930 6505baa-6505bae 1921->1930 1922->1896 1925 6505a41-6505a48 1923->1925 1926 6505a14-6505a3e 1923->1926 1927 6505ae7-6505afc 1925->1927 1928 6505a4e-6505a55 1925->1928 1926->1925 1927->1930 1944 6505b02-6505b04 1927->1944 1931 6505a84-6505aa6 1928->1931 1932 6505a57-6505a81 1928->1932 1933 6505919-650592e call 65052bc 1929->1933 1934 65058e9-65058f7 call 65052a4 1929->1934 1930->1909 1930->1919 1931->1927 1971 6505aa8-6505ab2 1931->1971 1932->1931 1942 6505933-6505937 1933->1942 1934->1933 1945 65058f9-6505912 call 65052b0 1934->1945 1946 65059a8-65059ab 1942->1946 1947 6505939-650594b call 65052c8 1942->1947 1948 6505b51-6505b6e call 6505298 1944->1948 1949 6505b06-6505b3f 1944->1949 1956 6505917 1945->1956 1958 65059b3-65059b5 1946->1958 1972 650598b-65059a3 1947->1972 1973 650594d-650597d 1947->1973 1948->1930 1963 6505b70-6505b9c WaitMessage 1948->1963 1960 6505b41-6505b47 1949->1960 1961 6505b48-6505b4f 1949->1961 1956->1942 1958->1930 1964 65059bb-65059c5 call 65052d8 1958->1964 1960->1961 1961->1930 1968 6505ba3 1963->1968 1969 6505b9e 1963->1969 1977 65059d4-65059dc call 65052f0 1964->1977 1978 65059c7-65059cf call 65052e4 1964->1978 1968->1930 1969->1968 1979 6505ab4-6505aba 1971->1979 1980 6505aca-6505ae5 1971->1980 1972->1896 1988 6505984 1973->1988 1989 650597f 1973->1989 1977->1930 1978->1930 1985 6505abc 1979->1985 1986 6505abe-6505ac0 1979->1986 1980->1927 1980->1971 1985->1980 1986->1980 1988->1972 1989->1988
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.3322809609.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_6500000_Quote 000002320.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0df1b89e4d590ba630e5b0984c2db4c586116d35640afbfbd5f6800fefbda26b
                                                    • Instruction ID: d2115863b4d55bab1b8a44a249fda519cbcce658075f71b3eccc17d2b8decb46
                                                    • Opcode Fuzzy Hash: 0df1b89e4d590ba630e5b0984c2db4c586116d35640afbfbd5f6800fefbda26b
                                                    • Instruction Fuzzy Hash: 7DF11B30A00209CFEB54DFA9CA44B9DBBF1FF48314F158569E405AB2A5EB74E945CF90

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1992 6500634-6501f3c 1995 6501f42-6501f47 1992->1995 1996 6501fec-650200c 1992->1996 1998 6501f49-6501f80 1995->1998 1999 6501f9a-6501fd2 CallWindowProcW 1995->1999 2002 650200f-650201c 1996->2002 2006 6501f82-6501f88 1998->2006 2007 6501f89-6501f98 1998->2007 2000 6501fd4-6501fda 1999->2000 2001 6501fdb-6501fea 1999->2001 2000->2001 2001->2002 2006->2007 2007->2002
                                                    APIs
                                                    • CallWindowProcW.USER32(?,?,?,?,?), ref: 06501FC1
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.3322809609.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_6500000_Quote 000002320.jbxd
                                                    Similarity
                                                    • API ID: CallProcWindow
                                                    • String ID:
                                                    • API String ID: 2714655100-0
                                                    • Opcode ID: 51ec6c97906ab51676cd08b8de0c44312e0f424f1f68f326593b7890ed0274b9
                                                    • Instruction ID: 495dc33ffc64d0b4ecacfccf10e4c795154f3528d6397e28465b4c2fa9370eaf
                                                    • Opcode Fuzzy Hash: 51ec6c97906ab51676cd08b8de0c44312e0f424f1f68f326593b7890ed0274b9
                                                    • Instruction Fuzzy Hash: B04169B59003058FDB54CF89C888AAABBF9FF88314F248858E519A7361D734E841CFA1

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2009 110aec8-110aece 2010 110aed0-110aed4 2009->2010 2011 110aed5-110af64 DuplicateHandle 2009->2011 2010->2011 2012 110af66-110af6c 2011->2012 2013 110af6d-110af8a 2011->2013 2012->2013
                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0110AF57
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.3319326335.0000000001100000.00000040.00000800.00020000.00000000.sdmp, Offset: 01100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1100000_Quote 000002320.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: 3c449010900ee03d8ad25e8584236ee0d5babb4b0814a91674e38dec65100e56
                                                    • Instruction ID: f5e5b052daddf7b89e42230e15175d4e2d445ab027a5c6cf6a4979f41a78f94e
                                                    • Opcode Fuzzy Hash: 3c449010900ee03d8ad25e8584236ee0d5babb4b0814a91674e38dec65100e56
                                                    • Instruction Fuzzy Hash: 5421D4B59003489FDB11DFAAD984ADEFBF8FF48310F14841AE918A3250D379A944CFA5
                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0110AF57
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.3319326335.0000000001100000.00000040.00000800.00020000.00000000.sdmp, Offset: 01100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_1100000_Quote 000002320.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: 95005ad978ac211e9b4d4ea9d96da3ae46c02bbdfd6559d2c9fb6af4e1b442bc
                                                    • Instruction ID: f7bb9681ec52b2b4d5d5a502babd1547a34466f40f7b005fd969cc870fda725e
                                                    • Opcode Fuzzy Hash: 95005ad978ac211e9b4d4ea9d96da3ae46c02bbdfd6559d2c9fb6af4e1b442bc
                                                    • Instruction Fuzzy Hash: 1E21B0B59002489FDB10CFAAD984ADEBBF9EB48310F14841AE918A3250D378A944CFA5
                                                    APIs
                                                    • OleInitialize.OLE32(00000000), ref: 06504F6D
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.3322809609.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_6500000_Quote 000002320.jbxd
                                                    Similarity
                                                    • API ID: Initialize
                                                    • String ID:
                                                    • API String ID: 2538663250-0
                                                    • Opcode ID: d8d69158d72f6fba4ed869050426d58672dd13467ef97d6161aff75010472b7d
                                                    • Instruction ID: b055cc5789adad34a14d6f49d0c01fa817660b14bfd1e60208aaeec8f8cf2348
                                                    • Opcode Fuzzy Hash: d8d69158d72f6fba4ed869050426d58672dd13467ef97d6161aff75010472b7d
                                                    • Instruction Fuzzy Hash: 011103B58003488FDB20DFAAD445BDEBFF8EB48324F208959D568A7250C379A584CFA5
                                                    APIs
                                                    • OleInitialize.OLE32(00000000), ref: 06504F6D
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.3322809609.0000000006500000.00000040.00000800.00020000.00000000.sdmp, Offset: 06500000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_6500000_Quote 000002320.jbxd
                                                    Similarity
                                                    • API ID: Initialize
                                                    • String ID:
                                                    • API String ID: 2538663250-0
                                                    • Opcode ID: bed7630f120baeb9b8f330875505b0f55f218562db9afb90b895fda0965c51ed
                                                    • Instruction ID: 9bd3ebedb1e4dde61379da3cffdfc29ae02e4d8432f404a437fb0d4d81e40765
                                                    • Opcode Fuzzy Hash: bed7630f120baeb9b8f330875505b0f55f218562db9afb90b895fda0965c51ed
                                                    • Instruction Fuzzy Hash: F71115B5804348CFDB20DF9AD584BDEBBF8EB48314F108459D618A7350C379A944CFA5
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.3318561824.0000000000EAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EAD000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_ead000_Quote 000002320.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ccb7591b1be9c6adf6dbd32fbabffe21832533ad19a41c71315d76a7645be581
                                                    • Instruction ID: 262332fc3ce2e0cad93a888a7d73e86c41576d43b4cf24d166ddeb9e32beea22
                                                    • Opcode Fuzzy Hash: ccb7591b1be9c6adf6dbd32fbabffe21832533ad19a41c71315d76a7645be581
                                                    • Instruction Fuzzy Hash: AB21F271608204DFCB15DF24D9C4B26BFA6FB89318F20C569D94A5F696C33AE807CA61
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.3318561824.0000000000EAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EAD000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_ead000_Quote 000002320.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8298508aff8bfd4ebf9339b8808ab847bbc77b0dcd800dc1ebbebbf4c23ef39b
                                                    • Instruction ID: 6bf88183d10a8bacbd93d5cd80bdff65e12f1a9e788006e0e2bf4147beb561f0
                                                    • Opcode Fuzzy Hash: 8298508aff8bfd4ebf9339b8808ab847bbc77b0dcd800dc1ebbebbf4c23ef39b
                                                    • Instruction Fuzzy Hash: 792141755093808FDB12CF24D9D4715BF72EB4A214F28C5DAD8498F6A7C33A980ACB62
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.3318507548.0000000000E9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E9D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_e9d000_Quote 000002320.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a73bc8cfdccb4392f4dac9d79f8a0fbd61d6d6031d9306810d9277a8ec136368
                                                    • Instruction ID: c4e666c4a7afade2a4d3fedea011df77d86284c1f68f4861d5658d9d59dcf9ca
                                                    • Opcode Fuzzy Hash: a73bc8cfdccb4392f4dac9d79f8a0fbd61d6d6031d9306810d9277a8ec136368
                                                    • Instruction Fuzzy Hash: 98F0F6710083549EEB20CE06CC84BA2FFA8EF55378F18C95AED4C1B287C2799C40CAB1